PodcastsNewsCyberWire Daily

CyberWire Daily

N2K Networks
CyberWire Daily
Latest episode

3558 episodes

  • CyberWire Daily

    The algorithm gets questioned.

    2/03/2026 | 26 mins.
    French police raid X’s Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishing campaign targeting Dropbox credentials. A new GlassWorn campaign targets macOS developers. Critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation. Researchers disclose a major data exposure on Moltbook, a social network built for AI agents. States bridge the gaps in election security. Nitrogen ransomware has a fatal flaw that permanently destroys data. Supersize your passwords — you want fries with that?

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Threat Vector

    Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity while overseeing Cortex Xpanse's teams automating attack surface management across some of the world's largest networks. In this episode of Threat Vector, host David Moulton sits down with Dr. Aaron Isaksen to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments.

    Selected Reading

    French cops raid X's Paris office in algorithmic bias probe (The Register)

    US seizes over $400 million in assets from dark web money laundering operation Helix (SC Media)

    NSA Tells Feds: Zero Trust Must Go Beyond Login (GovInfo Security)

    New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials (Infosecurity Magazine)

    New GlassWorm attack targets macOS via compromised OpenVSX extensions (Bleeping Computer)

    Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack (Hackread)

    Vibe-Coded Moltbook Exposes User Data, API Keys and More (Infosecurity Magazine)

    As feds pull back, states look inward for election security support (CyberScoop)

    Nitrogen Ransomware: ESXi malware has a bug! (Coveware)

    McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords (The Register)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Mid season reflection with Kim Jones. [CISO Perspectives]

    2/03/2026 | 41 mins.
    Please enjoy this encore of CISO Perspectives.

    In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Wind and solar take a cyber hit.

    2/02/2026 | 25 mins.
    Poland says weak security left parts of its power grid exposed. A Russian-linked hacker alliance threatens Denmark with a promised cyber offensive. Fancy Bear moves fast on a new Microsoft Office flaw, hitting Ukrainian and EU targets. Researchers find a sprawling supply chain attack buried in the ClawdBot AI ecosystem. A new report looks at how threats are shaping the work of journalists and security researchers. A stealthy Windows malware campaign blends Pulsar RAT with Stealerv37. A former Google engineer is convicted of stealing AI trade secrets for China. The latest cybersecurity funding and deal news. On our Afternoon Cyber Tea segment, Microsoft’s Ann Johnson chats with Dr. Lorrie Cranor from Carnegie Mellon about security design. The AI dinosaur that knew too much. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Afternoon Cyber Tea

    Dr. Lorrie Cranor⁠, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this month's segment of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. You can listen to Ann and Lorrie's full conversation here, and catch new episodes Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

    Selected Reading

    Russian hackers breached Polish power grid thanks to bad security, report says (TechCrunch)

    Newly Established Russian Hacker Alliance Threatens Denmark (Truesec)

    Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks (Infosecurity Magazine)

    Notepad++ Hijacked by State-Sponsored Hackers (Notepad++)

    ClawdBot Skills Just Ganked Your Crypto (OpenSource Malware Blog)

    Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists (DataBreaches.Net)

    Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data (Hackread)

    U.S. convicts ex-Google engineer for sending AI tech data to China (Bleeping Computer)

    Upwind secures $250 million in a Series B round. (N2K Pro Business Briefing) 

    Don't Buy Internet-Connected Toys For Your Kids (Blackout VPN)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]

    2/01/2026 | 9 mins.
    Please enjoy this encore of Career Notes.

    Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Leaky chats collide with shifting security standards.

    1/30/2026 | 25 mins.
    A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President’s NSA pick champions section 702. France looks to reduce reliance on U.S. digital infrastructure. CISA shares guidance on insider threats. Hugging Face infrastructure was abused to distribute an Android RAT. Ivanti discloses a pair of critical zero-days. Popular dating sites suffer a data breach. Our guest is Tim Starks from CyberScoop, discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. The Nobel Committee blames hackers for a spoiler alert. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest

    Our guest is Tim Starks from CyberScoop discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. You can read Tim’s coverage here. 

    Selected Reading

    Massive AI Chat App Leaked Millions of Users Private Conversations (404 Media)

    White House Scraps 'Burdensome' Software Security Rules (SecurityWeek)

    The 'staggering' cybersecurity weakness that isn't getting enough focus, according to a top Secret Service official (CyberScoop)

    NSA pick champions foreign spying law as nomination advances (The Record)

    French Government To Replace Zoom and Teams With Visio, a Local Alternative (The New York Times)

    CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats (HSToday)

    Hugging Face Abused to Deploy Android RAT (SecurityWeek)

    Ivanti warns of two EPMM flaws exploited in zero-day attacks (Bleeping Computer)

    Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match (Bleeping Computer)

    Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds (Bloomberg)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

More News podcasts

About CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Podcast website

Listen to CyberWire Daily, The Tucker Carlson Show and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

CyberWire Daily: Podcasts in Family

Social
v8.4.0 | © 2007-2026 radio.de GmbH
Generated: 2/4/2026 - 2:08:56 AM