
CyberWire Daily
byN2K Networks
NewsTechnology
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes(40 episodes)

S11E2461 - A city goes dark as cyber questions multiply.
Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf botnet infects more than two million devices worldwide. ZoomStealer uses browser extensions to grab sensitive online meeting data. The European Space Agency confirms a cybersecurity incident. Former lawmakers and cyber policy leaders warn that U.S. cyber defenses are slipping. On today’s Afternoon Cyber Te...
Published: Jan 5, 2026Duration: 24:15
![Michael Scott: A team of humble intellects. [Information security] [Career Notes]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8b1c0cc2-dd14-11f0-a060-8f86a8eb28a4%2Fimage%2F910aaf148c5fdf3b9f89208a91f19df4.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S2E102 - Michael Scott: A team of humble intellects. [Information security] [Career Notes]
Please enjoy this encore of Career Notes.
Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being...
Published: Jan 4, 2026Duration: 9:37

S9E392 - Don’t trust that app!
While our team is out on winter break, please enjoy this episode of Research Saturday.
Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon.
These attacks redirect users to fake Microsoft login pages to capture credentials...
Published: Jan 3, 2026Duration: 20:41

S1E2 - Cyber and its "Hive" Mind
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis.
Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host Rebecca Cradick, VP of Global Communications at Armis, is joined by Curtis Simpson, CISO at Armis, to dive deep into the rise of the “Hive Mind”: the collective, connected threat ecosystem where attackers share tools, data, and tactics across the dark web, evolving faster than ever through AI-powered reconnaissance and automation.
This is es...
Published: Jan 2, 2026Duration: 26:37
![Confronting China’s Expanding Cyber Threats [Threat Vector]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F2d1a9aa8-d9e5-11f0-a81c-f71034c38c2f%2Fimage%2Ff3296217a0160b9e4766149adb9f702e.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S6E65 - Confronting China’s Expanding Cyber Threats [Threat Vector]
While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks.
In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments.
Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a k...
Published: Jan 1, 2026Duration: 22:55
![Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fed2dc134-db99-11f0-8781-e3dbb58b362e%2Fimage%2Fed00429bcecd5833f3314805321b8c25.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S9E121 - Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]
While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security.
Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data coll...
Published: Dec 31, 2025Duration: 23:45
![The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fa9ecf1ec-d9fa-11f0-b6c5-77febcd7b1f8%2Fimage%2Fde42cff255e7436f87668db0949201cb.jpg%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S1E55 - The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft.
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks.
They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling...
Published: Dec 30, 2025Duration: 47:29
![Season finale: Leading security in a brave new world. [CISOP]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F5e86f666-d9ec-11f0-8a61-3b434edc70be%2Fimage%2F4576c79a6260b29daaff0ea0480913c0.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S17E123 - Season finale: Leading security in a brave new world. [CISOP]
In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.
Want more CISO Perspectives?
Check out companion blog posts by our very own E...
Published: Dec 30, 2025Duration: 43:59
![The Hidden Risk in Your Stack [Data Security Decoded]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fc7f31618-d9e5-11f0-9bdd-337d9801e671%2Fimage%2F5f1028ae9326e13e44c1be8b0d4f87e2.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S1E41 - The Hidden Risk in Your Stack [Data Security Decoded]
While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik.
In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk...
Published: Dec 29, 2025Duration: 27:12
![Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fa8a2b778-da1c-11f0-95e0-6ffc2bf87fed%2Fimage%2F910aaf148c5fdf3b9f89208a91f19df4.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S2E101 - Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]
While our team is out on winter break, please enjoy this episode of Career Notes.
Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others' biases which helps keep Charity...
Published: Dec 28, 2025Duration: 9:50
![Excel-lerating cyberattacks. [Research Saturday]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F41e40b60-da1a-11f0-9a8a-2badb896a8d6%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S9E370 - Excel-lerating cyberattacks. [Research Saturday]
While our team is out on winter break, please enjoy this episode of Research Saturday.
This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents.
SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target...
Published: Dec 27, 2025Duration: 23:43
![Beyond cyber: Securing the next horizon. [Special Edition]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fd9fecede-1c7a-11f0-85e0-97f5c0d068ec%2Fimage%2F0216c9cea15c53e5d2c739964a38623c.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S10E83 - Beyond cyber: Securing the next horizon. [Special Edition]
While our team is out on winter break, please enjoy this Special Edition episode.
Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.
In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by NightDragon Founder an...
Published: Dec 26, 2025Duration: 1:00:13
![Yippee-ki-yay, cybercriminals! [OMITB]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2Fd9d6431a-1c7a-11f0-85e0-2fef568f676e%2Fimage%2F14002263e169460f16ca12e04624eb3a.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S2E18 - Yippee-ki-yay, cybercriminals! [OMITB]
While our team is out on winter break, please enjoy this episode of Only Malware in the Building.
Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.
Being a security researcher is a bit like being a detectiv...
Published: Dec 25, 2025Duration: 40:18

S10E2460 - And the Breachies go to…
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar privacy failures keep repeating—and why they matter for users.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to...
Published: Dec 24, 2025Duration: 22:22

S10E2459 - Eyes in the sky, red flags on the ground.
The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water authority suffered a ransomware attack. A cyberattack in France disrupts postal, identity, and banking services for millions of customers. NIST and MITRE announce a $20 million partnership for AI research centers. A think-tank says the U.S. needs to go on the cyber offensive. Tim Starks from CyberScoop discusses the passage of the de...
Published: Dec 23, 2025Duration: 27:28
![Tech Investment Strategies and Overview [CISOP]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F714ca95e-d469-11f0-b962-03da25c0eafd%2Fimage%2F4576c79a6260b29daaff0ea0480913c0.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S17E122 - Tech Investment Strategies and Overview [CISOP]
In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.
Want more CISO Perspectives?...
Published: Dec 23, 2025Duration: 48:39

S10E2458 - Everything old is new again.
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Ful...
Published: Dec 22, 2025Duration: 31:40
![Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F36095d30-dd13-11f0-aa1a-af98780e732c%2Fimage%2F910aaf148c5fdf3b9f89208a91f19df4.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S2E100 - Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
Please enjoy this encore of Career Notes.
Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and c...
Published: Dec 21, 2025Duration: 8:42
![The lies that let AI run amok. [Research Saturday]](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F191db83e-dd0d-11f0-8122-ef489b5cb50b%2Fimage%2F95b72a93c2ffaf8ff900d662a9bd3735.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=640&q=75)
S9E406 - The lies that let AI run amok. [Research Saturday]
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign.
Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human over...
Published: Dec 20, 2025Duration: 24:36

S10E2457 - Where encryption meets executive muscle.
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how C...
Published: Dec 19, 2025Duration: 27:37