PodcastsNachrichtenCyberWire Daily

CyberWire Daily

N2K Networks
CyberWire Daily
Neueste Episode

3599 Episoden

  • CyberWire Daily

    From Tehran to the Apple II.

    09.03.2026 | 30 Min.
    Israel claims a strike on Iran’s cyber warfare headquarters. The Trump administration releases a new national cyber strategy.  DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipboard hijacker. The DOJ brings a Ghanaian romance scammer to justice. Online advertising enables government tracking. Monday business breakdown. Our guest is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. An Apple II app gets audited by AI. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest

    Joining us today is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. For further detail, you can also check out ISC2’s just released Women in Cybersecurity report.

    Selected Reading

    Iranian cyber warfare HQ allegedly hit by Israel | brief (SC Media)

    Iran internet blackout reaches 6th day as rights groups call for end to digital shutdown (The Record)

    The long-awaited Trump cyber strategy has arrived (CyberScoop)

    DHS CISO, deputy CISO exit amid reported IT leadership overhaul (FedScoop)

    Termite ransomware breaches linked to ClickFix CastleRAT attacks (Bleeping Computer)

    ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader (Cyble)

    Ghanaian Pleads Guilty to Role in $100m Romance Scam (Infosecurity Magazine)

    The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do. (Electronic Frontier Foundation)

    Zurich Insurance Group intends to acquire UK cyber insurer Beazley for approximately $11 billion. (N2K Pro Business Briefing)

    Microsoft Azure CTO says Claude found vulns in Apple II code (The Register)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Cyber without borders: Reporters notebook. [Special Edition]

    09.03.2026 | 23 Min.
    In this special Reporter’s Notebook, Maria Varmazis⁠⁠⁠⁠, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader stakes of collective cyber defense, this episode offers a more personal, behind-the-scenes look at how the reporting came together.

    Hosted by the NATO Cooperative Cyber Defense Centre of Excellence, the exercise brought together allied military, government, and industry teams inside NATO’s secure cyber range. Here, Maria reflects on moments that didn’t make the final cut — the atmosphere inside the facilities, the pace of covering a live exercise, and the small, human details that added texture to the larger story.

    If you haven’t yet, be sure to listen to all three episodes of the series to hear the full story from the ground at Cyber Coalition 2025.

    Episode one can be found ⁠⁠here⁠⁠.

    Episode two can be found ⁠here⁠. 

    Episode three can be found ⁠⁠here⁠⁠. 
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Anna Belak: Acquiring skills to make you into a unicorn. [Thought Leadership] [Career Notes]

    08.03.2026 | 10 Min.
    Please enjoy this encore of Career Notes.

    Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    The scareware rabbit hole. [Research Saturday]

    07.03.2026 | 27 Min.
    This week we are joined by Marcelle Lee, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.

    Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.

    The research can be found here:


    ⁠CTI tradecraft: Investigating a mobile scareware campaign

    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Iran is muddying the waters.

    06.03.2026 | 33 Min.
    Iran’s MuddyWater breaches multiple U.S. organizations. The FBI probes a breach of wiretap management systems. A China-linked threat actor targets South American telecoms. Cisco patches critical firewall flaws. CISA flags actively exploited bugs in Hikvision cameras and Rockwell industrial systems. A House committee advances the controversial KIDS online safety bill. The FBI arrests a suspect accused of stealing millions in seized crypto from the U.S. Marshals Service. Ben Yelin and Ethan Cook unpack the dispute between Anthropic and the Pentagon. Wikimedia worm wreaks widespread wiki woes. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest

    Today, we’re bringing you a featured conversation from our Caveat podcast, where Ben Yelin sits down with N2K Lead Analyst Ethan Cook to unpack the fallout between the Pentagon and Anthropic, what led to the deal unraveling, and what it means as the government pivots to a similar AI contracting agreement with OpenAI. You can listen to their full conversation here and catch new episodes of Caveat featuring Dave and Ben every Thursday with special appearances by Ethan.

    Selected Reading

    Iranian APT Hacked US Airport, Bank, Software Company (SecurityWeek)

    Tech Giants, Washington Rally for Anthropic in Pentagon Feud (GovInfo Security)

    FBI investigates breach of surveillance and wiretap systems (Bleeping Computer)

    Chinese state hackers target telcos with new malware toolkit (Bleeping Computer)

    Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws (Hackread)

    CISA Flags Hikvision Camera & Rockwell Logix Vulnerabilities as Actively Exploited (SOCRadar)

    House panel marks up kids digital safety act amid Democrat backlash (The Record)

    US contractor's son arrested over alleged $46M crypto theft (The Register)

    Wikipedia hit by self-propagating JavaScript worm that vandalized pages (Bleeping Computer)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

Weitere Nachrichten Podcasts

Über CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Podcast-Website

Höre CyberWire Daily, Thema des Tages und viele andere Podcasts aus aller Welt mit der radio.at-App

Hol dir die kostenlose radio.at App

  • Sender und Podcasts favorisieren
  • Streamen via Wifi oder Bluetooth
  • Unterstützt Carplay & Android Auto
  • viele weitere App Funktionen

CyberWire Daily: Zugehörige Podcasts

Rechtliches
Social
v8.7.2 | © 2007-2026 radio.de GmbH
Generated: 3/10/2026 - 1:19:39 AM