![The spy who logged me in. [Research Saturday]](https://cdn-images.podbay.fm/eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1cmwiOiJodHRwczovL21lZ2FwaG9uZS5pbWdpeC5uZXQvcG9kY2FzdHMvOGYzYjIwNjItNGFmYy0xMWYxLWJjZjUtZGI5M2Q1NWU3ZjkyL2ltYWdlLzk1YjcyYTkzYzJmZmFmOGZmOTAwZDY2MmE5YmQzNzM1LnBuZz9peGxpYj1yYWlscy00LjMuMSZtYXgtdz0zMDAwJm1heC1oPTMwMDAmZml0PWNyb3AmYXV0bz1mb3JtYXQsY29tcHJlc3MiLCJmYWxsYmFjayI6Imh0dHBzOi8vaXMxLXNzbC5tenN0YXRpYy5jb20vaW1hZ2UvdGh1bWIvUG9kY2FzdHMyMTEvdjQvMWQvNjYvNmUvMWQ2NjZlYTEtM2E2MC0yZjA4LTVmMzMtMjg5YTlmZDJjNjE1L216YV8xMjc3Mjk2NDI1MTgwNTgzMTA0MC5qcGVnLzYwMHg2MDBiYi5qcGcifQ.XNoq3B_fxQSTZ3m5gFyX6q3BmjZEQkwAanoF5ydJoCY.jpg?width=200&height=200)
Mark Kelly, Staff Threat Researcher at Proofpoint, is discussing their work on "I’d come running back to EU again: TA416 resumes European government espionage campaigns." China-linked threat group TA416 has resumed large-scale phishing and malware campaigns targeting European governments, diplomatic missions tied to the EU and NATO, and more recently Middle Eastern entities following the outbreak of conflict in Iran.
The group has continually evolved its tactics between mid-2025 and early 2026, using techniques like fake Cloudflare verification pages, Microsoft OAuth redirect abuse, and malicious C# project files to deliver customized PlugX malware through spearphishing campaigns. Researchers say the renewed activity reflects shifting geopolitical priorities tied to EU-China tensions, the Russia-Ukraine war, and instability in the Middle East, while highlighting TA416’s ongoing focus on intelligence gathering against diplomatic networks.
The research and executive brief can be found here:
I’d come running back to EU again: TA416 resumes European government espionage campaigns
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 9
2 min

CISA orders rapid patching of actively exploited Ivanti zero-day. Canvas gets hacked during finals week. Dirty Frag is a new Linux zero-day. Researchers document a serious Claude Chrome extension bug. Meta ends Instagram encryption. PCPJack malware clean house before moving in. A new report highlights quantum-era cryptographic threats. Cloudflare announces layoffs amidst AI deployment. Sri Lankan police shut down a scam center. Maria Varmazis joins me to look back at ten years of geopolitics in cyber. Vibe coding reveals valuable data.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we’re previewing a special edition of CyberWire Daily’s 10th anniversary series, where N2K CyberWire’s Maria Varmazis and Dave Bittner revisit a decade of cyber geopolitics and warfare.
Selected Reading
CISA gives feds four days to patch Ivanti flaw exploited as zero-day (Bleeping Computer)
Hackers ate my homework: Educational SaaS Canvas down after cyberattack (The Register)
New Linux 'Dirty Frag' zero-day gives root on all major distros (Bleeping Computer)
Flaw in Claude’s Chrome extension allowed ‘any’ other plugin to hijack victims’ AI (CyberScoop)
Meta U-turns on encryption push for Instagram as DMs go plaintext (The Register)
‘PCPJack’ Worm Removes TeamPCP Infections, Steals Credentials (Security Week)
Quantum Risk Explained (Recorded Future)
Building for the future (Cloudflare)
Sri Lanka makes 37 arrests as it raids another scam centre (Bitdefender)
Thousands of Vibe-Coded Apps Expose Corporate and Personal Data on the Open Web (WIRED)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 8
32 min

CISA pushes critical infrastructure to prepare for offline operations during cyberattacks. Questions grow over a shared U.S.-China AI threat. A Russian university is accused of feeding talent into GRU cyber units. Researchers warn poisoned data could quietly corrupt enterprise AI. LinkedIn faces a GDPR fight over monetizing user data. Millions downloaded fake Android call-history apps before Google pulled them. Dragos reports AI-assisted targeting of OT systems. A California man is sentenced in a $250 million crypto theft ring. Our guest is Asdrúbal Pichardo, CEO of Squalify, who wonders if banks are ready for worst-case cyber disruptions. A bandwidth bandit brakes bullet trains.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we are joined by Asdrúbal Pichardo, CEO of Squalify, sharing insights on “Are banks ready for worst-case cyber disruptions amidst geopolitical tensions?"
Selected Reading
New CISA initiative aims for critical infrastructure to operate offline during cyberattacks (The Record)
The U.S. and China Have a Common Foe. Hint: It’s Not the U.S.S.R. (New York Times)
Revealed: Russia’s top secret spy school teaching hacking and election meddling (The Guardian)
Poisoned truth: The quiet security threat inside enterprise AI (CSO Online)
Noyb cries foul on LinkedIn withholding profile visitor data (The Register)
Fake call logs, real payments: How CallPhantom tricks Android users (We Live Security)
AI in the Breach: How an Adversary Leveraged AI to Target a Water Utility’s OT (Dragos)
Polish intelligence warns hackers attacked water treatment control systems (The Record)
Crypto gang member gets 6.5 years for role in $230 million heist (Bleeping Computer)
Student hacked Taiwan high-speed rail to trigger emergency brakes (Bleeping Computer)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 7
27 min

CISA warns CopyFail is under active exploitation. Attackers compromise installers for a widely used disk imaging utility. MuddyWater masks cyberespionage as ransomware. Attackers spread malware through a fake OpenClaw plugin. Researchers ID a new Linux RAT. Vimeo blames a third party provider for a recent breach. Palo Alto’s Captive Portal is under attack. The FTC settles with a data broker over location sharing. A former Conti gang member gets jail time. Our guest is Dov Yoran, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI. Geotargeting turns creepy.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we are joined by Dov Yoran, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI.
Selected Reading
Attackers are cashing in on fresh 'CopyFail' Linux flaw (The Register)
Hackers compromise Daemon Tools in global supply-chain attack, researchers say (The Record)
Iranian APT Intrusion Masquerades as Chaos Ransomware Attack (SecurityWeek)
Malicious OpenClaw Skill Targets DeepSeek Agentic AI Workflows (Cyber Press)
Sophisticated Quasar Linux RAT Targets Software Developers (SecurityWeek)
ShinyHunters claims dump puts 119K Vimeo emails in the wild (The Register)
Palo Alto Networks warns of firewall RCE zero-day exploited in attacks (Bleeping Computer)
FTC bans data broker Kochava from selling sensitive location info (The Record)
Conti, Akira Affiliate Sentenced to 102 Months in Prison for Ransomware and Extortion Operations Targeting over 50 Organizations (TechNadu)
A college student is suing a dating app that allegedly used her TikTok videos to target men in her dormitory (CyberScoop)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 6
28 min

Brace for an AI-driven patch surge. Google fixes a critical Android flaw. Trellix confirms a source code breach. Apache Software Foundation ships urgent fixes. Data tied to Liberty Mutual leaks. CloudZ evolves to steal OTPs. Ouroboros persistence raises the stakes. A vishing suspect faces U.S. charges. Our guest is Markus Rauschecker, Executive Director for the University of Maryland Center for Cyber, Health and Hazard Strategies (CHHS), on the importance of the non-technical aspects of good cybersecurity preparedness and response. Our Threat Vector segment focuses on incident response. If you think UK age verification is working, I mustache you a question.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
Industry Voices
Markus Rauschecker, Executive Director for the University of Maryland Center for Cyber, Health and Hazard Strategies (CHHS), discussing the importance of the non-technical aspects of good cybersecurity preparedness and response. If you enjoyed this conversation check out the full interview here.
Threat Vector Segment
On this segment of Threat Vector by Palo Alto Networks, host David Moulton speaks with guest Steve Elovitz. In this conversation, Steve reflects on what two decades of incident response actually teaches you about the people on the other side of a breach. You can listen to the full conversation here, and catch new episodes of Threat Vector every Thursday on your favorite podcast app.
Selected Reading
NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave” (Infosecurity Magazine)
AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed (Infosecurity Magazine)
Critical Remote Code Execution Vulnerability Patched in Android (SecurityWeek)
Trellix Reveals Unauthorized Access to Source Code (Infosecurity Magazine)
Critical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP Server (SecurityWeek)
Everest Group Begins Leaking Alleged Liberty Mutual Data (GovInfo Security)
CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs (Bleeping Computer)
dMSA Ouroboros: Self-Sustaining Credential Extraction in Windows Server 2025 (Huntress)
Western District of North Carolina | Romanian National Appears in Federal Court Following Extradition from Romania on Bank Fraud Charges Stemming From “Vishing” Scheme (United States Department of Justice)
Kids can bypass some age checks with a drawn-on mustache (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 5
38 min

Progress Software urges customers to patch a critical MOVEit authentication bypass. Washington worries about limited access to advanced AI tools. Paid influencers promote pro-American AI. CISA warns Copy Fail is under active exploitation. The Canvas educational platform suffers a data breach. The Lazarus Group uses ClickFix to target high-value enterprise users. U.S. and Chinese authorities raid scam centers in Dubai. Monday Business Brief. On Afternoon Cyber Tea with Ann Johnson: Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security, joins Ann to discuss the accelerating pace of technology, AI, and global software dependencies. May the Fourth be with your firewall.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
Afternoon Cyber Tea
On this segment of Afternoon Cyber Tea with Ann Johnson: Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security, joins Ann to discuss how the accelerating pace of technology, AI, and global software dependencies are reshaping the cybersecurity landscape. To hear the full conversation, check out the episode and subscribe where you get your favorite podcasts to listen to past episodes. The show is going on hiatus. Stay tuned for the next chapter soon.
Selected Reading
Progress warns of critical MOVEit Automation auth bypass flaw (Bleeping Computer)
What Was Discussed at Google’s White House Meeting About A.I. (The New York Times)
US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems (SecurityWeek)
A Dark-Money Campaign Is Paying Influencers to Frame Chinese AI as a Threat (WIRED)
CISA says ‘Copy Fail’ flaw now exploited to root Linux systems (Bleeping Computer)
Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats (SecurityWeek)
Lazarus Targets macOS Users With New “Mach-O Man” Malware Kit (GB Hackers)
US, China partner on scam center takedown in Dubai (The Record)
Cloudsmith raises $72 million in Series C funding. (N2K Pro Business Briefing)
Microsoft for Startups (N2K Networks)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 4
24 min
![Kayla Williams: Not everything related to cybersecurity is a fire drill. [CISO] [Career Notes]](https://cdn-images.podbay.fm/eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1cmwiOiJodHRwczovL21lZ2FwaG9uZS5pbWdpeC5uZXQvcG9kY2FzdHMvZmY4MDA5YjYtNDU3OC0xMWYxLTg2NjEtZDMwMDFhNTZhZTM1L2ltYWdlLzkxMGFhZjE0OGM1ZmRmM2I5Zjg5MjA4YTkxZjE5ZGY0LnBuZz9peGxpYj1yYWlscy00LjMuMSZtYXgtdz0zMDAwJm1heC1oPTMwMDAmZml0PWNyb3AmYXV0bz1mb3JtYXQsY29tcHJlc3MiLCJmYWxsYmFjayI6Imh0dHBzOi8vaXMxLXNzbC5tenN0YXRpYy5jb20vaW1hZ2UvdGh1bWIvUG9kY2FzdHMyMTEvdjQvMWQvNjYvNmUvMWQ2NjZlYTEtM2E2MC0yZjA4LTVmMzMtMjg5YTlmZDJjNjE1L216YV8xMjc3Mjk2NDI1MTgwNTgzMTA0MC5qcGVnLzYwMHg2MDBiYi5qcGcifQ.itEDMBmqBXol61fza9doWLEY3DJ7oJWlh8StVeBij2E.jpg?width=200&height=200)
Please enjoy this encore of Career Notes.
Kayla Williams, CISO of Devo, sits down to share her story, from graduating with a finance degree to rising to where she is now. She quickly learned that finance was not for her and changed paths, working towards gaining an information security certificate. From there she was able to excel and was offered the opportunity to move to England which changed her life. Working in her new role, she really enjoys thriving with her team. She says "We really try to be the department of no problem versus the department of no." She mentions how her and her team work on a day to day basis together solving issues and yet she says not everything related to cybersecurity needs to be a fire drill. She would rather her and her team build bridges in the face of adversity and in the face of people who may be naysayers. We thank Kayla for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 3
10 min
![Double-edged threat. [Research Saturday]](https://cdn-images.podbay.fm/eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1cmwiOiJodHRwczovL21lZ2FwaG9uZS5pbWdpeC5uZXQvcG9kY2FzdHMvZWNiNzdhMDAtNDU3Ni0xMWYxLWE4ZmYtYjcxNmZmNmUwNzIyL2ltYWdlLzk1YjcyYTkzYzJmZmFmOGZmOTAwZDY2MmE5YmQzNzM1LnBuZz9peGxpYj1yYWlscy00LjMuMSZtYXgtdz0zMDAwJm1heC1oPTMwMDAmZml0PWNyb3AmYXV0bz1mb3JtYXQsY29tcHJlc3MiLCJmYWxsYmFjayI6Imh0dHBzOi8vaXMxLXNzbC5tenN0YXRpYy5jb20vaW1hZ2UvdGh1bWIvUG9kY2FzdHMyMTEvdjQvMWQvNjYvNmUvMWQ2NjZlYTEtM2E2MC0yZjA4LTVmMzMtMjg5YTlmZDJjNjE1L216YV8xMjc3Mjk2NDI1MTgwNTgzMTA0MC5qcGVnLzYwMHg2MDBiYi5qcGcifQ.44OxqlI5y_keebzkCqxcg4csurDd2k-LzSZbj_2s8IU.jpg?width=200&height=200)
Today we are joined by Justin Albrecht, Principal Researcher at Lookout, discussing "Attackers Wielding DarkSword Threaten iOS Users." DarkSword is a highly sophisticated iOS exploit chain discovered by Lookout that targets iPhones (iOS 18.4–18.6.2), enabling near zero-click compromise and rapid theft of sensitive data, including credentials and cryptocurrency wallet information.
Likely deployed by a Russia-linked threat actor (UNC6353) against Ukrainian users, it uses watering hole attacks on compromised websites and operates in a “hit-and-run” fashion—exfiltrating data within minutes before wiping traces. The campaign highlights a growing secondary market for advanced exploits, allowing financially motivated groups to access powerful tools once reserved for state actors, significantly expanding the mobile threat landscape.
The research and executive brief can be found here:
Attackers Wielding DarkSword Threaten iOS Users
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 2
2 min

Five Eyes agencies issue agentic AI guidance. A federal database leaks Social Security numbers. A stealthy worm poisons open source packages. OT firms are sidelined from frontier cyber models. The FBI warns of a surge in cyber-enabled cargo theft. Officials flag likely election interference as security programs face cuts. Researchers uncover a covert Python backdoor. Ubuntu’s site takes Iranian-linked DDoS fire. Cyber pros are sentenced in a ransomware case. Our guest is Andrew Carr, Global Head of Threat Management at Booz Allen, discussing how AI is accelerating cyberattacks. OpenAI joins the invitation-only club.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On today’s Industry Voices we are joined by Andrew Carr, Global Head of Threat Management at Booz Allen Hamilton, discussing how AI is accelerating cyberattacks and reshaping cybersecurity defenses. If you enjoyed this conversation be sure to check out the full interview here.
Selected Reading
Careful Adoption of Agentic AI Services (CISA)
Careful adoption of agentic AI services (Cyber.gov.au)
Medicare portal exposed health providers’ Social Security numbers (The Washington Post)
Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks (Developer)
OT Cybersecurity Frozen Out by Frontier Labs (OTToday)
FBI Warns of Surge in Hacker-Enabled Cargo Theft (SecurityWeek)
Breach Roundup: US Cyber Command Flags Election Threats (Gov Infosecurity)
Sophisticated Deep#Door Backdoor Enables Espionage, Disruption (SecurityWeek)
Pro-Iran group turns Ubuntu DDoS into shakedown (The Register)
Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware Sentenced to Prison (United States Department of Justice)
OpenAI locks GPT-5.5-Cyber behind velvet rope (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
May 1
30 min

A critical Linux flaw dubbed “Copy Fail” raises alarm. The House moves to extend Section 702. The White House pushes back on expanded Mythos access. cPanel and SonicWall rush out security patches. Researchers warn AI agents may leak credentials. Smishing targets key industries. Ukrainian police arrest suspects in a massive Roblox account theft scheme. Our guest is Jamie Moles, technical manager at ExtraHop, discussing how the pace of vibe coding is creating major AI blind spots. Honeypot hijinks get halted by curious clicks.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Our guest is Jamie Moles, technical manager at ExtraHop, discussing how the pace of vibe coding is creating major AI blind spots.
Selected Reading
Copy Fail (Copy.Fail)
House extends a controversial spy tool, but Senate path is unclear ahead of deadline (NPR)
White House Opposes Anthropic’s Plan to Expand Access to Mythos Model (WSJ)
Critical Authentication Vulnerability in cPanel and WHM (Beyond Machines)
Security Advisory: Firmware Update Required — Gen 6, Gen 7, and Gen 8 Firewalls (Sonic Wall)
Phishing the agent: Why AI guardrails aren’t enough (Okta)
Phoenix Rising: Exposing the PhaaS Kit Behind Global Mass Phishing Campaigns (Group-IB Blog)
Ukrainian police detain hackers suspected of stealing thousands of Roblox accounts for resale (The Record)
I accidentally made law enforcement shut down their stresser honeypot (lina's blog)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 30
30 min
Load more
