skip navigation
Subscribe to the CyberWire Email RSS Stitcher Google Play Music
Daily Briefing 2.21.19

Soldiers overshare. Separ quietly lives off the land. Questionable disclosure of Vkontakte bug. NSCS dances with Huawei.

Daily Podcast 2.21.19

Hybrid war and tactical influence operations. Separ lives off the land. NoRelationship attacks get past email filters. Responsible disclosure. Man-in-the-room bug. Ship hacking. Password managers.

Supported by ExtraHop and Akamai.
ExtraHop Logo Akamai Logo
Hacking Humans 2.21.19

We've got followup from a listener on cognitive dissonance and behavioral science. Dave shares a listener story about a University Dean's List scam. Joe shares statistics from a government agency phishing test. Our catch of the day involves funds from the FBI, the IMF, and yes, Nigeria. Dave interviews Crane Hassold from Agari with phishing trends...

Supported by KnowBe4
The Challenges of Authentication at Scale and Quantifying Risk
Levi Gundert, Recorded Future’s vice president of intelligence and risk, discusses Insikt Group research, what it means to be an ethical hacker, and more.
Research Saturday 2.16.19

Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil & gas facilities, NGOs, telecoms and IT firms. Al Cooley is director of product management at Symantec, and he joins us to share their findings.

Supported by Juniper Networds and Enveil
Week that Was 2.16.19

An espionage indictment, with mention of target packages. AI Executive Order. Defending forward. Industry notes.

Recent Stories

Featured Stories

The Value Proposition of Finished Intelligence
David Carver explains the best ways to define finished intelligence and shares practical insights based on his experience collaborating with customers.
Cosmic AES Signals and Space, February 2019
US National Intelligence Strategy. Space competition. Emerging technologies. Space Force. Procurement and prototypes. Industry notes.
Making the business case for privacy. — Special Edition

In this CyberWire special edition, our guest is Cisco’s Chief Privacy Officer Michelle Dennedy. We discuss what exactly a chief privacy officer does at a global organization like Cisco, why she thinks we’re in the early stages of a privacy revolution...

Supported by Cylance
CyberWire-X 1.30.19

In the final episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we examine some of the game changing high profile breaches like Yahoo, Equifax and OPM, along with their impacts and lessons learned. Our guest is Dr. Christopher Pierson, CEO and founder of BlackCloak.

Supported by Gemalto
5th Annual Women in Cyber Security Reception
The CyberWire is pleased to present the 5th Annual Women in Cyber Security Reception on Thursday, October 18, 2018, in Washington, DC.
Sophia d'Antoine — asm2vec: Binary Learning for Vulnerability Discovery
This talk will present a novel application of a machine learning model and a corresponding tool, asm2vec, for vulnerability discovery. Treating both program disassembly as a natural language, we construct embeddings of identifiers at scale using a concept similar to word2vec, in which the output is a vector of related identifiers and their proximity.

Sponsored Events

Are you holding an event? Feature it here! Contact us!

Support the CyberWire

Organizations from across the globe are invited to support the CyberWire Daily News Brief (news sponsors and event sponsors), or Daily Podcast through programming sponsorship.

For details on how to become a sponsor, please fill out the Contact Us form.

Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story.

Become a patron


If you like the CyberWire and think others would too, we'd appreciate it if you would spread the word!