The CyberWire Daily Podcast is our look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry experts as well as our Academic and Research Partners. Each Friday, we provide the usual daily summary along with a look back at the news for the entire week. We publish each weekday afternoon (in time for US East Coast drive-time.)

You can subscribe to the CyberWire podcast RSS feed here and it's also available on iTunes.

The CyberWire podcasts are made possible by the generous support of our sponsors. For information on supporting the CyberWire or becoming a partner, please fill out the Contact Us form.

Subscribe to RSS
Available on iTunes
Listen to Stitcher
Google Play Music

The CyberWire Daily Podcast for 05.16.17

The developing story of the WannaCry pandemic continues to unfold, with speculation about attribution focusing on the Lazarus Group. Why malware would have a kill switch. Throwbacks to the worm wars. The risks of unpatched, superannuated, or pirated software. Litigation exposure in the WannaCry affair. Cyber Pearl Harbors, again—what might one actually look like?

In today's podcast we follow the developing story of the WannaCry pandemic as it continues to unfold, with speculation about attribution focusing on the Lazarus Group. Why malware would have a kill switch. Throwbacks to the worm wars. The risks of unpatched, superannuated, or pirated software. Litigation exposure in the WannaCry affair. David Dufour from Webroot on the basics of exploits and scripts. Paige Schaffer from Generali Global Assistance reviews the Identity Theft Assessment and Prediction Report published by the University of Texas at Austin Center for Identity. Cyber Pearl Harbors, again—what might one actually look like?

Recorded Future logo

Recorded Future

Get trending information on hackers, exploits, and vulnerabilities every day for FREE with the Recorded Future Cyber Daily. Sign up now.

E8 Security Logo

E8 Security

What the heck is behavioral analytics, anyway? At E8, we believe behavioral analytics is capable of providing insight into every stage of the attack lifecycle, across your network, users, and endpoints (even IoT!). You can check it out for yourself at http://e8security.com/joyride/.