
Waiting for their victims.
Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tac...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.

Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tac...

An update on Fancy Bear and its Drovorub rootkit. Karma Panda, a.k.a. CactusPete, is scouting Eastern European financial and military target...

NSA and FBI release a detailed report on a GRU toolset. North Korea's Operation Dream Job phishes in Israeli waters. CISA warns of COVID-19...

Regional rivals tussle in cyberspace, and governments have it out with dissidents and the opposition. Market penetration as an instrument of...

Belarus shuts down its Internet after its incumbent president's surprising, perhaps implausible, no...really implausible landslide reelectio...

The CyberWire's newest show is here - it's called Word Notes, and it just launched today with 10 binge-able episodes. Think of it as your au...

The US Office of the Director of National Intelligence has released an appreciation of the goals of election interference among three princi...

Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial se...

"Cyberbunker" refers to a criminal group that operated a "bulletproof" hosting facility out of an actual military bunker. "Bullet Proof" hos...

President Trump issues Executive Orders restricting TikTok and WeChat in the US. A Chinese APT has been active in industrial espionage again...

The US announces five new lines of effort for the Clean Network program, and none of them are exactly mash notes for Beijing. The US is also...

NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran's Oilrig...

The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to infl...

Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three yo...

Director of Security Engineering at Marketa and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the...

NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter...

An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and o...

Yesterday's antitrust hearings in the US House of Representatives focus on Big Tech's big data as something open to use in restraint of trad...

Alleged Russian influence operations described by US intelligence services. "Ghostwriter" targets the Baltic region with anti-NATO false nar...

Cloudflare says that reported Ukrainian breaches aren't its issue. Trend Micro describes a new and unusually capable strain of malware. Garm...

A vigilante appears to be interfering with Emotet's payloads. A fintech breach is blamed on a third-party service provider. A list of Cloudf...

Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little gi...

On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE...

CISA and NSA warn of a foreign threat to US critical infrastructure. A look at what the Bears have been up to lately. The Blackbaud extortio...

Twitter updates the news of last week's incident: the attackers seem to have accessed some direct messages. France's partial permission for...

"Meowing" is now a thing: the automated discovery and wiping of exposed and unprotected databases. The US indicts two Chinese nationals on e...

The Intelligence and Security Committee of Parliament has rendered its report on the Russian cyber threat. Trend Micro reports on the workin...

Notes on last week's Twitter hack, and on the allure of original gangster and other celebrity usernames. Using marketing databases for intel...

Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text...

Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some vict...

The Twitter hack is looking more like high-grade, low-end crime. It also worries people over the disinformation potential it suggests. Peopl...

Twitter sustained a major incident in which celebrity accounts were hijacked yesterday. It seems to have been a social engineering caper, bu...

A 2018 Presidential finding authorized extensive CIA cyber operations against Russia, China, Iran, and North Korea. Wattpad may have been br...

The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be beh...

President Trump says he authorized US Cyber Command's retaliation against Russia's Internet Research Agency for midterm election meddling. N...

Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert...

Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly....

Unpatched and beyond-end-of-life systems are (again) at risk. Conti ransomware appears to be steadily displacing its ancestor Ryuk in crimin...

Facebook takes down more coordinated inauthenticity. Preinstalled malware is found in discount phones available under the FCC's Lifeline pro...

The Natanz blast looks like traditional sabotage. CISA releases its strategy for securing industrial control systems. Authorities in Germany...

Explosions at Iranian nuclear sites remain unexplained, but look increasingly like conventional sabotage as opposed to cyberattacks. The Cos...

An Iranian nuclear installation may have been hacked. Or maybe not, but in any case it was damaged. Huawei gets more skeptical looks. Europe...

CEO Matt Devost, describes many firsts in his career, including hacking into systems on an aircraft carrier at sea. He shares how he enjoys...

Evil Corp seems to have been shuffling through some newspaper sites. Don't take the gangs' communiqués at face value, but some appear to be...

EvilQuest ransomware found in pirated versions of Little Snitch app. Out-of-band patches from Microsoft and Oracle. Extensive Chinese survei...

NSA and CISA agree: take Palo Alto's advisory about its PAN-OS operating system seriously. StrongPity is back and active against targets in...

The University of California San Francisco pays Netwalker extortionists nearly a million and a half to recover its data. A Kashmir utility r...

Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a...

A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux ser...

This is an extended interview of our conversation with Camille Stewart and Lauren Zabierek originally aired in our daily podcast 06/26/2020....