Avsnitt

  • Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.

  • In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

    In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
    Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
    Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

    You can learn more about Muddled Libra at
    https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

    Join the conversation on our social media channels:
    Website: ⁠https://www.paloaltonetworks.com/unit42⁠
    Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
    Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
    LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
    YouTube: ⁠@PaloAltoNetworksUnit42⁠
    Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    PALO ALTO NETWORKS
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

  • An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload & complexity. And Google's AI Throws Users a Malicious Bone.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation & tool streamlining, IT automation/automated patching, and tool overload & complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

    Selected Reading
    Millions of Americans caught up in Chinese hacking plot (BBC)
    US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
    CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
    St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
    Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
    The impact of compromised backups on ransomware outcomes (Sophos News)
    EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
    Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
    Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
    Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
    Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 

  • A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, shares trends in cloud-native security. To learn more, you can check out Sysdig’s 2024 Cloud-Native Security and Usage Report. 

    Selected Reading
    Top Python Developers Hacked in Sophisticated Supply Chain Attack (SecurityWeek)
    Russian hackers target German political parties with WineLoader malware (Bleeping Computer)
    Police Bust Multimillion-Dollar Holiday Fraud Gang (Infosecurity Magazine)
    Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own (SecurityWeek)
    Biden nominates first assistant defense secretary for cyber policy (Nextgov/FCW)
    Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force (The Record)
    StrelaStealer targeted over 100 organizations across the EU and US (Security Affairs)
    General Motors Quits Sharing Driving Behavior With Data Brokers (The New York Times)
    AI's Hippocratic Oath by Chinmayi Sharma (SSRN)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.

  • Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.
    In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    The research can be found here:
    HijackLoader Expands Techniques to Improve Defense Evasion

    And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
    Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.

  • Advanced wiper malware hits Ukraine. Nemesis gets dismantled. Apple deals with an unpatchable vulnerability. FortiGuard rises to the rescue. CISA and FBI join forces against DDoS attacks. US airlines data security and privacy policies are under review. Hackers hit thousands in Jacksonville Beach. Geoffrey Mattson, CEO of Xage Security  sits down to discuss CISA's 2024 JCDC priorities. And Hotel keycard locks can’t be that hard to crack.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Geoffrey Mattson, CEO of Xage Security, joins us to discuss CISA's 2024 JCDC priorities. You can connect with Geoff on LinkedIn and learn more about Xage Security on their website and read about the JCDC 2024 Priorities here. 
    Geoff’s interview first appeared on March 21st’s episode of T-Minus Space Daily. Check out T-Minus here. 

    Selected Reading
    Sandworm-linked group likely knocked down Ukrainian internet providers (The Record) 
    AcidPour wiper suspected to be used against Ukrainian telecom networks (SC Media)
    Never-before-seen data wiper may have been used by Russia against Ukraine (Ars Technica)
    AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine (SentinelOne)
    F5, ScreenConnect vulnerabilities leveraged in global Chinese cyberattacks (SC Media)
    Nemesis darknet marketplace raided in Germany-led operation (The Record)
    Unpatchable vulnerability in Apple chip leaks secret encryption keys (Ars Technica)
    Exploit Released For Critical Fortinet RCE Flaw: Patch Soon! (GBHackers on Security) 
    CISA & FBI Released Guide to Respond for DDoS Attacks (Cyber Security News) 
    CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques (CISA) 
    US airlines’ data security, privacy policies to be under federal review (SC Media) 
    Jacksonville Beach and other US municipalities report data breaches following cyberattacks (The Record) 
    Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds (WIRED)  

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 2 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. SummaryDr. Ursula Wilder (LinkedIn) joins Andrew (X; LinkedIn) to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. What You’ll LearnIntelligenceHow psychology can be useful to national securityHistorical examples of leadership analysis Leadership personality assessments & the Cuban Missile CrisisPsychoanalytic theory and espionage Reflections Human nature throughout historyHistory repeating itself And much, much more …Quotes of the Week“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.” – Dr. Ursula Wilder.Resources SURFACE SKIM*SpyCasts*Agent of Betrayal, FBI Spy Robert Hanssen with CBS’ Major Garrett and Friends (2023)The North Korean Defector with Former DPRK Agent Kim, Hyun Woo (2023)SPY@20 – “The Spy of the Century” with Curators Alexis and Andrew on Kim Philby (2022)“How Spies Think” – 10 Lessons in Intelligence with Sir David Omand (2020)*Beginner Resources*What is Psychoanalysis? Institute of Psychoanalysis, YouTube (2011) [3 min. video]Psychologists in the CIA, American Psychological Association (2002) [Short article]7 Reasons to Study Psychology, University of Toronto (n.d.) [Short article]DEEPER DIVEBooksFreud and Beyond, S. A. Mitchell (Basic Books, 2016)Narcissism and Politics: Dreams of Glory, J. M. Post (Cambridge University Press, 2014)The True Believer: Thoughts on the Nature of Mass Movements, E. Hoffer (Harper Perennial Modern Classics, 2010) Team of Rivals: The Political Genius of Abraham Lincoln, D. K. Goodwin (Simon & Schuster, 2004)Leaders, Fools, and Impostors: Essays on the Psychology of Leadership, M. F. R. Kets de Vries (iUniverse, 2003) Primary Sources Charles de Gaulle to Pamela Digby Churchill (1942) Blood, Toil, Tears and Sweat (1940)Memoirs of Ulysses S. Grant (1885)Gettysburg Address (1863) House Divided Speech (1858)Excerpt on Cleopatra from Plutarch's Life of Julius Caesar (ca. 2nd century AD)Plutarch’s The Life of Alexander (ca. 2nd century AD) Appian’s The Civil Wars (ca. 2nd century AD) Virgil’s The Aeneid (19 B.C.E) *Wildcard Resource*On Dreams by Sigmund Freud (1901)In this simplified version of the father of psychoanalysis’ seminal book The Interpretation of Dreams, you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you?

  • The House Unanimously Passes a Bill to Halt Sale of American Data to Foreign Foes. The U.S. Sanctions Russian Individuals and Entities for a Global Disinformation Campaign. China warns of cyber threats from foreign hacking groups. A logistics firm isolates its Canadian division after a cyber attack. Ivanti warns of another critical vulnerability. Researchers find hundreds of vulnerable Firebase instances. Microsoft phases out weaker encryption. Formula One fans fight phishing in the fast lane. Glassdoor is accused of adding real names to profiles without user consent. Our guest is Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface. And Pwn2Own winners take home their second Tesla. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface – especially as more companies implement AI. For more information, check out CrowdStrike’s 2024 Global Threat Report. 

    Selected Reading
    House unanimously passes bill to block data brokers from selling Americans’ info to foreign adversaries (The Record)
    Treasury Sanctions Actors Supporting Kremlin-Directed Malign Influence Efforts (US Treasury Department)
    China warns foreign hackers are infiltrating ‘hundreds’ of business and government networks (SCMP)
    International freight tech firm isolates Canada operations after cyberattack (The Record)
    Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution (Security Affairs)
    19 million plaintext passwords exposed by incorrectly configured Firebase instances (Malwarebytes)
    Microsoft deprecates 1024-bit Windows RSA keys — now would be a good time to get machine identity management in order (ITPro)
    Users ditch Glassdoor, stunned by site adding real names without consent (Ars Technica)
    Famous Spa GP F1 race comms hijacked by phishing scammers (Cyber Daily)
    Security Researchers Win Second Tesla At Pwn2Own (Infosecurity Magazine)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.

  • The White House Mobilizes a National Effort to Shield Water Systems from Cyber Threats and Announces Major Investment in U.S. Chip Manufacturing. The U.S. and Allies Issue Fresh Warnings on China's Volt Typhoon Cyber Threats to Critical Infrastructure. Microsoft Streamlines 365 Services with a Unified Cloud Domain. Ukrainian authorities take down a credential theft operation. LockBit claims another pharmaceutical company. A popular Wordpress plugin puts tens of thousands of websites at risk. A breach at Mintlify compromises GitHub tokens. An Idaho man pleads guilty to online extortion. The SEC fines firms for AI washing. We’ve got part two of our continuing Learning Layer series with Joe Carrigan and Sam Meisenberg logging Joe’s journey toward his CISSP certification.  And password stuffing Pokemon. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Join us as part two of the Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. On this episode, they continue to discuss Joe's journey to becoming a CISSP as well as discussing step one of Joe's study journey: the diagnostic assessment.

    Selected Reading
    White House Calls on States to Boost Cybersecurity in Water Sector (SecurityWeek)
    Five Eyes issue another China Volt Typhoon warning (The Register)
    Biden to Tout Government Investing $8.5 Billion in Intel's Computer Chip Plants in Four States (VoaNews)
    Microsoft Notifies DevOps Teams That Major Domain Change Is Coming (Cybersecurity News)
    Ukraine Arrests Hackers for Selling 100 Million Email, Instagram Accounts (Hack Read)
    Pharmaceutical development company investigating cyberattack after LockBit posting (The Record)
    WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack (GBHackers)
    Mintlify Confirms Data Breach Through Compromised GitHub Tokens (Hack Read)
    ‘Lifelock’ hacker pleads guilty to extorting medical clinics (The Record)
    What does 'AI Washing' mean? Firms Fined $400K by SEC for Exaggerated Statements (Cybersecurity News)
    Pokémon resets some users’ passwords after hacking attempts (TechCrunch)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

    In this episode of Threat Vector, we dive deep into the new SEC cybersecurity regulations that reshape how public companies handle cyber risks. Legal expert and Unit 42 Consultant Jacqueline Wudyka brings a unique perspective on the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. 
    Whether you're a cybersecurity professional, legal expert, or just keen on understanding the latest in cyber law, this episode is packed with insights and strategies for navigating this new terrain. Tune in to stay ahead in the world of cybersecurity compliance!
    If you're interested to learn more about Unit 42's world-class visit https://www.paloaltonetworks.com/unit42

    Join the conversation on our social media channels:


    Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



    Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



    Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



    LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



    YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



    Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠

  • A SIM-swapper faces prison and fines. Here come the class action suits against UnitedHealth Group. Aviation and Aerospace find themselves in the cyber crosshairs. A major mortgage lender suffers a major data breach. A look at election misinformation. The UK shares guidance on migrating SCADA systems to the cloud. Collaborative efforts to contain Smoke Loader. Trend Micro uncovers Earth Krahang. Troy Hunt weighs in on the alleged AT&T data breach. Ben Yelin unpacks the case between OpenAI and the New York Times. And fool me once, shame on you…
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Ben Yelin, Program Director at University of Maryland’s Center for Health and Homeland Security and cohost of our Caveat podcast, discusses the article on how “OpenAI says New York Times ‘hacked’ ChatGPT to build copyright lawsuit.”  

    Selected Reading
    District of New Jersey | Former Telecommunications Company Manager Admits Role in SIM Swapping Scheme (United States Department of Justice)
    Cash-Strapped Women's Clinic Sues UnitedHealth Over Attack (Gov Info Security)
    Nations Direct Mortgage Data Breach Impacts 83,000 Individuals (SecurityWeek)
    Preparing Society for AI-Driven Disinformation in the 2024 Election Cycle (SecurityWeek)
    NCSC Publishes Security Guidance for Cloud-Hosted SCADA (Infosecurity Magazine)
    Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor (Palo Alto Networks Unit 42)
    Prolific Chinese Threat Campaign Targets 100+ Victims (Infosecurity Magazine)
    Troy Hunt: Inside the Massive Alleged AT&T Data Breach (Troy Hunt)
    Kids’ Cartoons Get a Free Pass From YouTube’s Deepfake Disclosure Rules (WIRED)
    Ransomware Groups: Trust Us. Uh, Don't. (BankInfoSecurity)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.

  • Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district grapples with a ransomware attack. AT&T denies a data leak. Our guest Kevin Magee of Microsoft Canada shared his experiments with board reporting. And Apex Legends eSports competitors get some unexpected upgrades. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Our guest today is Kevin Magee of Microsoft Canada sharing his experiments using N2K’s CSO Rick Howard's forecasting methodology from his Cybersecurity First Principles book regarding board reporting. 

    Selected Reading
    US is still chasing down pieces of Chinese hacking operation, NSA official says (The Record)
    IMF Investigates Serious Cybersecurity Breach (Infosecurity Magazine)
    Tech giant Fujitsu says it was hacked, warns of data breach (TechCrunch)
    Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware (securonix)
    Ghana says repairs on subsea cables could take five weeks  (Reuters)
    Health care groups resist cybersecurity rules in wake of landmark breach (CyberScoop)
    Pennsylvania’s Scranton School District dealing with ransomware attack (The Record)
    AT&T says leaked data of 70 million people is not from its systems (BleepingComputer)
    The Aviation and Aerospace Sectors Face Skyrocketing Cyber Threats (Security Affairs)
    Massive ‘Apex Legends’ Hack Disrupts NA Finals, Raises Serious Security Concerns (Forbes)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

  • The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop their workforces to perform cybersecurity work, and it helps learners to explore cybersecurity work and to engage in appropriate learning activities to develop their knowledge and skills.
    On this Special Edition podcast, N2K CyberWire's Dave Bittner is joined by the team at NIST and FIU's Jack D. Gordon Institute for Public Policy to delve into the history of the NICE Framework through its latest update and looking into the future. Brian Fonseca, Director at the Jack D. Gordon Institute for Public Policy, shares an introduction to the NICE Framework. Karen Wetzel, NICE Framework Manager, discusses the updates to the framework. Rodney Petersen, Director of NICE, talks about what these updates mean to cybersecurity education's future.
    Resources:

    NICE Framework Resource Center

    Getting Started with the NICE Framework


    2024 NICE Conference and Expo: Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap

    Take advantage of the early bird pricing until March 19, 2024. Don’t miss out on this opportunity!


    Jack D. Gordon Institute for Public Policy at Florida International University (FIU)

    Veterans and First Responders Training Initiative

    Intelligence Fellowship


    And be sure to check out our live webinar: CISOs are the new Architects (of the Workforce)
    Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.

  • Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.

  • Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. 
    Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. 
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    The research can be found here:
    Phishception – SendGrid is abused to host phishing attacks impersonating itself

  • Russia’s accused of jamming a jet carrying the UK’s defense minister. Senators introduce a bipartisan Section 702 compromise bill. The Cybercrime Atlas initiative seeks to dismantle cybercrime. StopCrypt ransomware grows stealthier. A Scottish healthcare provider is under cyber attack. Workers in France are at risk of data exposure. CERT-BE warns of critical vulnerabilities in Arcserve UDP software. The FCC approves IoT device labeling. Researchers snoop on AI chat responses. A MITRE-Harris poll tracks citizens’ concern over critical infrastructure. On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann. The FTC fines notorious tech support scammers. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann.

    Coming this weekend
    Tune in to the CyberWire Daily Podcast feed on Sunday for a Special Edition podcast we produced in collaboration with our partners at NICE, “Unveiling the updated NICE Framework & cybersecurity education’s future.” We delve into the history of the NICE Framework, dig into its latest update, and look into the future of cybersecurity education.

    Selected Reading
    Defence Secretary jet hit by an electronic warfare attack in Poland (Security Affairs)
    Russia believed to have jammed signal on UK defence minister's plane - source (Reuters)
    Senators propose a compromise over hot-button Section 702 renewal (The Record)
    WEF effort to disrupt cybercrime moves into operations phase (The Register)
    StopCrypt: Most widely distributed ransomware now evades detection (Bleeping Computer)
    Scottish health service says ‘focused and ongoing cyber attack’ may disrupt services (The Record)
    Massive Data Breach Exposes Info of 43 Million French Workers (Hack Read)
    WARNING: THREE VULNERABILITIES IN ARCSERVE UDP SOFTWARE DEMAND URGENT ACTION, PATCH IMMEDIATELY! (certbe)
    FCC approves cybersecurity label for consumer devices  (CyberScoop)
    Hackers can read private AI-assistant chats even though they’re encrypted  (Ars Technica)
    MITRE-Harris poll reveals US public's concerns over critical infrastructure and perceived risks  (Industrial Cyber)
    Tech Support Firms Agree to $26M FTC Settlement Over Fake Services (SecurityWeek)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.