Unified combatant command of the United States Armed Forces responsible for cyber operations
POPULARITY
Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Governments brace for cyber fallout from Iran. BeatBanker spreads via a fake Starlink app. InstallFix targets developers. ZombieZIP hides malware in archives. And DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yelin unpacks Anthropic's lawsuit against the Pentagon. AI eyewear leads to awkward exposures. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies and Caveat cohost talking about Anthropic suing the Pentagon. You can read more on the topic here. Selected Reading Senate approves Joshua Rudd as dual-hat leader of Cyber Command, NSA (POLITICO) Whistleblower claims ex-DOGE member says he took Social Security data to new job (Washington Post) Microsoft Patches 83 Vulnerabilities (SecurityWeek) Adobe Patches 80 Vulnerabilities Across Eight Products (SecurityWeek) Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities (SecurityWeek) ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric (SecurityWeek) Iran war will bring wave of 'low-level cyber activity,' says intelligence group (StateScoop) New BeatBanker Android malware poses as Starlink app to hijack devices (Bleeping Computer) Fake Claude Code install guides push infostealers in InstallFix attacks (Bleeping Computer) New 'Zombie ZIP' technique lets malware slip past security tools (Bleeping Computer) DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal' Orders (WIRED) Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage (TechCrunch) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Rogan & Bannon Question Iran. Ignorant Outrage Over Troops Steak & Lobster. Hegseth to Approve All Hegseth Photos. Drones: “The Factory is the Weapon”. Ray Lewis Mad. Italy Stuns US. Adebayo's 83! On this Wartime Wednesday episode of Independent Americans, host Paul Rieckhoff takes you inside the rapidly escalating war in Iran, what it really means for troops and families, and why 76% of Americans now oppose it. From a deadly U.S. strike on an Iranian school and new Pentagon revelations, to drone warfare, Cyber Command leadership, the Strait of Hormuz, and the viral Heath “lobster and steak” for Troops outrage, Paul breaks down the stories everyone should be tracking—but most news and politics shows are missing. Because we didn't just start covering national security and war when the war with Iran started. We focus on it always. And this is one of the few shows out there hosted by a combat veteran who gets it. You'll also hear about wounded soldiers returning from the Middle East and speaking out, why cheap drones are the top threat of this war, and how America is still not ready enough at home or abroad. Paul hits veterans' benefits battles in Congress, the candidacy of retired General Sean Harris in Marjorie Taylor Greene's open Congressional seat in Georgia, and why independents remain the needle in American politics—plus culture and sports updates from Miley's Hannah Montana return to the World Baseball Classic, the USA at the Paralympics, and NFL legends Ed Reed and Ray Lewis pushing back on Trump's war propaganda. -WATCH full video of this episode here. -Learn more about Paul's work to elect a new generation of independent leaders with Independent Veterans of America. -Learn more about American Veterans for Ukraine here. -Learn more about The Headstrong Project for Veterans, Tragedy Assistance Program for Survivors (TAPS), and Department of Veterans Affairs resources in your area. Seeking support is not a sign of weakness. It's a show of strength. If you or a loved one are in immediate crisis, dial 988 and press 1, or text 838255. Connect with Independent Americans: Subscribe on YouTube, Spotify, Apple Podcasts, and all podcast platforms Read more at Substack Support ad-free episodes at Patreon Connect: Instagram • X/Twitter • BlueSky • Facebook Follow on social: @PaulRieckhoff on X, Instagram, Threads, and Bluesky -Join the movement. Hook into our exclusive Patreon community of Independent Americans. Get extra content, connect with guests, meet other Independent Americans, attend events, get merch discounts, and support this show that speaks truth to power. -And get cool IA and Righteous hats, t-shirts and other merch now in time for the new year. Independent Americans is powered by veteran-owned and led Righteous Media. And now part of the BLEAV network! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
On this week's show, Patrick Gray, Adam Boileau and James WIlson discuss the week's cybersecurity news. They cover: The Coruna exploits were L3 Harris, but it seems Triangulation… was not! Iran's cyber HQ hit by Israeli (kinetic) strikes Trump's cyber “strategy” is … well, all we've got is jokes cause there's no serious content NSA and CyberCom finally get a leader after Lt Gen Joshua Rudd gets Senate nod DOGE (remember them?!) employee walked a social security database out on a USB stick This episode is sponsored by open source cloud security scanner Prowler. Creator and CEO Toni de la Fuente talks to Pat about some of the enterprise features Prowler is growing, while remaining true to its open source roots. This episode is also available on Youtube. Show notes Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript GitHub - matteyeux/coruna: deobfuscated JS and blobs US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine APT36: A Nightmare of Vibeware State-linked actors targeted US networks in lead-up to Iran war Iranian cyber warfare HQ allegedly hit by Israel Last 2 names of 6 US soldiers who died in Kuwait attack identified by the Pentagon Signal, WhatsApp users face Russian phishing push, Dutch warn Samuel Bendett on X: "Russian military told it couldn't use Telegram messaging app" FBI investigating ‘suspicious' cyber activities on critical surveillance network Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime President Trump's CYBER STRATEGY for America Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens UK plans to shift fraud fight onto telecoms, tech companies Trump to hit Anthropic with executive order to remove "woke" AI Claude Anthropic launches code review tool to check flood of AI-generated code CrowdStrike reports record quarter amid investor concerns about AI impact Critical defect in Java security engine poses serious downstream security risks Gen. Joshua Rudd confirmed as NSA, Cyber Command head Plankey's nomination as CISA director now in jeopardy DOGE employee stole Social Security data and put it on a thumb drive, report says Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel Cel mai mare exportator român de carne, deținătorul brandului Cocorico, a intrat în restructurări, alături de Casa de Insolvență Transilvania
Anthropic's $50 billion commitment for data-center construction projects in New York and Texas still made it on a list of investments the Trump White House said it helped secure, despite an ongoing feud between the company and the U.S. government. That tally, which was posted in a release online Sunday and emailed Monday, listed Anthropic's commitment among dozens of other private-sector investments related to American manufacturing, energy, and AI infrastructure projects that companies have announced during President Donald Trump's second term. Other investments on that list include those from Apple, Meta, Nvidia and Amazon. Anthropic's inclusion comes after a disagreement between the AI company and the Pentagon over guardrails for using its technology culminated in a governmentwide ban against the company and the DOD's determination that it's a “supply-chain risk.” Ironically, the White House release introduces the list with a statement that companies are moving to “strengthen domestic supply chains,” among other things. FedScoop contacted spokespeople at the White House and Anthropic, but neither provided comment before publication of this story. Anthropic's partner on the project, Fluidstack, didn't respond to a FedScoop request for comment. The Senate on Tuesday voted to confirm Army Lt. Gen. Joshua Rudd as commander of U.S. Cyber Command and director of the NSA, ending nearly a year of leadership uncertainty at the agencies and putting a new chief at the helm amid an ongoing war with Iran. Rudd, who previously served as deputy commander of U.S. Indo-Pacific Command and worked in the special operations community, was nominated in December by President Donald Trump for the dual-hat role of Cybercom and NSA boss, despite having a limited cyber background. In April 2025, the Trump administration fired Air Force Gen. Timothy Haugh as head of those organizations without providing a public explanation. Since then, Cybercom and NSA have been led by Army Lt. Gen. William Hartman, who stepped in as acting director. Hartman was ultimately passed over to hold the roles on a Senate-confirmed basis. Rudd, who will pin on his fourth star following his confirmation, is entering the job as Cybercom supports U.S. military action against Iran during Operation Epic Fury. The command also played a support role in Operation Midnight Hammer against Iran last year and Operation Absolute Resolve in Venezuela in January, which included the capture of Venezuelan leader Nicolas Maduro in Caracas. In addition to assisting other combatant commands and the joint force, the organization is tasked with conducting so-called “hunt forward” operations on overseas networks, defending the Department of Defense Information Network (DODIN), and bolstering America's ability to resist and respond to cyberattacks. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
NSA and Cyber Command head confirmed Russians targeting encrypted messaging app users OpenAI rolls out vulnerability scanner Get links to all the stories in our show notes: https://cisoseries.com/cybersecurity-news-march-11-2026/ Huge thanks to our sponsor, Dropzone AI Remember yesterday's 3 AM threat intel? Here is how it plays out with Dropzone AI. The intelligence drops. Dropzone picks it up, turns it into a threat hunt, and runs it across your SIEM, EDR, and cloud data while your team sleeps. By morning, your analysts have answers, not a backlog. That is the AI Threat Hunter, the newest agent on the team, debuting at RSAC. Booth 455, South Expo Hall. dropzone.ai/rsa-2026-ai-diner
White House Press Secretary Karoline Leavitt says the recent increase in oil and gas prices is temporary and the prices will drop rapidly once the objectives of the U.S. and Israeli attacks on Iran are achieved; Sen. Richard Blumenthal (D-CT) says after a classified briefing on the Iran war the Trump Administration is on a path towards putting U.S. troops on the ground in Iran; Defense Secretary Pete Hegseth in a morning briefing says today will be the 'most intense day of strikes' in the war; Senate confirms U.S. Army Lt. Gen. Joshua Rudd to lead the National Security Agency and the U.S. Cyber Command; Senate Majority Leader John Thune (R-SD) is asked about President Donald Trump's demand to make passage of a mandatory voter ID bill the top priority; Gov. Tim Walz (D-MN) unveils a proposal to overhaul the delivery of programs like Medicaid, which have been the subject of federal fraud investigations. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Economic Club of Minnesota welcomed retired General Paul Nakasone, former head of U.S. Cyber Command and the National Security Agency, for a conversation that was equal parts sobering and inspiring. Nakasone opened with a stark reality check: unlike physical borders that can be patrolled and defended, cyberspace offers no natural boundaries. There are no oceans, no walls, no checkpoints standing between America's critical systems and those who wish to disrupt them. The threat is constant, it is evolving, and it arrives without warning. So, what separates the United States from its adversaries in this invisible battleground? According to Nakasone, the answer isn't hardware or budget, it's people. Talent is the decisive advantage. The nations that invest in developing skilled, thoughtful, principled individuals will be the ones that prevail in the conflicts of the 21st century. That leads to perhaps the most grounding message of his remarks: national security begins at home, and it begins with the individual. Security isn't just a government function or a Pentagon priority, it's a shared responsibility that starts with each of us, in our communities, our organizations, and our daily choices. For young people entering the workforce, Nakasone's prescription was refreshingly timeless. Three things matter above all else: the ability to think critically, the ability to communicate clearly, and good character. In an era dazzled by technical credentials and AI-powered tools, a general who spent decades at the intersection of intelligence and technology made the case that these enduring human qualities remain the foundation of everything. It was a powerful reminder that the most sophisticated cyber defense in the world still runs on people and that building those people starts now.
The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle. Show notes Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
Gottumukkala ousted as CISA Director Ron Wyden blocks Rudd confirmation to lead Cyber Command, NSA Hackers Weaponize Claude Code in Mexican government cyberattack Get the show notes here: https://cisoseries.com/cybersecurity-news-gottumukkala-ousted-wyden-blocks-rudd-hackers-weaponize-claude/ Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Deepfakes aren't science fiction anymore; they're a daily threat. Quick tip: if your voicemail greeting is your real voice, switch it to the default robot voice. A few seconds of audio can be enough to clone you. Adaptive helps teams spot and stop these AI-powered social engineering attacks. Learn more at adaptivesecurity.com.
Democratic Senator Ron Wyden is blocking the Trump administration's nominee to lead both U.S. Cyber Command and the National Security Agency. Wyden says that Lieutenant General Joshua Rudd, who currently serves as the deputy commander of U.S. Indo-Pacific Command, lacks the experience needed to immediately step into the dual leadership role. The lawmaker added that when it comes to U.S. cybersecurity, “there is simply no time for on-the-job learning, the threat is just too urgent for that.” See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
On this episode of The Cybersecurity Defenders Podcast, we speak with Chris Cochran, Field CISO & Vice President of AI Security at SANS Institute, about how to navigate the future of AI risk and security strategyChris works at the intersection of cyber defense, AI safety, and emerging risk, where the threats are converging and the playbooks are still being written. His career has taken him from the Marine Corps to NSA, U.S. Cyber Command, the U.S. House of Representatives, Mandiant, and Netflix. Across every role, one throughline: understanding adversaries, building high-trust teams, and translating complex problems into strategies leaders can act on.Today, Chris advises organizations, governments, and research institutions on AI governance, agentic threat preparedness, and unifying safety and security into a single discipline. He contributes to global standards efforts including the EU AI Act (via OWASP AI) and leads executive education on cybersecurity and AI strategy at SANS.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io
On this episode of America at Night with McGraw Milhaven, Andrew Eborn, high-profile British barrister, broadcaster, and President of Octopus TV, broke down the arrest of Prince Andrew, explaining the legal implications, political fallout in the U.K., and why the case is reverberating far beyond the royal family. Next, veteran international sports journalist and Olympic expert Brian Pinelli joined McGraw to preview the Olympic Games, discussing global tensions, athlete safety, and how politics and international conflicts are shaping this year's competition. Finally, Admiral Michael Rogers (Ret.), former Director of the NSA and Commander of U.S. Cyber Command, sounded the alarm on GPS grid vulnerabilities, warning how cyber threats and foreign adversaries could disrupt navigation, communications, and critical infrastructure—and what the U.S. must do to protect these systems. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Summary: In this episode of the GovDiscovery AI podcast, General Matthew Glavy discusses the critical need for a dedicated Cyber Force in the U.S. military, emphasizing the challenges posed by adversaries like China. He outlines the importance of logistics, structure, and the lessons learned from allies and U.S. Cyber Command. The conversation also delves into the role of AI in cybersecurity, the current status of discussions around the Cyber Force, and the significance of open source intelligence. General Glavy shares insights on the defense industrial base's innovation and the lessons learned from Ukraine's defense strategy, concluding with a call for continuous improvement and adaptation in the face of evolving threats. Keywords: Cyber Force, AI, Cyber Command, Defense Innovation, Open Source Intelligence, National Security, Military Strategy, Ukraine Defense, Cybersecurity, Technology in Defense Links: https://www.csis.org/programs/strategic-technologies-program/projects/commission-us-cyber-force-generation https://govdiscoveryai.com/
The former head of one of the government's most secret agencies, the National Security Agency, and the former Commander of U.S. Cyber Command, General Paul Nakasone (ret.) sits down with State Secrets to talk about the things he wishes every American knew when it comes to today's cyber threats.
We need to stop treating our data like something to be stored and more like a mission critical supply lines.Andrew Schoka spent his military career in offensive cyber, including stints in the Joint Operations Command and Cyber Command. Now he's building Hardshell to solve a problem most organizations don't even realize they have yet.Here's the thing: AI is phenomenal at solving problems in places where data is incredibly sensitive. Healthcare, financial services, defense—these are exactly where AI could make the biggest impact. But there's a problem.Your ML models have a funny habit of remembering training data exactly how it went in. Then regurgitating it. Which is great until it's someone's medical records or financial information or classified intelligence.Andrew makes a crucial point: organizations still think of data as a byproduct of operations—something that goes into folders and filing cabinets. But with machine learning, data isn't a byproduct anymore. It's a critical supply line operating at speed and scale.The question isn't whether your models will be targeted. It's whether you're protecting the data they train and interpret like the supply lines they actually are.Mentioned: Destruction of classified tech in downed helicopter during Osama bin Laden raid
The Coast Guard has a new leader. Admiral Kevin Lunday officially assumed command of the service on Thursday during a ceremony at Coast Guard headquarters. The Senate confirmed Lunday last month after his nomination was temporarily delayed due to a controversy over the service's policy regarding hate symbols. He had been serving as acting commandant since January, following the dismissal of Admiral Linda Fagan by President Donald Trump. Lunday previously led Coast Guard Cyber Command. He also held a senior leadership role at U.S. Cyber Command.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. Find the stories behind the headlines at CISOseries.com.
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Selected Reading Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record) Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer) New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record) 'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek) New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer) Amazon blocked 1,800 suspected DPRK job applicants (The Register) CISA Releases Nine Industrial Control Systems Advisories (CISA.gov) U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop) US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine) Riot Games found a motherboard security flaw that helps PC cheaters (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In the final show of 2025, Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela's state oil firm gets ransomware'd, blames US… but what if it really is a US cyber op?! Russian junk-hacktivist gets indicted for cybering critical… err… a car wash and a fountain Microsoft finally turns RC4 off by default in Active Directory Kerberos Traefik's TLS verify=on … turns it off, whoopsie
Alpha Warrior and Josh Reid take viewers deep into the digital battlefield, breaking down Trump's sudden flood of reposts to patriot accounts, the White House sharing Alpha's viral “Seditious Six” video, and General Flynn's message that the future hinges on Americans using their collective voice. They connect key Q-post timestamps, Trump's Truth Social cues, and Melania's symbolic Christmas imagery to show how public engagement and information warfare now shape political outcomes. The hosts lay out why civic pressure, not passive spectatorship, is driving major shifts, from Cyber Command's reported strike on Serbian servers to Trump's push for paper ballots and tariff-driven tax reform. They call out psychological operations aimed at dividing MAGA, confront Alexander Vindman's claim that troops should disobey Trump, and explain how unified messaging can overwhelm institutional power. With D5 approaching and a major Oval Office announcement imminent, Alpha and Josh underscore that this moment belongs to citizens willing to act, coordinate, and push the system where it must go.
The EPA approved two new PFAS-containing pesticides for food crops and plans four more. Scientists warn this deliberately increases dietaryexposure to persistent chemicals linked to cancer and birth defects.A magician who implanted an RFID chip in his hand for stage tricks forgot the password and is now permanently locked out of the device inside his own body. Perhaps he should have had the password tattooed backwards on his forehead.A fired Ohio contractor plead guilty to resetting 2,500 coworker passwords via PowerShell, paralyzing the company and causing $862,000 in damages. We're thinking this will keep him fired for quite a whileMI5 warns MPs that Chinese state agents are aggressively targeting lawmakers and staff through fake recruiter profiles on LinkedIn to cultivate intelligence sources. LinkedIn is not the friend it once was.NordPass data confirms Gen Z now chooses weaker passwords than 80-year-olds, proving every generation remains terrible at basic security hygiene. Wait… Your password is worse than your grand mothers? Please subscribe to this podcastProminent cryptographer accuses NSA of rigging IETF process to force adoption of deliberately weakened post-quantum encryption standards despite community objections. That could explain some of the very trivial ways some of these encryption algos have been broken lately.Microsoft's new Copilot Actions can autonomously edit user files but openly warns it's vulnerable to hijacking that enables data theft or malware installation. Sweet, right?U.S. Cyber Command quietly awarded millions to a stealth startup building fully autonomous AI agents designed for large-scale offensive cyberattacks. The twist is that they are not writing code to help AI help people, in this case it's code to help AI. Why bother with the slow middle man?Researchers unveiled EchoGram, a subtle token trick that silently disables safety guardrails on GPT-4, Claude, Gemini, and nearly every major LLM. Guardrails. Great concept, but not so much in practice.
EP 268The US Environmental Protection Agency (EPA) approves PFAS-containing pesticides for everyday food crops, opening a new pathway for “forever chemicals” to reach dinner plates.A magician who implanted an RFID chip in his hand for performances discovers the ultimate trick: he's permanently locked out by his own forgotten password. He must not be Gen XFired Ohio contractor pleads guilty to crippling his former employer's network with a single script, causing $862,000 in damage, chaos for thousands of workers, but he might get free room and board out of it for the next 10 yearsMI5 warns parliamentarians that Chinese state agents are systematically targeting them through fake recruiter profiles on LinkedIn. Now Parliamentarians can be just like the rest of us!NordPass data reveals Gen Z now picks even weaker passwords than 80-year-olds, proving humanity will never get the secure password thing right.A leading cryptographer accuses the NSA of orchestrating a quiet IETF takeover to force through deliberately weakened post-quantum encryption standards.Microsoft's new Copilot Actions can autonomously manage your files-yet the company admits it can be tricked into stealing data or installing malware. Oh, yes. We all want that.U.S. Cyber Command quietly funds a stealth AI startup to build autonomous systems capable of executing large-scale offensive cyberattacks.HiddenLayer researchers expose a subtle token-sequence attack that silently bypasses safety guardrails on GPT-4, Claude, Gemini, and nearly every major LLM.C'mon, put your dentures in and let's see if we can come up with a password better than your Gran.Find the full transcript of this podcast here.
In this episode, we explore how national defence changes when society itself becomes digital. Mikk Tikk, Deputy Commander of the Estonian Defence Forces Cyber Command and lead mentor at NATO DIANA, explains why cyber security protects a way of life rather than just infrastructure. He outlines how redundancy, joint exercises, and close cooperation with the private sector shape modern defence, why Cyber Command must be ready to operate without the internet, and how innovation, from AI to drones and space-based networks, is redefining both threats and capabilities.
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy's state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis of the T-Minus Space Daily show sits down with Lt. General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. Selected Reading Cyber Command Taps Reid Novotny as New AI Chief (MeriTalk) UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers (Fortra) Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day (SecurityWeek) Salesforce alerts customers of data breach traced to a supply chain partner (CXOtoday) Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack (Security Affairs) SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance (SecurityWeek) Four charged with plotting to sneak Nvidia chips into China (The Register) SEC voluntarily dismisses SolarWinds lawsuit (The Record) NSO Group argues WhatsApp injunction threatens existence, future U.S. government work (CyberScoop) Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models (Arxiv) Freesound Music Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
U.S. Cyber Command has a new chief artificial intelligence officer. Brig. Gen. Reid Novotny, who was tapped to serve in the role, said his priority will be ensuring that AI strengthens the nation's cyber forces and improves decision-making advantage. Novotny previously served as the National Guard Bureau's director of intelligence and cyber effects operations and most recently as the Office of the National Cyber Director's senior military policy adviser. Novotny steps into the role amid leadership turnover and other turmoil at the military's top cyber enterprise.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Cipher Brief CEO & Publisher Suzanne Kelly talks with two former directors of the National Security Agency and former Commanders of U.S. Cyber Command about the cyber threat from China, and just what they think Americans need to know. Retired General Tim Haugh – a new Cipher Brief Expert, spoke recently about the threat with 60 Minutes. He is now also working with investors and teaching at Yale University. And retired General Paul Nakasone is the founding director of the Institute for National Security at Vanderbilt University. Both men have a serious warning for America.
Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vulnerability in the Monsta FTP web-based file management tool. The Landfall espionage campaign targets Samsung Galaxy devices in the Middle East. Five Eyes partners fret eroding cooperation on counterintelligence and counterterrorism. Israeli spyware maker NSO Group names the former U.S. ambassador to Israel as its new executive chairman. Monday Biz Roundup. Tim Starks from CyberScoop discusses uncertainty in the federal Cyber Corp program, The friendly face of digital villainy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing uncertainty in the federal Cyber Corp program. Selected Reading Cyber information sharing law would get extension under shutdown deal bill (CyberScoop) Don't call it Cyber Command 2.0: Master plan for digital forces will take years to implement (The Record) North Korean hackers hijack Google, KakaoTalk accounts to control South Korean phones: Report (The Straits Times) EU set to water down landmark AI act after Big Tech pressure (The Financial Times) Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover (Hackread) Newly identified Android spyware appears to be from a commercial vendor (The Record) F.B.I. Director Is Said to Have Made a Pledge to Head of MI5, Then Broken It (The New York Times) Seeking to get off US blacklist, spyware firm NSO taps ex-envoy Friedman as chairman (The Times of Israel) Google's Wiz acquisition clears DOJ's antitrust review. (The Cyberwire) Tank interview: A hacking kingpin reveals all to the BBC (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of the Autonomous IT, host Landon Miles dives deep into the world of vulnerabilities, exploits, and the psychology behind cyberattacks. From the story of Log4j and its massive global impact to the difference between hackers and attackers, this episode explores how and why breaches happen—and what can be done to stop them.Joining Landon is Jason Kikta, Chief Technology Officer and Chief Information Security Officer at Automox, Marine Corps veteran, and former leader at U.S. Cyber Command. Together, they break down attacker motivations, how to recognize threat patterns, and why understanding your own network better than your adversaries is the key to effective defense.Key Takeaways:The five stages of a vulnerability: introduction, discovery, disclosure, exploitation, and patching.Why Log4j became one of the most devastating vulnerabilities in modern history.How to identify attacker types and motivations.The mindset and methodology of effective defense.Why “good IT starts with good security.”Whether you're a cybersecurity professional, IT leader, or just curious about how cyberattacks really work, this episode offers practical insights from the front lines of digital defense.
TwelveLabs is building purpose-built foundation models for video understanding, enabling enterprises to index, search, and analyze petabytes of video content at scale. Founded by three technical co-founders who met in South Korea's Cyber Command doing multimodal video understanding research, the company recognized early that video requires fundamentally different infrastructure than text or image AI. Now achieving 10x revenue growth and serving customers across media, entertainment, sports, advertising, and federal agencies, TwelveLabs is proving that category creation through extreme focus beats trend chasing. In this episode, Jae Lee shares how the company navigated early product decisions, built specialized GTM motions for established industries, and maintained technical conviction during years of building in relative obscurity. Topics Discussed: How military research in multimodal video understanding led to founding TwelveLabs in 2020 The technical thesis: why video deserves purpose-built foundation models and inference infrastructure Targeting video-centric industries where ROI justifies early-stage pricing: media, entertainment, sports, advertising, and defense Partnership-driven distribution strategy and AWS Bedrock integration results Specialized sales approach: generalist leaders, vertical-specific AEs and solutions architects Maintaining extreme focus and avoiding hype cycles during the first three years of building Federal GTM lessons: why In-Q-Tel partnership and authentic mission alignment matter more than process optimization The discipline of saying no to large opportunities that don't fit ICP Keeping hiring bars high when the entire team is underwater GTM Lessons For B2B Founders: Hire vertical specialists on the front lines, not just at the top: TwelveLabs structures its GTM team with generalist leaders (head of GTM and VP of Revenue) who can sell any technology, but vertical-specialized AEs, solutions architects, and deployment engineers. These front-line team members come directly from the four target industries and understand customer workflows, buying patterns, and integration points without ramp time. For founders entering mature markets with established tech stacks and complex procurement, this inverted model—generalist strategy, specialist execution—accelerates deal velocity because technical buyers immediately recognize domain fluency. Infrastructure plays require integration partnerships, not displacement: In established industries with layered technology stacks, positioning as foundational infrastructure demands partnership-first distribution. Jae explained their approach: integration with media-specific GSIs, media asset management platforms, and cloud providers ensures TwelveLabs fits into existing workflows rather than forcing wholesale replacement. This is particularly critical for selling into industries like media and entertainment where technology decisions involve multiple stakeholders across production, post-production, and distribution. The AWS Bedrock integration delivered 30,000+ enterprise agreements in seven weeks—a distribution velocity impossible through direct sales alone. Extreme focus on first-principles product development beats fast-follower tactics: While competitors built quick demos by wrapping existing models, TwelveLabs spent three years building proprietary video foundation models and indexing infrastructure from scratch. Jae was explicit about the cost: "It was painful journey in the first like two and a half, three years because folks are flying by." The payoff came from solving actual customer problems—indexing 2 million hours of content in two days, enabling semantic search at scale, building agent workflows for specific use cases—rather than impressive demos that couldn't handle production workloads. For technical founders, this validates staying committed to fundamental research even when market momentum favors surface-level innovation. Federal requires cultural alignment before GTM optimization: TwelveLabs' federal success stems from authentic mission alignment, not just process execution. With In-Q-Tel as an investor providing interface to agencies and founders with military backgrounds, the company established credibility through shared values rather than sales tactics. Jae was direct: "If you're kind of entering because, oh, federal market is big and you go in, you're going to get your butt kicked. So I think like you need to actually build your team in a way that's like passionate to work on this project." This matters because federal deals require sustained engagement through long sales cycles, security reviews, and deployment complexity—momentum that only comes from genuine conviction, not quota pressure. ICP discipline protects product focus and team morale: Saying no to large early opportunities that don't fit ICP is operationally painful but strategically essential. Jae acknowledged the difficulty: "Early on saying no to customers is hard... as a founder you want to grow your business and you know that's going to be good for the morale. But that's only true when the customers are actually their ideal customers." Wrong customers create three failure modes: they pull product roadmap toward one-off features, they consume disproportionate support resources, and they generate reference cases that attract more wrong-fit prospects. For early-stage infrastructure companies, every customer shapes your market position—choose deliberately. // Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe. www.GlobalTalent.co // Don't Miss: New Podcast Series — How I Hire Senior GTM leaders share the tactical hiring frameworks they use to build winning revenue teams. Hosted by Andy Mowat, who scaled 4 unicorns from $10M to $100M+ ARR and launched Whispered to help executives find their next role. Subscribe here: https://open.spotify.com/show/53yCHlPfLSMFimtv0riPyM
Correspondent Scott Pelley reports on the threat China's cyber campaign poses to America's critical infrastructure. The former head of the National Security Agency and U.S. Cyber Command, General Tim Haugh, speaks with Pelley – in the general's first television interview since his retirement – about the threat. With Wall Street soaring to record highs and worries of an AI bubble, correspondent Lesley Stahl speaks with Andrew Ross Sorkin — one of the most trusted financial reporters of our time — about his new book, “1929,” which examines the market crash a century ago, to explore whether history is about to repeat itself. As the deal brokered by the Trump administration between Israel and Hamas raises hope for broader changes in the Middle East, Margaret Brennan interviews Syria's new president Ahmed Al Sharaa, a former Al Qaeda member, in his first U.S. television interview since taking office. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
In this episode, Automox CISO Jason Kikta strips away the noise and focuses on the three core pillars of secure IT operations: asset inventory, patch management, and identity and access management (IAM).Jason shares firsthand stories from U.S. Cyber Command and explains why getting the basics right isn't optional — it's essential. Whether you're building a modern security program or tightening existing controls, this episode delivers clear guidance on where to focus and why.
Dan Wolf, former Deputy CIO for the Commonwealth of Virginia and current Director of State Programs for the Alliance of Digital Innovation returns to the show to unpack some of the most pressing issues shaping state and local government today. From the surge of artificial intelligence legislation sweeping all 50 states, to the rise of cybersecurity mandates like New York's reporting requirements and Texas's bold Cyber Command initiative, we discuss insights into how policymakers, CIOs, and the private sector are navigating these transformative shifts.
What if the next season of your life is the one where everything comes together—your experience, your confidence, and your legacy?I had such a heartfelt conversation with Wendi Brown about her chapter You Are a Profit Powerhouse in Power of What's NEXT: Bold Moves By Design. Wendi's words have stayed with me, especially when she said, “Your legacy is your leverage. Use it.” She also shared a reminder that made me pause—“Confidence without experience is a liability.”What I love about Wendi is how she sees women over 50 as having an incredible advantage. Instead of slowing down, this is the moment to lean into everything you've learned and step forward with boldness.Here are just a few things you'll take away from our conversation: ✨ How your legacy can be the strongest foundation for your future. ✨ Why confidence and experience together create unstoppable momentum. ✨ The real advantage women have in the second half of their careers.
The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its long-awaited Cybersecurity Maturity Model Certification (CMMC 2.0) rule. Akira ransomware group targets SonicWall devices. Officials warn solar-powered highway infrastructure should be checked for hidden radios. The Atlantic Council maps the global spyware market. Researchers uncover serious flaws in Apple's AirPlay. A European DDoS mitigation provider thwarts a record-breaking attack. My Caveat cohosts Ethan Cook and Ben Yelin unpack the cyber elements of the Big Beautiful Bill. Who fixes the vibe code? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have Ethan Cook joining Caveat hosts Dave Bittner and Ben Yelin for this month's Policy Deep Dive. Together, they unpack HR1, the “Big Beautiful Bill”, and how its investments in technology, supply chain security, and defensive resiliency reflect the Trump administration's push for long-term technological dominance. If you want to hear the full conversation, head over to Caveat. Selected Reading House moves ahead with defense bill that includes AI, cyber provisions (The Record) FTC should investigate Microsoft after Ascension ransomware attack, senator says (The Record) Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' (The Record) Pentagon Releases Long-Awaited Contractor Cybersecurity Rule (GovInfo Security) Akira Ransomware Group Utilizing SonicWall Devices for Initial Access (Rapid7) Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure (Reuters) Mythical Beasts: Diving into the depths of the global spyware market (Atlantic Council) Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance (SecurityWeek) DDoS defender targeted in 1.5 Bpps denial-of-service attack (Bleeping Computer) The Software Engineers Paid to Fix Vibe Coded Messes (404 Media) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of the GovDiscovery AI podcast, Lieutenant General Matthew Jerry Glavy shares insights from his 39-year career in the U.S. Marine Corps, discussing the evolving landscape of the Department of Defense (DOD) and the importance of adaptability in military strategy. He emphasizes the need for continuous learning within the military, the impact of technology on warfare, and the critical role of industry in supporting defense priorities. General Glavy also reflects on lessons learned from past conflicts, including the rise of ISIS and the use of social media, and highlights the importance of innovation and collaboration between the military and industry. RESOURCES: GovDiscovery AI Federal Capture Support: https://www.govdiscoveryai.com/ AI Ready Veteran: https://aireadyveteran.org/ DCode: https://dcode.co/ BIOGRAPHY: Lieutenant General Matthew “Jerry” Glavy, USMC (Ret.), is a distinguished leader in national defense, cyberspace operations, and digital transformation. A Buffalo, New York native, he graduated from the U.S. Naval Academy in 1986 with a degree in Systems Engineering and became a Marine aviator, flying the CH-46 Sea Knight. Throughout his career, he deployed in Operations Desert Shield, Desert Storm, and Iraqi Freedom, as well as global humanitarian assistance, disaster relief, and evacuation missions. He commanded Marine Medium Helicopter Squadron 265 (REIN) as part of the 31st Marine Expeditionary Unit aboard U.S. Navy amphibious warships deployed to Iraq in support of Operation Iraqi Freedom. He also commanded Marine Helicopter Squadron One, serving as the President's Helicopter Pilot aboard Marine One, executing global presidential support missions. He was the Commanding General of 2nd Marine Aircraft Wing, responsible for the readiness and global deployment of 14,000 Marines and Sailors and 500 aircraft. LtGen Glavy played a pivotal role in modernizing cyber warfare and information operations. As Deputy Director of Operations for U.S. Cyber Command, he led efforts to defend the Department of Defense Information Network and conduct offensive cyberspace operations. He later commanded U.S. Marine Corps Forces Cyberspace Command, implementing hybrid cloud architecture and cybersecurity and leading Joint Task Force ARES to counter terrorist cyber threats. He was instrumental in establishing U.S. Marine Corps Forces Space Command as the first Commander, integrating space operations into Marine Corps expeditionary operations. His career culminated as Deputy Commandant for Information, serving as the Director of Marine Corps Intelligence, Chief Information Officer, and driving digital transformation. With deep expertise in leadership, cybersecurity, and strategic innovation, LtGen Glavy continues to drive change in business and technology. LEARN MORE: Thank you for tuning into this episode of the GovDiscovery AI Podcast with Mike Shanley. You can learn more about working with the U.S. Government by visiting our homepage: Konektid International and GovDiscovery AI. To connect with our team directly, message the host Mike Shanley on LinkedIn. https://www.govdiscoveryai.com/ https://www.konektid.com/ https://www.linkedin.com/in/gov-market-growth/
Keywordscybersecurity, military transition, Tampa cybersecurity, mentorship, cyber law, incident response, private sector, cybersecurity misconceptions, legal perspectives, cybersecurity growth SummaryIn this episode of No Password Required, hosts Jack Clabby and Kayley Melton sit down with Kurt Sanger — former Deputy General Counsel at U.S. Cyber Command — to talk about the evolving world of cyber law, the wild ride from government service to private sector strategy, and what keeps him grounded in a field that's constantly shifting. Kurt dives into the fast-growing cybersecurity scene in Tampa, the power of mentorship, and why people still get cyber law so wrong. Plus: insights on responding to incidents under pressure and what role the government should (and shouldn't) play in the digital fight. TakeawaysKurt emphasizes that newcomers to cybersecurity are not as far behind as they think.The transition from military to private sector can be challenging but rewarding.Tampa is becoming a significant hub for cybersecurity talent and companies.Understanding cybersecurity misconceptions is crucial for decision-makers.Mentorship plays a vital role in navigating career challenges in cybersecurity.Military and civilian cyber law have distinct differences in enforcement and flexibility.The stakes in private sector cybersecurity can be incredibly high for clients.Kurt's experience highlights the need for collaboration between government and private sectors.Cybersecurity is an ever-evolving field that requires continuous learning.Kurt finds excitement in helping clients during their most challenging times. Sound bites "You're only six months behind.""We're all in the same boat.""The government needs to step back." Chapters 00:00 NPR S6E7 Kurt Sanger52:53 NPR S6E7 Kurt Sanger01:45:47 Introduction to Cybersecurity Conversations01:48:22 Transitioning from Military to Private Sector Cybersecurity01:51:11 The Growth of Tampa as a Cybersecurity Hub01:54:05 Understanding Cybersecurity Misconceptions01:57:15 The Role of Mentorship in Cybersecurity Careers02:00:24 Military vs. Civilian Cybersecurity Law02:03:07 The Excitement of Cyber Command vs. Private Sector02:13:52 High Stakes in Cybersecurity for Small Organizations02:15:44 The Role of Legal Experts in Cybersecurity02:17:21 Translating Technical Jargon for Clients02:18:57 Challenges of Explaining Cyber Operations to Commanders02:22:43 Lifestyle Polygraph: Fun Questions and Insights02:23:30 The 10,000 Hour Rule in Cybersecurity02:29:34 Creative Freedom with LEGO Bricks02:31:27 Tampa's Culinary Delights and Local Favorites
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command's fiscal 2026 budget includes a new AI project. Czechia's cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy's Ministry of Foreign Affairs. Mexico's former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories. A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief's lack of restitution. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves. Selected Reading Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines) Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek) Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop) DeepSeek a threat to national security, warns Czech cyber agency (The Record) Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine) Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record) Major Nintendo Switch Piracy Website Seized By FBI (Kotaku) CISA Releases Thirteen Industrial Control Systems Advisories (CISA) Lovestruck US Air Force worker admits leaking secrets on dating app (The Register) Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textThe Air Force is bleeding instructors, CENTCOM's next boss is a mystery wrapped in vagueness, and the B-2 is getting a glow-up because, well, the B-21 still isn't ready. In this Daily Drop, Jared dives into the military's latest budget frenzy, Iran's Cold War cosplay, and why creatine is now part of his mental warfare toolkit. From wildfires pulling Guard troops off security gigs to Cyber Command begging for updated dial-up, it's another day of chaos, caffeine, and congressional cash grabs. Oh—and Space Force is building GPS knockoffs just in case things get really spicy. Buckle up, nerds.
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker's bold marketing campaign ends with a guilty plea. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app. Selected Reading Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine) Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek) CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine) Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek) Prompt injection in malware sample targets AI code analysis tools (SC Media) Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record) Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries' (The Record) NSA's Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record) Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textWelcome back to The Daily Drop—where Jared rants, roasts, and breaks down the news like only the Ones Ready crew can. Today's main event? Iran punches back with a missile strike on Al-Udeid, but 13 of 14 missiles get slapped out of the sky. Trump drops an F-bomb on the lawn. Space and Cyber Command flex behind the scenes. And everyone's favorite stealth bat—the B-2—continues to steal headlines.Meanwhile, the Air Force wants airmen to run two miles... twice a year. Cue the Facebook tears and diaper rash in the NCO groups. Jared lets the fatties have it with a no-holds-barred takedown that would make your Chief blush. Also: the F-15EX has supply chain issues (again), Tech Sergeant promotions spike, and drones in Ukraine are now hiding in IKEA houses.It's blunt. It's brutal. It's your morning slap of reality—Ones Ready style.
Cody Brown CEO Security Research Group Sponsors The Jason Cavness experience is brought to you by Breeze Docs. Request for Proposals AKA RFPs, can be very challenging for Small & Medium-sized Businesses. Breeze Docs, the RFP response platform of choice for SMBs across North America, uses AI to help companies quickly complete RFPs, security questionnaires, and other important business documents. If you'd like to start winning more RFPs and reduce completion times by up to 80 percent, visit breezedocs.ai to book a demo. By mentioning the Jason Cavness Experience, you will qualify for a free upgrade from Breeze Solo to Breeze AI+ valued at $6,000. Follow the Breeze at www.breezedocs.ai Sign up for free upgrade here https://www.breezedocs.ai/rfp-response-software-jason-caveness CavnessHR: Seattle's Got Tech Sign up to demo your tech and win prizes for being the best tech https://docs.google.com/forms/d/e/1FAIpQLSdBV98Am90oAoP08vWaS870Uk7Zp7WVDCwF6PALwlJf5NgmWw/viewform?usp=header Go to www.thejasoncavnessexperience.com for the podcast on your favorite platforms Cody's Bio Cody Brown is a cybersecurity leader with over a decade of experience delivering strategic solutions for enterprise security, offensive cyber operations, and compliance. A former Navy CTN and DoD security expert, he has led national-scale projects for agencies like U.S. Cyber Command and the Army Research Lab. Cody is the CEO of Security Research Group, specializing in military-grade cybersecurity solutions. He holds a Master of Information Technology from Virginia Tech and a B.S. in Cyber Operations from Dakota State. We talk about the following and other items Cody's Hobbies and Interests Understanding Cybersecurity Individual and Business Cybersecurity Threats Detecting and Responding to Hacks Ransomware and Extortion Tactics Common Cybersecurity Misconceptions Hacking Methods and Social Engineering Dark Web and Internet Infrastructure VPNs and Internet Privacy Starting a Cybersecurity Company Military Grade Cybersecurity Government vs. Private Sector Cybersecurity US Cybersecurity Ranking AI in Cybersecurity: Hype or Reality? Explaining Cybersecurity to Non-Techies P roudest Achievements and Business Challenges Advice for Aspiring Cybersecurity Professionals Career Paths in Cybersecurity Hiring and Vetting Cybersecurity Talent Private Sector's Role in National Cybersecurity Trends and Threats in Cybersecurity Importance of Multi-Factor Authentication Password Managers: Are They Worth It? Cybersecurity Myths and Realities Ethics in Cybersecurity Starting and Running a Cybersecurity Business Networking and Business Growth Balancing Technical Skills and Customer Service Personal Hobbies and Background Founding and Naming the Company Customer Recommendations and Implementation When to Prioritize Cybersecurity Employee Recruitment and Retention Navy Experience and Education Daily Prioritization and Work-Life Balance Early Interest in Technology and Career Path Future of Cybersecurity AI Platforms and Data Security Government Contracts and Bidding Process Evolution of Cybersecurity Company Focus and Insider Threats Cody's Social Media https://securityresearch.us/ https://www.linkedin.com/company/srg-sec/ https://www.linkedin.com/in/cody-ross-brown/ Cody's Advice I'll just emphasize it the last time, if you don't have multifactor authentication enabled on your accounts, definitely just go and do that right now.
An international law enforcement operation dismantles AVCheck. Trump's 2026 budget looks to cut over one thousand positions from CISA. Cyber Command's defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today's Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics. Complete our annual audience survey before August 31. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today's episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference. Selected Reading Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer) DHS budget request would cut CISA staff by 1,000 positions (Federal News Network) Cybercom's defensive arm elevated to sub-unified command (DefenseScoop) vBulletin Vulnerability Exploited in the Wild (SecurityWeek) Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine) Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer) Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer) Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines) Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield) The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw (SecurityWeek) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textStrap in, kids—this episode is a buffet of DoD chaos, spicy geopolitical moves, and “WTF are we even doing?” headlines. Jared unleashes on everything from the sketchiest Air Force One replacement idea ever (thanks, Qatar) to Golden Dome missile pipe dreams and the absolute circus that is Cyber Command's latest identity crisis.We're also sending ICE to Marine bases, cutting 14% of Space Force civilians (brilliant), and relying on $26 million to keep Reserve pilots in the sky. Oh, and if you thought privatizing base lodging was gonna save anyone money—LOL, you're adorable.All this while the Air Force plays catch-up with drone integration, and Netflix somehow makes the Thunderbirds look cost-effective. Welcome to another day in the Pentagon's magical clown tent.
Send us a textIn this extended Daily Drop, Jared unleashes a tactical nuke of sarcasm on the Pentagon's parade of WTF decisions. From billion-dollar contracts imploding to Airmen stuck in retirement limbo, it's clear nobody's steering this defense dumpster fire. Cyber Command wants to be SOCOM now (because that worked so well before), troops can't move because the PCS fairy ran out of money, and SpaceX is somehow our last hope in space. Also: PFAS water, political drama, and Congress failing military families… again.If you like your military updates with a side of rage and real talk, you're in the right TOC.
The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and pharmaceutical sectors worldwide. Microsoft warns of blue screen crashes following recent updates. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. 4chan gets Soyjacked. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. Today's question comes from N2K's EC-Council Certified Ethical Hacker CEH (312-50) Practice Test. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Selected Reading Funding Expires for Key Cyber Vulnerability Database (Krebs on Security) CISA extends funding to ensure 'no lapse in critical CVE services' (Bleeping Computer) CVE Foundation (CVE Foundation) NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts (Virginia Business) Federal employee alleges DOGE activity resulted in data breach at labor board (NBC News) Whistleblower claims DOGE took sensitive data - now he's being hounded by threatening notes (CNN via YouTube) New state agency to deal with cyber threats advances in Texas House (Texarkana Gazette) BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun” (Cybernews) Here's What Happened to Those SignalGate Messages (WIRED) After breach, SEC says hackers used stolen data to buy stocks (CNET) New ResolverRAT malware targets pharma and healthcare orgs worldwide (Bleeping Computer) Microsoft warns of blue screen crashes caused by April updates (Bleeping Computer) Infamous message board 4chan taken down following major hack (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers at Black Hat Asia pown a Nissan Leaf. A smart hub vulnerability exposes WiFi credentials. A new report reveals routers' riskiness. Operation Endgames nabs SmokeLoader botnet users. Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. The folks behind the Flipper Zero get busy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. Selected Reading Trump Signs Memorandum Revoking Security Clearance of Former CISA Director Chris Krebs (Zero Day) Senator puts hold on Trump's nominee for CISA director, citing telco security 'cover up' (TechCrunch) Infosec experts fear China could retaliate against tariffs with a Typhoon attack (The Register) New US Cyber Command, NSA chief glides in first public appearance (The Record) LARGE LANGUAGE MODELS ARE UNRELIABLE FOR CYBER THREAT INTELLIGENCE (ARXIG) Nissan Leaf Hacked for Remote Spying, Physical Takeover (SecurityWeek) TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials (Cyber Security News) Study Identifies 20 Most Vulnerable Connected Devices of 2025 (SecurityWeek) Authorities Seized Smokeloader Malware Operators & Seized Servers (Cyber Security News) Flipper Zero maker unveils ‘Busy Bar,' a new ADHD productivity tool (Bleeping Computer) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Today's Headlines: The world is still reeling from Trump's sweeping new tariffs, with markets in free fall and no signs of a course correction. Commerce Secretary Howard Lutnick confirmed the White House is not backing down, and China quickly retaliated with steep tariffs of its own, sanctions on U.S. companies, and an investigation into DuPont. Dow futures were already down 1600 points before markets even opened, and JP Morgan now puts the risk of a global recession at 60%. Meanwhile, Treasury Secretary Scott Bessent brushed off fears, even as he spent the week on Capitol Hill negotiating more tax cuts for the wealthy. In the background, the IRS is quietly working on a project to centralize taxpayer data in a new “mega API” system—likely with Palantir, raising privacy concerns. Elsewhere in the administration, the heads of the NSA and Cyber Command were abruptly fired, reportedly under pressure from far-right activist Laura Loomer. But the courts are beginning to push back: a federal judge ruled the NIH must restore full research funding, another ordered the government to return a man it wrongfully deported to El Salvador, and 19 state attorneys general are suing to block Trump's executive order requiring proof of citizenship to vote and tossing out mail ballots received after Election Day. Resources/Articles mentioned in this episode: Axios: Trump administration to markets: Don't expect a rescue CNBC: Stock market today: Live updates AP News: China slaps a 34% tax on all US imports in retaliation for Trump's tariffs NBC News: TikTok deal scuttled because of Trump's tariffs on China WSJ: JPMorgan Raises Recession Risk to 60% Axios: Bessent: "No reason" for markets to price in recession Axios: Bessent seeks tax cut as big summer win Wired: DOGE Is Planning a Hackathon at the IRS. It Wants Easier Access to Taxpayer Data NBC News: National Security Agency chief and deputy director dismissed NY Times: Judge Permanently Bars N.I.H. From Limiting Medical Research Funding Reuters: Judge orders return of wrongly deported Maryland man to US from El Salvador WA Post: Democratic attorneys general sue to block Trump's voting restrictions Morning Announcements is produced by Sami Sage alongside Bridget Schwartz and edited by Grace Hernandez-Johnson Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The President's Daily Brief: President Trump continues his shake-up of the national security establishment, removing the head of the National Security Agency and U.S. Cyber Command. The Kremlin delivers a stark warning to President Trump: any U.S. strike on Iran's nuclear facilities will have “catastrophic consequences.” To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Learn more about your ad choices. Visit megaphone.fm/adchoices
President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden-era security updates. Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransomware-related data breach. New Android spyware uses a password-protected uninstallation method. A Chinese state-backed threat group exploits a critical Ivanti vulnerability for remote code execution. Today's guest is Dave Dewalt, Founder and CEO of NightDragon, with the latest trends and outlook from cyber leaders. Malware masquerades as the tax man. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Dave Dewalt, Founder and CEO of NightDragon, sharing 2024 trends and a 2025 outlook. Selected Reading Haugh fired from leadership of NSA, Cyber Command (The Record) Defense Sec Hegseth in Signalgate Pentagon watchdog probe (The Register) HSCC Urges White House to Shift Gears on Health Cyber Regs (BankInfo Security) Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering (The Record) Critical Apache Parquet RCE Vulnerability Lets Attackers Run Malicious Code (Cyber Security News) State Bar of Texas Says Personal Information Stolen in Ransomware Attack (SecurityWeek) New Android Spyware That Asks Password From Users to Uninstall (TechCrunch) Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw (Infosecurity Magazine) Hackers Leveraging URL Shorteners & QR Codes for Tax-Related Phishing Attacks (Microsoft) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices