The CyberWire show

The CyberWire

Summary: More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.

Join Now to Subscribe to this Podcast

Podcasts:

 ARCHER incident. Contact tracing smishing. Malware vs. air gaps. A surcharge for deletion. Anti-creepware. 5G coronavirus delusions. | File Type: audio/mpeg | Duration: 20:11

ARCHER incident. Contact tracing smishing. Malware vs. air gaps. A surcharge for deletion. Anti-creepware. 5G coronavirus delusions.

 More data theft by ransomware. Patch Tuesday notes. Espionage and possible data corruption against COVID-19 researchers. Be a role model for your AI. | File Type: audio/mpeg | Duration: 20:48

More data theft by ransomware. Patch Tuesday notes. Espionage and possible data corruption against COVID-19 researchers. Be a role model for your AI.

 Cyberwar looms in the Middle East? Hidden Cobra’s fangs described. Evasive Astaroth. Ransomware in Texas courts. COVID-19 espionage. Content moderation. | File Type: audio/mpeg | Duration: 20:44

Cyberwar looms in the Middle East? Hidden Cobra’s fangs described. Evasive Astaroth. Ransomware in Texas courts. COVID-19 espionage. Content moderation.

 Cyberattacks with kinetic consequences. Thunderspy and evil maids. Developing background to the US bulk power security executive order. Conspiracy theories and the culture of social media. | File Type: audio/mpeg | Duration: 20:58

Cyberattacks with kinetic consequences. Thunderspy and evil maids. Developing background to the US bulk power security executive order. Conspiracy theories and the culture of social media.

 Cybersecurity First Principles | File Type: audio/mpeg | Duration: 17:48

Cybersecurity First Principles

 The U.S. campaign trail is actually quite secure. | File Type: audio/mpeg | Duration: 19:17

The U.S. campaign trail is actually quite secure.

 PLA cyber espionage, and training WeChat censorship algorithms against the Chinese diaspora. Snake is back, and so is Charming Kitten. Election security. Recruiting money mules. | File Type: audio/mpeg | Duration: 24:27

PLA cyber espionage, and training WeChat censorship algorithms against the Chinese diaspora. Snake is back, and so is Charming Kitten. Election security. Recruiting money mules.

 Mining Monero. A RAT in a 2FA app. The decline of the Cereal botnet. Markets during the pandemic. Ransomware in Taiwan. Twitter appeals to reason. | File Type: audio/mpeg | Duration: 19:47

Mining Monero. A RAT in a 2FA app. The decline of the Cereal botnet. Markets during the pandemic. Ransomware in Taiwan. Twitter appeals to reason.

 Taking down coordinated inauthenticity. Contact tracing and other COVID-19 notes. BlackInfinity taken down. | File Type: audio/mpeg | Duration: 20:32

Taking down coordinated inauthenticity. Contact tracing and other COVID-19 notes. BlackInfinity taken down.

 Bear hunt in the Bundestag. Kaiji botnet described. Cryptojacking. Joint US-UK warning against attacks on COVID-19 response. Contact tracing. Puppy scams. | File Type: audio/mpeg | Duration: 20:59

Bear hunt in the Bundestag. Kaiji botnet described. Cryptojacking. Joint US-UK warning against attacks on COVID-19 response. Contact tracing. Puppy scams.

 A state of emergency over bulk power in the States. Beijing’s disinformation about COVID-19, and its motivation for a coverup. Hacking biomedical research. Curious Xiaomi phones. | File Type: audio/mpeg | Duration: 20:46

A state of emergency over bulk power in the States. Beijing’s disinformation about COVID-19, and its motivation for a coverup. Hacking biomedical research. Curious Xiaomi phones.

 Fingerprint authentication is not completely secure. | File Type: audio/mpeg | Duration: 17:59

Fingerprint authentication is not completely secure.

 China hacks at Vietnam over a territorial dispute. Kim’s still in charge, but could Hidden Cobra get loose if his grip slackens? COVID-19 and cybersecurity. | File Type: audio/mpeg | Duration: 24:37

China hacks at Vietnam over a territorial dispute. Kim’s still in charge, but could Hidden Cobra get loose if his grip slackens? COVID-19 and cybersecurity.

 The persistence of ransomware. Exposure notifications and contact tracing. Doxing and conspiracy theories. More notes on the underworld. | File Type: audio/mpeg | Duration: 20:58

The persistence of ransomware. Exposure notifications and contact tracing. Doxing and conspiracy theories. More notes on the underworld.

 Content farmers and disinformation tactics. PhantomLance: quiet, selective, and apparently effective. Lawful intercept and contact-tracing apps. A look at the black market. | File Type: audio/mpeg | Duration: 21:05

Content farmers and disinformation tactics. PhantomLance: quiet, selective, and apparently effective. Lawful intercept and contact-tracing apps. A look at the black market.

Comments

Login or signup comment.