Command Palette

Search for a command to run...

Page Inspect

https://thecyberwire.com/
Internal Links
34
External Links
5
Images
32
Headings
1

Page Content

Title:Your Cybersecurity News Connection - Cyber News | CyberWire
Description:The CyberWire is an independent voice delivering concise, accessible, and relevant cybersecurity news briefings and cybersecurity podcasts to people all across the globe.
HTML Size:78 KB
Markdown Size:8 KB
Fetched At:October 23, 2025

Page Structure

h1Cybersecurity News

Markdown Content

Your Cybersecurity News Connection - Cyber News | CyberWire

-

- Search the site

- Industry Insights
- Podcasts
- Briefings
- Stories
- Events
- Glossary

- N2K Pro
- CISO Perspectives
- Podcasts
- Briefings
- Pro Academy New
- Hash Table
- 1st Principles Course

- About
- Our Story
- Press
- Team
- Testimonials
- Sponsor
- Partners

- Dev
- API

- Account
- Profile
- Logout

Home

Search the site

Industry Insights

Podcasts

Briefings

Stories

Events

Glossary

N2K Pro

CISO Perspectives

Podcasts

Briefings

Pro Academy New

Hash Table

1st Principles Course

Dev

API

About

Our Story

Press

Team

Testimonials

Sponsor

Partners

October 22, 2025

Join Pro

LOGIN

14 hours ago

Your Cybersecurity Marketing Community Awaits — CyberMarketingCon 2025 Preview

What started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security. In this replay from Chris Hughes’ Resilient Cyber show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or online if that’s easier): hands-on workshops, founder + investor sessions, and this year’s theme — the Marketing Time Machine.

Marketing

14 hours ago

Your Cybersecurity Marketing Community Awaits — CyberMarketingCon 2025 Preview

What started as two marketers looking for support has grown into a 4,000-member community and CyberMarketingCon, the go-to conference for anyone driving go-to-market in security. In this replay from Chris Hughes’ Resilient Cyber show, Gianna and Maria share what makes the Society different, why the event feels more like a reunion than a conference, and what’s waiting in Austin this December (or online if that’s easier): hands-on workshops, founder + investor sessions, and this year’s theme — the Marketing Time Machine.

Marketing

# Cybersecurity News

Daily Briefing

3 hours ago

Foreign hackers breached a US nuclear weapons manufacturing site.

Jaguar Land Rover ransomware attack is the costliest cyberattack in UK history. Russian threat actor deploys new malware.

Microsoft Threat Intelligence

12 hours ago

The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report

In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI’s growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks.

CyberWire Daily

23 hours ago

The SMB slip-up.

CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s COLDRiver group rapidly retools its malware arsenal. GlassWorm malware hides malicious logic with invisible Unicode characters. European authorities dismantle a large-scale Latvian SIM farm operation. Myanmar’s military raids a notorious cybercrime hub. Josh Kamdjou, from Sublime Security discusses how teams should get ahead of Scattered Spider's next move. Eagle Scouts are soaring into cyberspace.

Daily Briefing

Oct 21, 2025

CISA warns of actively exploited SMB flaw.

China accuses the US of hacking its national time center. Ransomware attack disrupts Japan's retail sector.

CSO Perspectives

Oct 21, 2025

The changing face of fraud.

Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.

CSO Perspectives

Oct 21, 2025

Regulation takeaways with Ethan Cook.

On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters. Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.

story

Oct 21, 2025

Fraud in a new world.

Fraud has been a longstanding issue, one that has never been and will never be completely solved. However, like many other things, fraud is evolving as threat actors are leveraging new scams and new technologies.

CyberWire Daily

Oct 20, 2025

The day the cloud got foggy.

An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A cyber M&A and funding surge signals a busy consolidation cycle. Our guest Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps. One man’s quest to make AI art legit.

Daily Briefing

Oct 20, 2025

AWS sustains widespread outage.

US court bars NSO Group from targeting WhatsApp. Salt Typhoon breaches European telecom.

Research Saturday

Oct 18, 2025

Smile for the malware.

⁠Eclypsium⁠ researchers ⁠Jesse Michael⁠ and ⁠Mickey Shkatov⁠ to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.

Week that Was

Oct 18, 2025

F5 discloses long-term breach tied to nation-state actors.

Fortra confirms exploitation of maximum-severity GoAnywhere flaw. Patch Tuesday notes.

CyberWire Daily

Oct 17, 2025

Prosper’s not so prosperous week.

Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined by Danny Jenkins who is talking about defending against AI. And who let the bots out?

Load More

Gain instant access to our exclusive podcast and briefing content, the Pro Academy, live events and more by subscribing to N2K Pro.

Subscribe Now

Privacy

Terms

Sponsorship Terms

Contact Us

©2025 N2K Networks, Inc. All rights reserved. CyberWire® is a registered trademark of N2K Networks, Inc.