The Cyberwire.
- Get link
- X
- Other Apps
"Operation Winter SHIELD: What the FBI wants industry to know."
Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents. Accessed on 30 April 2026, 1318 UTC.
Content and Source provided by email subscription from https://feedly.com.
https://feedly.com/i/subscription/content/feed%2Fhttps%3A%2F%2Fthecyberwire.com%2Ffeeds%2Frss.xml
Please check subscription link or scroll down to read your selections. Thanks for joining us today.
Russ Roberts (https://www.hawaiicybersecurityjournal.net).
39
Yesterday
7h
The FBI sees every breach. You see yours. Adam Maddock, Section Chief of the FBI's Cyber Technical Analytics and Operations Section, and Jarrod Schlenker, Assistant Section Chief leading the FBI Cyber Division's private-sector engagement, join David Moulton to walk through Operation Winter SHIELD, the FBI's public campaign built on what investigators see repeated across hundreds and thousand
8h
This week, while Maria is on vacation, Dave Bittner and Joe Carrigan are joined by Michele Kellerman as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up: a quick
8h
This week, Dave and Ben sit down with N2K's Lead Analyst Ethan Cook to look at the Supreme Court's new case examining geofencing. In the conversation, the three break down the various stances the justice's have already begun to take up and what the potential fallouts of this case could be.
16h
Running marketing as a team of one means you’re responsible for everything, from attribution to brand to pipeline. Sara Ceballos, Director of Marketing, joins the show to talk through her time at Inspectiv, where she was brought in to support two new product launches, rethink the company's positioning, and run marketing as a team of one. She shares how she moved MQL tracking out of spreadsheets in
16h
OpenAI and Anthropic brief Congress on cyber-capable AI. The GAO flags improper DOGE access to Treasury payment systems. Greece moves to end online anonymity. CISA orders agencies to patch an exploited Windows zero-day. Researchers uncover ransomware that destroys data instead of encrypting it. State CISOs report falling confidence. Neurodivergent cyber pros cite inclusion gaps. Police arrest a 19
17h
Spectrum Security emerges from stealth with $19 million. Israeli data security company Cyera acquires Ryft.
21h
Rival ransomware gangs list each other as victims. Business news: Silverfort will acquire Fabrix Security.
Apr 28, 2026
1d
Conflict in the Middle East disrupts the circuit board supply chain. The Supreme Court considers arguments on geofence searches. A new report highlights Chinese digital transnational repression. The NCSC protects HDMI and DisplayPort links. Tennessee bans cryptocurrency ATMs. Researchers expose a financially motivated subgroup of North Korea’s Lazarus Group. Medtronic confirms a ShinyHunters data
1d
US Supreme Court leans toward requiring warrants for geofencing searches. ShinyHunters claims responsibility for Pitney Bowes breach.
2d
It’s a story that journalist and veteran Stephen Harding uncovered: a secret component of the FBI’s “European Operation,” whereby agents traveled abroad working undercover to track down American citizens who had betrayed their country during World War II. These traitors ran the gamut, from spreading propaganda for the Fascists and the Third Reich, to starting Nazi spy rings. What became of them is
2d
One of the more notorious German spies of the 20th century, Lothar Witzke lived a life of intrigue: from escaping the death penalty in the First World War to joining the Nazi party in the Second. It's a story that Robert Hornick and Paul Friedland stumbled on by chance. With help from Witzke's grandchildren and by digging through archives, these lawyers pieced together Witzke's story, sifting fact
Apr 27, 2026
2d
Megan Stifel, Chief Strategy Officer at the Institute for Security and Technology, joins Ann on this week’s episode of Afternoon Cyber Tea to discuss why cybersecurity must be treated as a shared governance responsibility, not just an IT issue. They explore how boardroom misalignment creates exposure across areas like workforce burnout, insider threats, and third-party risk, and why resilience, tr
The Supreme Court weighs geofence warrants. Iran leans toward quieter cyber ops. Researchers unpack Fast16 sabotage malware. Microsoft tracks an Outlook outage. Snow malware moves deep inside networks. Itron reports a breach. SMS blasters hit Canada. Italy extradites an accused hacker to the U.S. Monday business brief. Our guest is Mick Coady, Field CTO of Elisity, on how hospitals can best defend
Researchers analyze a cyber sabotage framework that predates Stuxnet. Toronto police arrest three men accused of operating an SMS blaster.
Apr 24, 2026
5d
This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and
5d
FIRESTARTER malware remained on Cisco devices after patches were applied. Cloud development platform Vercel confirms breach.
5d
Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a patch. Researchers downplay OT malware hype, while NIST pushes for better OT visibility. Our guest is Eric Russo, Direc
5d
Open-source AI models may match Mythos's capabilities. White House moves to fight foreign extraction of US AI capabilities.
Apr 23, 2026
6d
Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data. macOS admin tools become attacker path
Sean Plankey withdraws nomination to serve as CISA director. GopherWhisper targets Mongolian government entities.
7d
N2K Networks today announced the launch of AI Security Brief, the flagship podcast for global AI security leader TrendAI™ on the N2K CyberWire network. Drawing on TrendAI™’s global threat research and operational expertise, the show delivers strategic insights on the intersection of artificial intelligence and cybersecurity to help leaders navigate the rapidly evolving AI threat landscape.
Apr 22, 2026
7d
What does it take to go from staring at forensic images to sitting across from a CEO whose company is on fire? Steve Elovitz has spent his entire career in the room when things go wrong. He started in forensics and eDiscovery at PwC, moved to Booz Allen doing government work, then spent a decade at Mandiant before joining Unit 42 to lead North America consulting and incident response. The throug
7d
Robert (Bob) McArdle has spent two decades tracking cybercriminals - from ransomware groups to nation-state actors to financially motivated crime organizations. As a result, he has a front-row seat on how agentic AI is reshaping the threat landscape right now. In conversation with hosts Johnny Hand and Dustin Childs, Bob shares why agentic AI is a bigger game changer for cybercriminals than genera
7d
This week, Dave and Ben revisit several key stories including the Senate reauthorizing Section 702 and top White House officials meeting with Anthropic's CEO. Alongside these story updates, the two also look into how conversations surrounding AI liability and insurance coverage are changing.
7d
This week, while Maria is on vacation, Dave Bittner and Joe Carrigan are joined by Michele Kellerman as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave brings us a lively follow-up from his
7d
Mythos leaks. The DOD preps a more aggressive cyber strategy. A former FBI cyber official urges homicide charges for hospital ransomware deaths. Lotus Wiper targeted the Venezuelan energy and utilities sector. Over 1,300 SharePoint servers remain unpatched against a spoofing vulnerability. The Harvester APT group deploys a new Linux version of its GoGra backdoor. A new LOTUSLITE backdoor targets I
7d
Brian Vecci, Field CTO at Varonis joins Dave Bittner on the CyberWire Daily podcast for a sponsored Industry Voices at the RSA Conference 2026. He explains how the rapid shift to autonomous AI agents is widening the gap between innovation and security, and why organizations must focus on data security, measurable outcomes, and faster remediation to keep pace with AI-driven risk.
7d
ServiceNow completes its acquisition of Armis.
7d
Mustang Panda targets India's financial sector. Business news: Artemis emerges from stealth with $70 million.
- Get link
- X
- Other Apps
Comments
Post a Comment
Please leave a comment about our recent post.