The Cyberwire.

"Operation Winter SHIELD:  What the FBI wants industry to know."

Views expressed in this cybersecurity, cyber crime update are those of the reporters and correspondents.  Accessed on 30 April 2026, 1318 UTC.

Content and Source provided by email subscription from https://feedly.com.

 https://feedly.com/i/subscription/content/feed%2Fhttps%3A%2F%2Fthecyberwire.com%2Ffeeds%2Frss.xml

Please check subscription link or scroll down to read your selections.  Thanks for joining us today.  

Russ Roberts (https://www.hawaiicybersecurityjournal.net).

12K followers26 articles per week

Yesterday

The FBI sees every breach. You see yours. ⁠Adam Maddock⁠, Section Chief of the FBI's Cyber Technical Analytics and Operations Section, and ⁠Jarrod Schlenker⁠, Assistant Section Chief leading the FBI Cyber Division's private-sector engagement, join ⁠David Moulton⁠ to walk through Operation Winter SHIELD, the FBI's public campaign built on what investigators see repeated across hundreds and thousand
This week, while Maria is on vacation, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are joined by ⁠⁠Michele Kellerman⁠⁠ as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up: a quick
This week, Dave and Ben sit down with N2K's Lead Analyst Ethan Cook to look at the Supreme Court's new case examining geofencing. In the conversation, the three break down the various stances the justice's have already begun to take up and what the potential fallouts of this case could be.
Running marketing as a team of one means you’re responsible for everything, from attribution to brand to pipeline. Sara Ceballos, Director of Marketing, joins the show to talk through her time at Inspectiv, where she was brought in to support two new product launches, rethink the company's positioning, and run marketing as a team of one. She shares how she moved MQL tracking out of spreadsheets in
OpenAI and Anthropic brief Congress on cyber-capable AI. The GAO flags improper DOGE access to Treasury payment systems. Greece moves to end online anonymity. CISA orders agencies to patch an exploited Windows zero-day. Researchers uncover ransomware that destroys data instead of encrypting it. State CISOs report falling confidence. Neurodivergent cyber pros cite inclusion gaps. Police arrest a 19

Apr 28, 2026

Conflict in the Middle East disrupts the circuit board supply chain. The Supreme Court considers arguments on geofence searches. A new report highlights Chinese digital transnational repression. The NCSC protects HDMI and DisplayPort links. Tennessee bans cryptocurrency ATMs. Researchers expose a financially motivated subgroup of North Korea’s Lazarus Group. Medtronic confirms a ShinyHunters data
US Supreme Court leans toward requiring warrants for geofencing searches. ShinyHunters claims responsibility for Pitney Bowes breach.
It’s a story that journalist and veteran Stephen Harding uncovered: a secret component of the FBI’s “European Operation,” whereby agents traveled abroad working undercover to track down American citizens who had betrayed their country during World War II. These traitors ran the gamut, from spreading propaganda for the Fascists and the Third Reich, to starting Nazi spy rings. What became of them is
One of the more notorious German spies of the 20th century, Lothar Witzke lived a life of intrigue: from escaping the death penalty in the First World War to joining the Nazi party in the Second. It's a story that Robert Hornick and Paul Friedland stumbled on by chance. With help from Witzke's grandchildren and by digging through archives, these lawyers pieced together Witzke's story, sifting fact

Apr 27, 2026

Megan Stifel, Chief Strategy Officer at the Institute for Security and Technology, joins Ann on this week’s episode of Afternoon Cyber Tea to discuss why cybersecurity must be treated as a shared governance responsibility, not just an IT issue. They explore how boardroom misalignment creates exposure across areas like workforce burnout, insider threats, and third-party risk, and why resilience, tr
The Supreme Court weighs geofence warrants. Iran leans toward quieter cyber ops. Researchers unpack Fast16 sabotage malware. Microsoft tracks an Outlook outage. Snow malware moves deep inside networks. Itron reports a breach. SMS blasters hit Canada. Italy extradites an accused hacker to the U.S. Monday business brief. Our guest is Mick Coady, Field CTO of Elisity, on how hospitals can best defend

Apr 24, 2026

This week, we are joined by ⁠Juliana Testa⁠, Senior Security Engineer from ⁠7AI⁠, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and
Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a patch. Researchers downplay OT malware hype, while NIST pushes for better OT visibility. Our guest is Eric Russo, Direc

Apr 23, 2026

Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data. macOS admin tools become attacker path
N2K Networks today announced the launch of AI Security Brief, the flagship podcast for global AI security leader TrendAI™ on the N2K CyberWire network. Drawing on TrendAI™’s global threat research and operational expertise, the show delivers strategic insights on the intersection of artificial intelligence and cybersecurity to help leaders navigate the rapidly evolving AI threat landscape.

Apr 22, 2026

What does it take to go from staring at forensic images to sitting across from a CEO whose company is on fire? ⁠Steve Elovitz⁠ has spent his entire career in the room when things go wrong. He started in forensics and eDiscovery at PwC, moved to Booz Allen doing government work, then spent a decade at Mandiant before joining Unit 42 to lead North America consulting and incident response. The throug
Robert (Bob) McArdle has spent two decades tracking cybercriminals - from ransomware groups to nation-state actors to financially motivated crime organizations. As a result, he has a front-row seat on how agentic AI is reshaping the threat landscape right now. In conversation with hosts Johnny Hand and Dustin Childs, Bob shares why agentic AI is a bigger game changer for cybercriminals than genera
This week, Dave and Ben revisit several key stories including the Senate reauthorizing Section 702 and top White House officials meeting with Anthropic's CEO. Alongside these story updates, the two also look into how conversations surrounding AI liability and insurance coverage are changing.
This week, while Maria is on vacation, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are joined by ⁠Michele Kellerman⁠ as they discuss the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave brings us a lively follow-up from his
Mythos leaks. The DOD preps a more aggressive cyber strategy. A former FBI cyber official urges homicide charges for hospital ransomware deaths. Lotus Wiper targeted the Venezuelan energy and utilities sector. Over 1,300 SharePoint servers remain unpatched against a spoofing vulnerability. The Harvester APT group deploys a new Linux version of its GoGra backdoor. A new LOTUSLITE backdoor targets I
Brian Vecci, Field CTO at Varonis joins Dave Bittner on the CyberWire Daily podcast for a sponsored Industry Voices at the RSA Conference 2026. He explains how the rapid shift to autonomous AI agents is widening the gap between innovation and security, and why organizations must focus on data security, measurable outcomes, and faster remediation to keep pace with AI-driven risk.

Comments

Popular posts from this blog

Cyber War News Today.

Cyber War News Today.

SecurityWeek Briefing