meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

CVEs don’t sleep.

CyberWire Daily

N2K Networks, Inc.

Tech News, News, Daily News, Technology

4.61K Ratings

🗓️ 14 January 2026

⏱️ 24 minutes

🧾️ Download transcript

Summary

Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment AI security is no longer optional, it’s urgent. In this segment of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation here and listen to new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading Patch Tuesday, January 2026 Edition (Krebs on Security) Adobe Patches Critical Apache Tika Bug in ColdFusion (SecurityWeek) Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities (SecurityWeek) Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM (SecurityWeek) Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (Reuters) Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover (Beyond Machines) Cyberattack forces Belgian hospital to transfer critical care patients (The Record) Betterment confirms data breach after wave of crypto scam emails (Bleeping Computer) Passports, bank details compromised in Eurail data breach (The Register) Lawmakers Urged to Let US Take on 'Offensive' Cyber Role (Bank InfoSecurity) Sean Plankey re-nominated to lead CISA (CyberScoop) Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans (BBC News) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:11.4

Most environments trust far more than they should, and attackers know it.

0:16.3

Threat Locker solves that by enforcing default deny at the point of execution.

0:22.7

With Threat Locker Allow listing,

0:28.8

you stop unknown executables cold. With ring fencing, you control how trusted applications behave,

0:35.0

and with Threat Locker DAC, defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards.

0:41.4

Threat Locker is the simplest way to enforce zero-trust principles without the operational pain.

0:46.8

It's powerful protection that gives CISO's real visibility, real control, and real peace of mind.

0:53.2

Threat Locker makes zero-trust attainable, even for small security teams.

0:58.0

See why thousands of organizations choose Threat Locker to minimize alert fatigue,

1:02.4

stop ransomware at the source, and regain control over their environments.

1:07.1

Schedule your demo at Threatlocker.com slash N2K today.

1:26.6

We got your patch Tuesday rundown. China sidelines western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital. Crypto scams hit investment clients and Eurail discloses a data breach. Analysts press to go on offense in cyberspace, and Sean Planky gets another shot at leading SISA.

1:50.5

In our threat vector segment, David Moulton sits down with Ian Swanson, AI security leader at Palo Alto Networks, about supply chain security.

1:58.7

And an AI risk assessment cites a football match that never happened.

2:21.5

It's Wednesday, January 14th, 2026.

2:40.6

I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today.

2:42.5

It's great as always to have you with us.

2:51.7

Microsoft's January Patch Tuesday addresses at least 113 vulnerabilities across Windows and supported software,

2:57.8

including 8 rated critical and 1 confirmed Zero Day under active exploitation.

3:02.1

The Zero Day affects the Windows Desktop Window Manager and is already being used in attacks despite a relatively low CVSS score.

3:10.1

Researchers warn it can undermine core protections like A-V randomization and be chained with other flaws, making rapid

...

Transcript will be available on the free plan in 24 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2026.