Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live hacking labs where you'll attack real environments, see how modern threats actually work, and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies, and technical deep dives focused on real world implementation. Whether you're blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now@ZTW.com and take your Zero Trust strategy from theory to execution. The White House preps a major overhaul of US Cybersecurity policy A key Commerce Security office loses staff as regulatory guardrails weaken lawmakers press AT&T and Verizon after months of silence on Salt typhoon vulnerability in the REACT native Metro development server is under active exploitation. Amaranth Dragon leverages a Winrar flaw. A coordinated reconnaissance campaign targets Citrix Netscaler infrastructure. CISL warns a SolarWinds web help desk flaws under active exploitation. Our guest is Zach Edwards, Senior Threat Research researcher at Silent Push, discussing a hole in the kill chain leaving law enforcement empty handed and cops in Northern Ireland get an unwanted data breach encore. It's Wednesday, February 4th, 2026. I'm Dave Bittner and this is your Cyberwire Intel Brief. Thanks for joining us here today. It's great as always to have you with us. The Trump administration is preparing a major overhaul of U.S. cybersecurity policy led by National Cyber Director Harry Coker Jr. With a strong emphasis on private sector collaboration and regulatory reform. The forthcoming National Cybersecurity Strategy aims to reduce overlapping and contradictory federal requirements that industry leaders say divert resources from real security improvements. Coker has signaled a shift away from top down mandates toward a more bottom up approach, actively soliciting industry input on which rules create friction without improving outcomes. The strategy is also expected to modernize threat intelligence sharing by strengthening legal protections for companies that disclose cyber incidents, addressing long standing fears of liability and regulatory retaliation. Cross sector coordination will be prioritized to reflect how modern cyberattacks cascade across industries, while longer term goals include expanding the cybersecurity workforce and investing in emerging technologies like AI. Despite the ambitious vision, success will hinge on sustained funding, cultural change within government, and rebuilding trust with a private sector wary of past unfulfilled promises. The Wall Street Journal reports that the Trump administration has removed two senior officials from the Commerce Department's Bureau of Industry and Security, specifically within its Office of Information and Communications Technology and Services. While little known publicly, ICTS plays a critical role in protecting US Technology supply chains from foreign adversary influence. Its sidelining is portrayed as part of a broader rollback since January of last year that has weakened federal technology and national security oversight through staffing cuts and reduced regulatory enforcement. Created under Donald Trump's 2019 executive order, ICTS was designed to block or restrict high risk tied to countries like China and Russia. It has acted only twice, including bans on Kaspersky software and certain connected vehicles. Critics argue that recent personnel moves, combined with cuts across agencies like CISA and regulatory reversals collectively undermine U.S. efforts to counter escalating cyber and supply chain threats with damage that may be difficult to reverse. Senator Maria Cantwell, the top Democrat on the Senate committee overseeing telecommunications, is calling for public hearings with the CEOs of AT&T and Verizon following revelations that the Chinese linked hacking group Salt Typhoon infiltrated US Telecom networks. In a letter to committee chair Ted Cruz, Cantwell said both companies have refused to provide documentation supporting claims their networks are now secure, raising concerns about ongoing risks to Americans communications. The intrusions exposed sensitive data tied to U.S. officials. Yet congressional action and regulatory oversight have largely stalled. An investigation by the Department of Homeland Security's Cybersafety Review Board was terminated, and emergency FCC rules issued late in the Biden administration to hold telecoms accountable were rescinded by the Trump administration. Cantwell argues telecoms have taken minimal action due to cost concerns and says executives must testify to restore public confidence. Researchers warn that attackers are actively exploiting the vulnerability, dubbed Metro for Shell in the React native Metro development server to compromise developer Systems. Discovered by JFrog, the flaw allows remote code execution via an exposed open URL endpoint. Volncheck observed real world exploitation delivering Windows and Linux payloads that disable defenses and Fetch malware. Roughly 3,500 exposed Metro servers remain online despite available fixes and ongoing attacks. Researchers at Checkpoint report that a newly identified threat actor, Amaranth Dragon, linked to state sponsored Chinese operations associated with APT41 is exploiting a vulnerability in espionage campaigns. The attacks targeted government and law enforcement organizations across Southeast Asia, including Singapore, Thailand and the Philippines. Amaranth Dragon leveraged the winrar flaw to achieve persistence by planting malicious files in Windows startup folders, later deploying a custom Amaranth loader to fetch encrypted payloads from cloudflare protected command and control servers. Campaigns were tightly geofenced and used region specific lures. More recent attacks delivered a new Telegram based remote access tool, TGAMouranth RAT researchers warn the activity shows high technical maturity and urge organizations to upgrade WinRAR to patched versions. Researchers at Gray Noise report a coordinated reconnaissance campaign targeting Citrix Netscaler infrastructure between January 28 and February 2. The activity used more than 63,000 IP addresses, largely residential proxies, to identify exposed login panels and enumerate product versions. Graynoise says the behavior indicates pre exploitation mapping rather than random scanning, but potentially tied to exploit development. The campaign follows recent critical Citrix flaws, raising concerns of imminent follow on attacks. CISA warns that attackers are actively exploiting a critical remote code execution flaw in SolarWinds web help desk. The unauthenticated deserialization bug was patched last week, but CISA has now added it to the known exploited vulnerabilities catalog ordering federal agencies to remediate within three days. The move confirms in the wild exploitation and highlights continued risk to unpatched Solar winds deployments. Coming up after the break, Zach Edwards from Silent Push discusses a hole in the kill chain, leaving law enforcement empty handed and cops in Northern Ireland get an unwanted data breach. Encore Stay with us. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified plat. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity, and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire. If securing your network feels harder than it should be, you're not imagining it. Modern businesses need strong protection, but they don't always have the time, staff or patience for complex setups. That's where Nordlayer Comes in. Nordlayer is a toggle ready network security platform built for businesses. It brings VPN access control and threat protection together in one place. No hardware, no complicated configuration. You can deploy it in minutes and be up and running in less than 10. It's built on zero trust principles so only the right people can get access to the right resources. It works across all major platforms scales easily as your teams grow and and integrates with what you already use. And now Nordlayer goes even further through its partnership with CrowdStrike combining NordLayer's network security with Falcon Endpoint protection for small and mid sized businesses. Enterprise grade security made manageable. Try Nordlayer risk free and get up to 22% off yearly plans plus an extra 10% with the code CYBERWIRE10. Visit nordlayer.com cyberwire daily to learn more. Zach Edwards is senior threat researcher at Silent Push. I recently got together with him to discuss a hole in the kill chain that leaves law enforcement empty handed.
