Transcript
Dave Bittner (0:02)
You're listening to the Cyberwire Network powered by N2K.
Host/Interviewer (0:12)
If securing your network feels harder than it should be, you're not imagining it. Modern businesses need strong protection, but they don't always have the time, staff or patience for complex setups. That's where Nord layer comes in. Nordlayer is a toggle ready network security platform built for businesses. It brings VPN access control and threat protection together in one place. No hardware, no complicated configuration. You can deploy it in minutes and be up and running in less than 10. It's built on zero trust principles so only the right people can get access to the right resources. It works across all major platforms, scales easily as your teams grow and integrates with what you already use and and now Nordlayer goes even further through its partnership with CrowdStrike, combining NordLayer's network security with Falcon Endpoint protection for small and mid sized businesses. Enterprise grade security made manageable Try Nordlayer risk free and get up to 22% off yearly plans plus an extra 10% with the code CYBERWIRE10. Visit nordlayer.com cyberwire daily to learn more. A popular chatbot exposes millions of private user messages the White House rescinds Biden era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President's NSA pick champions section702 France looks to reduce reliance on US digital infrastructure infrastructure CISA shares guidance on insider threats Hugging face infrastructure was abused to distribute an Android rat Ivanti discloses a pair of critical zero days Popular dating sites suffer a data breach Our guest is Tim Starks from cyberscoop discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world and the Nobel Committee blames hackers for a spoiler alert. Foreign. January 30, 2026 I'm Dave Bittner and this is your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. An independent security researcher found that Chat and Ask AI, a popular chatbot app claiming over 50 million users, exposed hundreds of millions of private user messages due to a misconfigured Google Firebase database. According to reporting by 404 Media, the exposed data included highly sensitive chats such as questions about suicide, drug manufacturing and hacking, along with full conversation, conversation histories, timestamps and model settings. The researcher accessed roughly 300 million messages tied to more than 25 million users. Chat and Ask AI, developed by Turkish firm Codeway, uses large language models from multiple providers. Codewe fixed the issue within hours of disclosure Researchers note that Firebase misconfigurations are a long standing widespread problem affecting many mobile apps and continue to expose user data at scale. The White House has rescinded Biden era federal software security guidance, calling it unproven and overly burdensome. In a new memo, the Office of Management and Budget revoked prior requirements for standardized secure software development practices and shifted responsibility to individual agency heads. Agencies must now tailor software and hardware security policies to their missions and risk profiles. While no longer mandatory, tools like software bills of materials may still be used and the guidance expands focus to hardware supply chain risks through hardware bills of materials. A senior United States Secret Service official warned that weaknesses in the Internet's domain registration system are being widely exploited by criminals but receive too little attention. Speaking at a policy forum, Matt Noyes said registrars routinely allow bulk reg of deceptive domain names used in phishing and fraud. He argued the problem stems from Internet governance, particularly how Internet Assigned Numbers Authority operates, noting that domain registrations lack meaningful identity or trademark validation. As a result, companies like Microsoft and Google are forced into reactive court ordered takedowns. Noyes said that major Internet firms could act more proactively by limiting ads, search results or infrastructure tied to concentrated abuse. He also highlighted business email compromise as another systemic trust failure, noting that email identity is routinely assumed but rarely verified. President Donald Trump's nominee to lead the National Security Agency, Army Lt. Gen. Joshua Rudd, strongly defended Section 702 of the Foreign Intelligence Surveillance act during a Senate hearing, calling it indispensable to national security and life saving operations. Section 702 allows US agencies to collect foreign intelligence from US tech companies, but can also sweep up Americans communications without warrants. The authority expires April 19, with no renewal bill yet introduced. Rudd's stance could conflict with Trump and Tulsi Gabbard, both past critics of the program. Senators questioned warrant requirements and civil liberties protections while committees moved Rudd's nomination forward, positioning him for confirmation before the NSA's acting chief retires. France is moving to reduce reliance on US Digital infrastructure by replacing American video conferencing tools with a government built alternative. French Defense Minister Sebastien Lecornu announced that officials will transition from platforms like Zoom and Microsoft Teams to a new French application called Visio by year's end. The government said non European tools pose cybersecurity and data control risks and framed the shift as a step toward digital sovereignty. Visio is hosted by French cloud provider Outscale and uses AI features from domestic firms. The move follows similar efforts across Europe to localize messaging, productivity and AI tools. Amid growing concerns about strategic dependence on US Technology, especially after renewed tensions in transatlantic relations, the Cybersecurity and Infrastructure Security Agency is urging critical infrastructure organizations and state, local, tribal and territorial governments to take stronger action against insider threats. To support that effort, CISA released a new infographic titled Assembling a Multidisciplinary Insider Threat Management Team, offering practical guidance to help organizations prevent, detect and mitigate insider risks. CISA emphasized that insider threats include both malicious actions and unintentional mistakes, each capable of causing serious operational and reputational harm. Acting Director Madhu Garamukala said insider threats remain among the most serious security challenges because they erode trust and disrupt critical operations. Infrastructure security executive Steve Cassapula added that mature insider threat programs improve resilience and called on organizations to build cross functional teams and foster a culture where employees feel empowered to report concerns. Researchers at bitdefender report that Hugging Face infrastructure was abused to distribute an Android remote access Trojan. The campaign used a fake security app called Trust Bastion, delivered via ads, which acted as a dropper, and downloaded malicious payloads from Hugging Face repositories. The malware requested extensive permissions, enabling full device control, screen capture and credential theft while impersonating financial services. Although the original repository was removed, the operation resurfaced under a different app name before Hugging Face took down the data sets. Ivanti disclosed two critical zero day vulnerabilities in Ivanti Endpoint Manager mobile, both rated CVSS 9.8 and already exploited in the wild. The flaws allow unauthenticated remote code execution, potentially exposing sensitive administrator, user and mobile device data, including credentials and location information. Avanti released temporary RPM hotfixes for affected versions and urged customers to apply them immediately, noting the fixes must be reapplied after upgrades. Permanent fixes are expected in upcoming versions. CISA added the vulnerability to its known Exploited Vulnerabilities catalog, requiring US Federal agencies to remediate or stop using affected systems by February 1. Match Group, owner of dating platforms including Tinder, Hinge, Match.com and OkCupid, confirmed a cybersecurity incident after the Shiny Hunters gang leaked data allegedly tied to 10 million users. Match Group said attackers accessed a limited amount of user data and that there's no evidence login credentials, financial information or private messages were compromised, according to reporting by Bleeping Computer. The breach stemmed from a social engineering attack that compromised an Okta single sign on account granting access to marketing, analytics and cloud storage systems. Match Group said it contained the intrusion quickly is notifying affected users and continues to investigate with external experts. Coming up after the break, Tim Starks from cyberscoop discusses how the US looks to push its view of AI cybersecurity standards to the rest of the world. And the Nobel Committee blames hackers for a spoiler alert. Stay with us. What's your 2am Security worry? Is it do I have the right controls in place? Maybe Are my vendors secure or the one that really keeps you up at night? How do I get out from under these old tools and manual processes? That's where Vanta comes in. Vanta automates the manual work so you can stop sweating over spreadsheets, chasing audit evidence and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. And it fits right into your workflows. Using AI to streamline evidence collection, flag risks, and keep your program audit ready all the time. With Vanta, you get everything you need to move faster, scale confidently and finally, get back to sleep. Get started@vanta.com cyber that's V A N T A dot com cyber. When it comes to mobile application security, good enough is a risk. A recent Survey shows that 72% of organizations reported at least one mobile application security incident last year and 92% of responders reported threat levels have increased in the past two years. Guard Square delivers the highest level of security for your mobile apps without compromising performance, time to market or user experience. Discover how Guard Square provides industry leading security for your Android and iOS apps at www.guard square.com. It is always my treat to welcome back to the show Tim Starks. He is a senior reporter at cyberscoop. Tim, welcome back.
