Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live hacking labs where you'll attack real environments, see how modern threats actually work and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies and technical deep dives focused on real world implementation. Whether you're Blue team, Red team or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now@ZTW.com and take your Zero Trust strategy from theory to execution. CISA cracks down on aging edge devices Congress looks to shore up energy sector security DHS facial recognition software may fall short. Romania's national oil pipeline operator suffers a cyber attack. The European Commission may fine TikTok for being addictive. Dknife is a China linked threat actor operating a long running adversary in the middle Campaign researchers say Open Claw is being abused at scale. Our guest is Mike Carr, Field CTO at Zona, talking about how Italy is thinking about protecting the 2026 Winter Olymp and a base jumper attempts a daring AI alibi. It's Friday, february 6, 2026. I'm dave bittner and this is your cyberwire intel brief. Foreign thanks for joining us here today. Happy Friday. It is great to have you with us. US Federal civilian agencies have been ordered to identify and remove aging network security gear before it becomes an easy entry point for attackers. The directive comes from cisa, which has issued a binding operational directive requiring agencies to inventory and replace end of support edge devices, including firewalls, routers and VPN gateways that no longer receive vendor patches. Agencies must immediately update supported equipment, produce a full edge device inventory within three months, and remove unsupported devices from networks within a year. A two year deadline follows for putting tracking systems in place to prevent future lapses. CISA says obsolete edge hardware has become a substantial and constant risk since compromised perimeter devices can provide fast access to internal systems. Acting CISA Director Madhu Garamukhala framed the move as part of a broader effort developed with the Office of Management and Budget to harden government networks against sustained cyber campaigns. A House Energy Subcommittee has advanced five bipartisan bills designed to strengthen the physical and cybersecurity of the United States energy sector. The measures focus on modernizing programs at the Department of Energy, hardening the electric grid and pipelines, and prioritizing cybersecurity for smaller and more vulnerable utilities. Key proposals include the Energy Emergency Leadership act, which expands doe's authority to respond to energy emergencies, and the Rural and Municipal Utility Cybersecurity act, extending cybersecurity support and grants for small and rural utilities through 2030. Other bills target grid resilience, pipeline cybersecurity and reauthorization of the Energy Threat Analysis center to improve threat analysis and information sharing. While the bills advanced unanimously, they still must clear full committee review, House and Senate votes and reconciliation. The effort aligns with doe's recent Liberty Eclipse exercise, which trains industry and government partners to respond to major cyber attacks on energy infrastructure. According to reporting by Wired, the Department of Homeland Security has deployed a face recognition app called Mobile Fortify nationwide without the level of privacy scrutiny that previously governed such technologies. Launched in spring 2025, the tool is used by immigration agents from Immigration and Customs Enforcement and Customs and Border Protection during street level encounters far from the border. Despite DHS describing Fortify as a way to verify identities, records and expert testimony show it only generates possible matches, not confirmations, and can easily misidentify people, including US Citizens reporting documents. Agents using the app on bystanders and protesters, often without consent and relying on factors like language or appearance to escalate stops. Fortify expands biometric collection into routine encounters, feeding long retained databases linked through DHS systems. Critics say the tool was fast tracked after DHS dismantled centralized privacy oversight, raising serious concerns about accuracy, civil liberties and unchecked surveillance. Powered by algorithms Romania's national oil pipeline operator Konpet said a cyberattack disrupted parts of its IT environment and knocked its website offline but did not affect oil transport operations. The company said operational technology systems including scada, remained fully functional and and contractual obligations were unaffected. Kahnpet has not confirmed a data breach, though the Ken Ransomware Group has claimed responsibility and alleged large scale data theft. Kahnpet says it is working with Romanian cybersecurity authorities to investigate and restore systems. Photo sharing platform Flickr is warning users about a potential data exposure tied to a vulnerability at a third party email service provider. The flaw may have exposed real names, email addresses, IP addresses, location data and account activity, though Flickr says passwords and payment details were not affected. The company shut down access within hours after being alerted on February 5 and has not disclosed how many users were impacted. Flickr is urging vigilance against phishing and a review of account settings. The European Commission says TikTok may face a major fine for violating the EU's Digital Services act by deploying addictive design features. Regulators preliminary findings say Infinite scroll, autoplay, push notifications and personalized recommendations encourage compulsive use and were not properly assessed for risks to users mental and physical well being, particularly minors. The commission found TikTok ignored warning signals such as late night use by children and frequent app openings. If confirmed, the violations could lead to fines of up to 6% of TikTok's global annual revenue. EU Tech Commissioner Henna Virkunin said platforms are responsible for user harm under the DSA. Regulators argue TikTok's existing safeguards are ineffective and say core design changes may be required to avoid penalties. Researchers at Cisco Talos say a China linked threat actor has operated a long running adversary in the middle framework dubbed D Knife since at least 2019. The Linux based toolset monitors and manipulates network traffic to deliver and manage backdoors such as shadowpad and Dark Nimbus, mainly targeting Chinese speaking users. Talos found overlaps with earlier spellbinder framework suggesting shared development. Dknif can hijack downloads, steal credentials and intercept encrypted traffic, reinforcing assessments that it is operated by China nexus threat actors. Researchers at bitdefender Labs warn that the fast growing open source AI project OpenClaw is being abused at scale by cybercriminals. OpenClaw, which has amassed more than 160,000 stars on GitHub, allows users to add skills that automate tasks across apps. Bitdefender found that about 17% of skills analyzed in early February were malicious. According to the research, attackers clone legitimate tools with subtle name changes and and hide harmful instructions in descriptions. Many of the malicious skills target cryptocurrency users stealing wallet keys or delivering malware on macOS, but researchers also observed spread into corporate environments. One account was linked to 199 fake skills. Bitdefender says users should treat AI skills like full software installs and verify them carefully before use. This week's Threat Source newsletter from Cisco Talos warns security professionals against rushing to adopt poorly vetted AI tools and highlights the growing risks at the network edge. Author Joe Marshall calls out OpenClaw for requiring users to hand over sensitive credentials and system access. According to the newsletter, those secrets are often stored insecurely while unvetted skills are already being actively exploited, making the platform a high risk proposition for users and organizations. The piece urges skepticism toward hype driven AI releases that prioritize convenience over security, arguing that users are being asked to absorb unreasonable risk. The takeaway is Hardened gateways audit firmware and binaries, enforce strong authentication and closely monitor network traffic because attackers increasingly operate where traditional endpoint defenses cannot see. Coming up after the break, Mike Carr from Zona talks about how Italy should be thinking about protecting the 2026 Winter Olympics, and a base jumper attempts a daring AI alibi. Stay with us. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity, and give your team time to focus on what really matters helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire foreign. If securing your network feels harder than it should be, you're not imagining it. Modern businesses need strong protection, but they don't always have the time, staff or patience for complex setups. That's where Nord layer comes in. Nordlayer is a toggle ready network security platform built for businesses. It brings vpn, access control and threat protection together in one place. No hardware, no complicated configuration. You can deploy it in minutes and be up and running in less than 10. It's built on zero trust principles so only the right people can get access to the right resources. It works across all major platforms scales easily as your teams grow and integrates with what you already use. And now Nordlayer goes even further through its partnership with CrowdStrike, combining NordLayer's network security with Falcon endpoint protection for small and mid sized businesses. Enterprise grade security made manageable. Try Nordlayer risk free and get up to 22% off yearly plans plus an extra 10% with the code CYBERWIRE10. Visit nordlayer.com cyberwire daily to learn more. Mike Carr is field CTO at Zona. I recently caught up with him to discuss how Italy should be thinking about protecting the 2026 Winter Olympics.
