Loading summary
Narrator/Announcer
You're listening to the Cyberwire Network powered by N2K.
Dave Bittner
No, it's not your imagination. Risk and regulation are ramping up and
Maria Vermazes
customers expect proof of security just to do business. That's where Vanta comes in.
Dave Bittner
Vanta automates your compliance process and brings compliance, risk and customer trust together along
Maria Vermazes
with on one AI powered platform. Whether you're preparing for a SoC2 or
Dave Bittner
managing an enterprise GRC program, Vanta helps
Maria Vermazes
keep you secure and your deals moving.
Dave Bittner
Companies like Ramp and RYTR report spending 82% less time on audits.
Maria Vermazes
That's not just faster compliance, that's more time to focus on growth. When I look around the industry, I see over 10,000 companies, from startups to big enterprises trusting Vanta. Get started at Vanta.com, cyber.
Dave Bittner
CISA warns Copy Fail is under active exploitation Attackers compromise installers for a widely used disk imaging utility. Muddy water masks cyber espionage as ransomw attackers spread malware through a fake Open Claw plugin. Researchers ID a new Linux rat. Vimeo blames a third party provider for a recent breach. Palo Alto's captive portal is under attack. The FTC settles with a data broker over location sharing.
Maria Vermazes
A former Conti gang member gets jail time.
Dave Bittner
Our guest is Dov Yoran, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI and geotargeting turns creepy. It's Wednesday, may 6, 2026. I'm dave buettner and this is your cyberwire intel briefing. Thanks for joining us here today.
Maria Vermazes
It's great as always to have you with us.
Dave Bittner
CISA is warning that a newly disclosed
Maria Vermazes
Linux kernel flaw called Copy Fail is already being exploited, days after researchers released a working root level exploit. The bug allows low privileged users to gain full root access on vulnerable Linux systems. Cybersecurity consultancy Fiori says its AI powered testing platform Xint discovered the flaw and reported it in March. The company later released a proof of concept exploit that works against Ubuntu, Amazon
Dave Bittner
Linux, Red Hat, Enterprise Linux and SUSE Systems.
Maria Vermazes
Researchers warned most mainstream Linux kernels released since 2017 may be vulnerable. The attack requires minimal access and no user interaction, making it useful for attackers who already have an initial foothold. CISA has added the flaw to its known Exploited Vulnerabilities catalog and ordered federal agencies to patch by May 15. Microsoft says it is already observing early exploitation activity following the exploit's release.
Dave Bittner
Researchers at Kaspersky say attackers compromised installers
Maria Vermazes
for Daemon Tools, a widely used disk imaging utility, and distributed malware through the software's official website In a global supply chain attack. The malicious installers affected multiple versions and were first observed in early April. Kaspersky says thousands of infection attempts have been recorded across more than 100 countries. Most victims received a basic information stealing payload, while a smaller number of targets in government, science, manufacturing and retail sectors received more advanced malware, including a Backdoor linked to QuickRat.
Dave Bittner
Trusted software distribution channels remain a high
Maria Vermazes
value target for attackers Supply chain compromises can bypass traditional trust controls and quickly scale across organizations using legitimate software updates, disksoft, the Latvia based developer behind Demon Tools, says it is investigating.
Dave Bittner
Researchers at Rapid7 say the Iran linked threat group Muddy Water conducted an intrusion that appeared to be ransomware but operated
Maria Vermazes
more like a cyber espionage campaign. The attackers reportedly used Microsoft Teams social engineering to gain access through screen sharing sessions, then harvested credentials, manipulated multi factor authentication protections and deployed remote access tools including anydesk and DW agent. Rapid7 says the group conducted reconnaissance, moved laterally and exfiltrated data, but never deployed file encrypting ransomware. Instead, the attackers used chaos ransomware branding and extortion emails as apparent false flags while maintaining persistence in the victim environment.
Dave Bittner
The operation blurred the line between espionage
Maria Vermazes
and financially motivated cybercrime, potentially delaying incident response and attribution efforts. Rapid7 linked the activity to muddy water with moderate confidence based on infrastructure malware and operational patterns associated with previous campaigns tied to Iran's Ministry of Intelligence and Security.
Dave Bittner
Researchers at Zscaler Threat Labs say attackers are abusing the Open Claw AI automation
Maria Vermazes
framework to distribute malware through a fake plugin called DeepSeek Claw. The campaign targeted developers and autonomous AI agents by embedding malicious instructions into plugin files downloaded from public repositories on Windows systems. The malware chain deployed the Remcos remote access Trojan using DLL sideloading with a legitimate GoToMeeting executable on macOS and Linux. Attackers used obfuscated Node JS scripts and fake pass prompts to steal credentials, SSH keys, cryptocurrency wallets and cloud API tokens. Zscaler says the campaign also delivered the Ghost Loader information Stealer.
Dave Bittner
The operation highlights growing risks tied to
Maria Vermazes
high privileged AI tools and third party AI plugins. Researchers warn that autonomous AI agents introduce new attack services with broad system access, making supply chain vetting and behavioral monitoring increasingly important for enterprise defenders.
Dave Bittner
Researchers at Trend Micro have identified a Linux remote access Trojan called Qlnx that
Maria Vermazes
appears designed to steal developer credentials and compromise software supply chains. The malware targets Amazon Web Services credentials, Kubernetes tokens, Docker Hub logins get access tokens, NPM authentication tokens and PYPI API keys. Trend Micro says attackers could use the stolen credentials to publish malicious software updates or pivot into cloud environments. QLNX includes multiple stealth features including memory only execution, rootkit functionality, log clearing and six separate persistence mechanisms. The malware also deploys pluggable authentication module backdoors to harvest credentials and supports dozens of commands for remote control, file manipulation and data theft. Researchers warn the malware's danger comes from how its capabilities work together to establish long term stealth and persistent access inside developer environments. A successful compromise of a software maintainer could expose downstream users through poisoned packages and altered build pipelines,
Dave Bittner
Vimeo says A breach affecting more than 119,000 users originated through third party analytics provider Anodot, not Vimeo's own systems.
Maria Vermazes
According to have I Been Pwned? Attackers accessed customer email addresses and some associated names. Vimeo says the stolen data also included video titles and metadata, but not video content, login credentials or payment card information. The company linked the incident to compromised Anodot integrations and says it has since disabled the connection, revoked credentials and launched an investigation with outside security support.
Dave Bittner
Researchers and breach analysts warn that exposed
Maria Vermazes
email lists tied to contextual account data can fuel targeted phishing campaigns for years after a breach.
Dave Bittner
Palo Alto Networks is warning customers that attackers are exploiting a critical zero day flaw in the Pan OS user ID
Maria Vermazes
authentication portal, also known as the captive portal. The buffer overflow vulnerability allows unauthenticated attackers to execute arbitrary code with root privileges on exposed PA series and VM series firewalls. Palo Alto says limited exploitation has already been observed against Internet facing systems. The company has not yet released a patch and is urging customers to restrict portal access to trusted internal networks or disable the feature entirely.
Dave Bittner
Shadow Server says more than 5,800 vulnerable
Maria Vermazes
VM series firewalls remain exposed online.
Dave Bittner
The Federal Trade Commission and data broker Kochava have reached a proposed settlement that would bar the company from selling or
Maria Vermazes
sharing sensitive location data without explicit consumer consent. The FTC accused Kochava in a 2023 complaint of collecting and selling detailed geolocation data, mobile device identifiers, app usage information and income data. Regulators said the company's data could reveal visits to places like health clinics and houses of worship without users knowledge. Under the agreement, Kochava must implement programs to track sensitive locations, verify consent from data suppliers, limit data retention and allow consumers to withdraw consent or request information about data sales.
Dave Bittner
The case highlights growing regulatory pressure on
Maria Vermazes
the location data industry and the risks tied to large scale collection of precise consumer movement data. Kochava says the settlement reflects its commitment to privacy and responsible data practices.
Dave Bittner
A Latvian national accused of working with former members of the Conti ransomware group has been sentenced to 102 months in
Maria Vermazes
prison for conspiracy involving wire fraud and money laundering.
Dave Bittner
US Authorities say Denis Zola Tarzhov participated
Maria Vermazes
in ransomware operations between 2021 and 2023 that targeted more than 54 organizations using malware families, including Conti, Akira, Royal and Karakurt. Investigators say the attacks caused hundreds of millions of dollars in losses and involved the theft of sensitive personal and health information. Zolotarjoff was arrested in Georgia in 2023, extradited to the US in 2024, and pleaded guilty last year.
Dave Bittner
The case underscores continued international cooperation against
Maria Vermazes
ransomware operators and highlights how former Conti affiliates continue to appear across multiple ransomware as a service operations years after the group's original disruption.
Dave Bittner
Coming up after the break, my conversation with Dov Yaron, CEO of Command Zero, discussing how cybersecurity teams are fighting AI with AI and geotargeting turns creepy.
Maria Vermazes
Stay with us. And now a word from our sponsor, the center for Cyber Health and Hazard Strategies, also known as chhs. Looking for a graduate degree that will give you an edge on your professional career? Earn a Master of Science in Law
Dave Bittner
at University of Maryland, Cary School of Law.
Maria Vermazes
This part time, two year online graduate
Dave Bittner
degree program is designed for experienced professionals
Maria Vermazes
to understand laws and policies that impact your industry. Learn from CHHS faculty who are experts in their field, no GRE required. Learn how you can master the law
Dave Bittner
without a JD at law Umariland.
Maria Vermazes
Edu.
Sponsor Voice
Study and Play Come together on a Windows 11 PC and for a limited time, college students get the best of both worlds. Get the Unreal College Deal everything you need to study and play with select Windows 11 PCs. Eligible students get a year of Microsoft 365 Premium and a year of Xbox Game Pass ultimate with a custom color Xbox wireless controller. Learn more@windows.com studentoffer while supplies last ends June 30th terms at aka mscollegepc.
Maria Vermazes
Dov Yoran is CEO of Command Zero. I recently got together with him to
Dave Bittner
learn how cybersecurity teams are fighting AI with AI. So today we're talking about AI and
Maria Vermazes
how folks are kind of fighting fire with fire when it comes to AI.
Dave Bittner
Can we start off with some high level stuff?
Maria Vermazes
Can you give us a little bit of the history and background of what led us to this particular place where we find ourselves when it comes to AI and how People are using it in their socks.
Dov Yaron
Yeah, it's been a gradual process, always refining and helping SOC analysts move forward and continue to increase their productivity given technology gains, cloud SaaS and other things. And AI is really the next revolution in that series. So that's something that's been a gradual step up, if you will. And now with the advent of AI, it's been an incredible catapult moving forward to really level the playing game amongst analysts of different experience levels and different sized organizations and so on and so forth.
Dave Bittner
So where do we stand right now when it comes to the threat actors
Maria Vermazes
adopting these AI tools?
Dov Yaron
Attackers move pretty fast and they're unencumbered by procurement and the legal process. Right. So the clearest examples are in automation and skill. Right. AI lets adversaries chain tools together autonomously. Reconnaissance, lateral movement, exfiltration with the speed and precision that wasn't really possible before. So they're effectively leveraging and operating with LLM speed. So while we're also seeing AI used to craft more convincing phishing and social engineering attacks at volume and at scale. So we used to require skilled human, now takes just a few moments to generalize or to generate and personalize at scale. And that's obviously a big concern. Right. AI is lowering that barrier of attack, that sophistication. You don't need nation state teams and technologies and resources to run advanced operations anymore. That's asymmetrical. Defenders are still largely doing manual parts and trying to increase their, their SOC efficiencies, but that's a pretty core problem that we're trying to solve right now in the industry.
Maria Vermazes
And so on the defender's side, what sorts of tools are available to them
Dave Bittner
to help ward off these AI threats?
Dov Yaron
Yeah, the most immediate impact is investigation speed. What we hope platforms such as Command Zero. Right. The being able to have a thorough, alert investigation that used to consume analysts entire day. With AI agents, that same investigation can be completed in minutes. So you're pulling context from various platforms in the environment, from your endpoints, from your identity, from your email, from your cloud threat intel, so on and so forth. Right. And you're delivering really a more comprehensive report with a verdict. And speed is certainly a high mark, but that's really only part of it. The deeper value is the consistency and thoroughness, not human. Analysts have good days and bad days, but AI agents don't. And so every investigation follows similar methodologies, asks the same levels of questions, the same standards, the same consistencies that manual processes can really have a tough time delivering at scale. So at command zero, we're seeing AI compress that skills gap that I mentioned earlier between your junior or your lesser experienced folks and your more experienced teams. And so those tasks that once required just senior analysts because they needed that experience, that knowledge of different applications across different platforms can now be done in a much simpler way and in a much more consistent way across that entire team. That we think is that big sea change in structurally changing how SOCs operate today and leveraging AI as part of that solution.
Dave Bittner
Can you share with us what the
Maria Vermazes
onboarding process is like as people adjust to the new reality of these tools?
Dave Bittner
Is there a period of time where they're kind of gaining trust with them, they're getting used to them, seeing how the changes are going to be implemented in their world?
Dov Yaron
Our experience is incredibly short. It's a matter of days, sometimes a week or two. It's understanding the environment, is deploying. It's a cloud only solution set. So having access to some of the data elements, enabling that takes minutes and auto generating content, you know, usually within a few hours. And the team honestly can rock and roll. So they're looking at the events they're being guided through and shown investigations, they're looking at conclusions and all the varying underlying data that comprises those conclusions and even subordinate conclusions that weren't finalized. All those things really make for a rich experience and it really up levels all those analysts in our client base.
Dave Bittner
Right.
Dov Yaron
The More experienced Tier 3 folks have the ability to leverage and replicate their investigations to more junior folks and showing that ability, not only Billy, but that comprehensive outlook on what was discovered and what remediation and conclusions are driven from that as opposed to. Or in addition to the more junior team members now being able to ask questions and follow an auto prompt and auto generate investigations on data sources that they wouldn't normally be able to master without more experience.
Maria Vermazes
How are we ensuring that appropriate guardrails are put on these systems to make sure that they don't stray beyond what we want them to do?
Dov Yaron
Yeah, that's a great point and that's I think a major concern. Enterprises should be mindful of what we do to keep tapped on. That is we have very specific and very limited use of agents and how they're being deployed, the types of things that they have access to, the types of questions that they have in their arsenal and the types of information that they're collecting. From our standpoint, all of that is completely transparent. So you can see a full rap sheet on what was asked, how it was asked, the types of information that was drawn back. In my opinion, that trust in AI is built on this transparency and the auditability and the reproducibility of these investigations. So having these agents as part of a human investigation, collaborating deeply with the human, all these things are reproducible and more deterministic. I think all of those are helpful in the checks and balances of keeping a proper governance model on your agents as opposed to letting them just run wild in the environment.
Maria Vermazes
What is your sense for where we're headed with these things?
Dave Bittner
I mean, I think it seems like certainly AI is our future here, but do you have any sense for where
Maria Vermazes
this might grow into?
Dave Bittner
What are some of the things that
Maria Vermazes
people can look forward to?
Dov Yaron
Yeah, I mean, listen, it is great. And even the short term and even now, right? The mundane tasks and the tedious tasks that are even prone to error and user error because they're so repetitive, a lot of those things can be automatically pulled out and addressed by agents. So it is really up leveling that human talent and providing enabling more creativity and more superhuman capabilities of leveraging better automation and agentic workflows into their environment. Honestly, I see it expanding to beyond just the pure security operations center, into other adjacencies, into cyber and into other domains of the CISO's charter and domain of control, span of control. Similarly, how that reflects AI in general, how we're seeing that transform and broaden its reach in and across society at large. So it's super exciting.
Maria Vermazes
That's Dov Yaran from Command zero.
Narrator/Announcer
When you need to build up your team to handle the growing chaos at work, use Indeed sponsor jobs. It gives your job post the boost it needs to be seen and and helps reach people with the right skills, certifications and more. Spend less time searching and more time actually interviewing candidates who check all your boxes. Listeners of this show will get a $75 sponsored job credit@ Indeed.com podcast. That's Indeed.com podcast terms and conditions apply. Need a hiring hero? This is a job for Indeed.
Home Depot Sponsor
Sponsored Jobs it's time to refresh your yard during Spring Backyard Days at the Home Depot. Get low prices guaranteed on propane grills starting at $179 like the next grill 3 burner gas grill. Or get $50 off the select Weber Spirit Grill and bring big flavor to your backyard. Then set the scene with Hampton Bay String lights that bring it all together. Shop Spring backyard days for seven days at the Home Depot now through May 6th. Exclusions apply to homedepot.com pricematch for details.
Dave Bittner
And finally a 19 year old university of Tennessee student is suing the makers
Maria Vermazes
of the dating app Meat that's M E e T e, alleging the company
Dave Bittner
turned a harmless TikTok graduation video into
Maria Vermazes
an ad suggesting she was looking for
Dave Bittner
friends with benefits, then Geo targeted the
Maria Vermazes
promotion to people near her dorm.
Dave Bittner
College introductions can be awkward enough to begin with, but according to the lawsuit, she discovered it by people introducing themselves saying, hey, I keep seeing your dating
Maria Vermazes
app ad on Snapchat. The complaint alleges Meet edited her video, added graphics and a voiceover and used location based targeting to serve the ads
Dave Bittner
to nearby men without her consent.
Maria Vermazes
Her attorney says the campaign damaged her reputation and created real safety concerns by falsely implying she endorsed the app and was soliciting hookups.
Dave Bittner
The case highlights how simple editing tools
Maria Vermazes
and ad targeting systems can weaponize someone's likeness without sophisticated AI. Snap says it's investigating while Meet's listed publisher, which advertises safety and respect first, has not publicly responded.
Dave Bittner
And that's the Cyber Wire.
Maria Vermazes
For links to all of today's stories,
Dave Bittner
check out our daily briefing@thecyberwire.com we'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in
Maria Vermazes
the rapidly changing world of cybersecurity.
Dave Bittner
If you like our show, please share
Maria Vermazes
a rating and review in your favorite podcast app.
Dave Bittner
Please also fill out the survey in the show notes or send an email to cyberwire2k.com N2K's lead producers, Liz Stokes,
Maria Vermazes
were mixed by Trey Hester with original music and sound design by Elliot Peltzman. Our contributing host is Maria Vermazes.
Dave Bittner
Our executive producer is Jennifer Ibin.
Maria Vermazes
Peter Kilpy is our publisher and I'm Dave Bittner.
Dave Bittner
Thanks for listening. We'll see you back here tomorrow.
Narrator/Announcer
Some Follow the noise Bloomberg follows the money Whether it's the funds fueling AI or crypto's trillion dollar swing, there's a money side to every story. Get the money side of the story. Subscribe now@bloomberg.com.
Date: May 6, 2026
Host: Dave Bittner (N2K Networks)
Guest: Dov Yoran, CEO of Command Zero
In today's episode, CyberWire Daily brings an incisive update on the latest cybersecurity threats and incidents, including the rapid exploitation of major Linux vulnerabilities, high-profile supply chain attacks, and a notable interview on the role of AI—both as a new attack vector and a powerful defensive tool. The episode also spotlights regulatory actions, the impact of data breaches, and a legal case illustrating the dark potential of geotargeted ad campaigns.
On the changing threat landscape:
“AI lets adversaries chain tools together autonomously... with speed and precision that wasn’t really possible before.”
— Dov Yoran (16:10)
On the benefits of AI for defenders:
“The deeper value is the consistency and thoroughness... every investigation follows similar methodologies... the same consistencies that manual processes can really have a tough time delivering at scale.”
— Dov Yoran (18:52)
On agent guardrails:
“In my opinion, that trust in AI is built on this transparency and the auditability and the reproducibility of these investigations.”
— Dov Yoran (21:10)
| Segment | Start | End | |----------------------------------------------|--------|--------| | News Rundown & Major Threats | 01:21 | 12:56 | | Dov Yoran Interview: AI vs. AI in Security | 14:45 | 24:14 | | Lawsuit: Geotargeted Dating App Ad | 25:34 | 26:35 |
This episode highlights the breakneck speed of AI adoption on both sides of the cybersecurity arms race. With critical vulnerabilities and supply chain attacks on the rise, defenders are urged to leverage AI for rapid, consistent, and comprehensive investigations while remaining vigilant about vendor risk, regulatory change, and the unintended consequences of technologically enabled geotargeting. Dov Yoran’s interview offers a pragmatic, optimistic view: AI is not just an accelerant for adversaries, but a transformative asset for defenders—if wielded with transparency and care.