Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K. Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live hacking labs where you'll attack real environments, see how modern threats actually work, and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies, and technical deep dives focused on real world implementation. Whether you're Blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now@ZTW.com and take your Zero Trust strategy from theory to execution. Cyberweapons knock out Iranian air defenses during strikes on nuclear sites. Shiny hunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network impersonating law firms. Italy blocks cyber attacks aimed at Olympics. Infrastructure critical bugs put N8N and Google looker servers at risk of full takeover. A state backed shadow campaign hits governments worldwide. OpenClaw shows how AI powered attacks are becoming f cheaper and harder to stop. Our guest is Tony Scott, CEO of Intrusion, sharing his perspective on evolving regulations and the realities behind critical policy shifts. And your smartphone may testify against you. It's Thursday, february 5th, 2026. I'm dave buettner and this is your cyberw intel briefing. Thanks for joining us here today. It's great as always to have you with us. In an exclusive report recorded, Future says US Officials say the military used cyber weapons to disrupt Iranian air missile defense systems during June 2025 Strikes on nuclear facilities, marking a significant step in integrating cyber operations into conventional warfare. According to multiple officials, U.S. cyber operators targeted a connected military system, not the hardened sites at Fordo, Natanz and Isfahan themselves, to prevent Iran from firing surface to air missiles at incoming American aircraft. By striking an upstream aim point on the network, enabled by intelligence support from the National Security Agency, operators avoided the more difficult task of penetrating fortified systems directly. The previously unreported cyber component of Operation Midnight Hammer is described as among the most sophisticated actions taken by US Cyber Command against Iran. Senior military leaders later praised Cyber's role in supporting the strike package. Lawmakers have received classified briefings but are pressing for more public detail as officials emphasize that cyber capabilities are now treated alongside kinetic weapons as routine tools of military operations. Hackers operating under the name Shiny Hunters have leaked more than 1 million personal records stolen from Harvard University and and the University of Pennsylvania after ransom negotiations failed. The data, now posted on the group's DARC website, includes names, contact details, dates of birth, donation histories, estimated net worth and sensitive demographic information tied to students, staff, alumni and donors, according to reporting later verified in part by TechCrunch. The breaches stemmed from stolen single sign on credentials and voice phishing attacks giving attackers access to internal systems including VPN services and development databases. Neither incident involved ransomware encryption. Instead, the hackers opted to publish the stolen files after talks collapsed, exposing affected individuals to potential fraud and identity abuse. Automated investment platform Betterment disclosed a January breach that exposed personal data from roughly 1.4 million accounts. Analysis by have I Been Pwned? Found stolen data included names, email addresses, locations and in some cases birth dates, phone numbers and physical addresses. Attackers also sent fraudulent promotional emails after a social engineering attack following a forensic investigation with CrowdStrike, Betterment said no customer accounts, passwords or login credentials were compromised. Intermittent outages were later linked to a DDoS attack. According to Bleeping computer Researchers at Signia have uncovered a coordinated network of more than 150 cloned scam websites impersonating legitimate law firms. The campaign was identified after one firm reported brand impersonation, which investigators traced to a large persistent infrastructure designed to evade detection. The sites use multiple registrars, distinct SSL certificates and services like Cloudflare to obscure links between domains and complicate takedowns. The cloned sites appear aimed at repeat fraud victims offering fake legal services to recover previously lost funds, often claiming no upfront payment. Signia found reused phone numbers tied to earlier scams. Though attribution remains uncertain. Researchers warn that AI driven tools are making such large scale, convincing impersonation campaigns easier, faster and more common, increasing fraud risks for both businesses and individuals. Italy says it has blocked a wave of cyber attacks targeting Foreign Ministry offices and Winter Olympics related infrastructure just days before the Games open. Foreign Minister Antonio Tajani said the attempted intrusions, including one aimed at an office in Washington, were of Russian origin, although he offered no technical details. The attacks also targeted Olympics, websites and hotels as events began. Interior Minister matteo Piantadosi confirmed 6,000 security personnel are deployed across Games venues from Milan to the Dolomites, including counterterrorism units. Researchers have disclosed multiple high severity flaws in N8N that could let attackers hijack servers, steal credentials and silently manipulate automated and AI driven workflows. Rated at 9.4 on the CVSS scale. The bugs stem from improper sanitization of workflow expressions and and bypass protections added after a critical 2025 flaw. N8N confirmed that authenticated users with workflow permissions could trigger unintended command execution on the host system. Security firm Pillar Security warned that compromised servers could expose API keys and cloud or AI credentials, while Secure Layer 7 demonstrated low effort. Exploitation patches are now available and users are urged to update audit workflows and rotate sensitive credentials promptly. Researchers at Tenable disclosed two critical vulnerabilities in Google Looker that could allow attackers to fully compromise a Looker instance dubbed Lookout. The flaws include a remote code execution chain that could bypass isolation controls and cloud deployments and enable cross tenant access, and an authorization bypass that exposed Looker's internal MySQL database. Google patched the issues quickly in its managed Looker service, but organizations running customer hosted or on PREM versions remain at risk until they apply updates. Because Looker often handles highly sensitive business data, successful exploitation could expose secrets, credentials and internal configurations. Tenable urges affected organizations to verify patch levels immediately and review Google's security bulletin. Researchers at Palo Alto Networks say a state sponsored cyber espionage group has breached government and critical infrastructure organizations across dozens of countries. The firm tracks the actor as TGR STA 1030 and calls the activity the shadow campaign. Palo Alto reports high confidence the group operates out of Asia, citing regional infrastructure, language preferences and activity aligned with the GMT 8 time zone, though it stopped short of naming a country. According to Investigators, at least 70 organizations in 37 countries were compromised with reconnaissance spanning 155 countries. Targets included parliaments, senior officials, law enforcement, telecom providers and ministries tied to finance, trade and diplomacy. The attackers relied on phishing for initial access, exploited known vulnerabilities and deployed a previously unseen Linux kernel rootkit dubbed Shadowguard to maintain stealthy long term access. Security strategist Paul Miller examines the rapid evolution of the Open Claw system and highlights a troubling shift in cyber warfare toward fully automated AI driven attack ecosystems. Once a localized large language model with modular skills, OpenClaw has become a globally distributable and self replicating platform that effectively commoditizes advanced cyberattack capabilities. Its skills Autonomous modules for reconnaissance, exploitation, lateral movement and evasion are now spreading beyond the original platform through open source releases and underground marketplaces. This dissemination lowers the barrier to entry for cybercrime, enabling less skilled actors to deploy sophisticated attacks previously limited to elite or state sponsored groups. Researchers report hundreds of malicious skills masquerading as legitimate tools, stealing credentials and crypto assets. As these components are reused across unrelated infrastructures, attribution becomes harder and threats mutate more quickly. The trend underscores a broader move toward attack as a service, forcing defenders to prioritize speed, behavioral detection and unified automated security architectures to counter modular AI enabled threats at scale. Coming up after the break, my conversation with Tony Scott From Intrusion we're discussing evolving regulations and the realities behind critical policy shifts, and your smartphone may testify against you. Stick around. Ever wished you could rebuild your network from scratch to make it more secure, scalable and simple? Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full stack zero trust networks including hardware, firmware and software, all designed to work seamlessly together. The result? Fast, reliable and secure connectivity without the constant patching, vendor juggling or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security and vpn, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service, you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching effortless, transform complexity into simplicity, and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo@meter.com cyberwire that's M E T E R.com cyberwire.
