Transcript
A (0:02)
You're listening to the Cyberwire Network, powered by N2K.
B (0:14)
Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live Hacking Labs where you'll attack real environments, see how modern threats actually work and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies and technical deep dives focused on real world implementation. Whether you're blue team, red team or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now at ztw.com and take your zero trust strategy from Theory to execution.
A (1:31)
At long last, a TikTok deal officials urge lawmakers makers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass Ireland plans to authorize spyware for law enforcement. OCTA warns customers of sophisticated vishing kits. Under Armour investigates data breach claims. CISA adds a Zimbra collaboration suite flaw to the known exploited vulnerabilities list. Core opsec enables recovery of data stolen.
B (1:58)
By the Ink ransomware gang.
A (2:00)
The DOJ deports a pair of Venezuelans convicted of ATM jackpotting. Our guest is Chris Nyhais, founder and CEO of Vigilant Sharing Practical Steps to Protect Money, Identity and devices and Karl pulls the plug on bug bounties after drowning an AI swap. It's Friday, January 23rd, 2026. I'm Dave Buettner and this your Cyberwire Intel Briefing. Thanks for joining us here today. It's great to have you with us. TikTok announced it has reached a deal for its US operations to be majority owned by non Chinese investors, ending a six year political and legal battle over national security concerns. Under the agreement, Investors including Oracle, MGX, Silver Lake and Michael Dell's investment office will now own more than 80% of a new US based TikTok entity, while ByteDance will retain just under 20%. Former TikTok executive Adam Presser will lead the new company. The deal aims to address U.S. fears that China could exploit TikTok to surveil or influence American users, a concern that led Congress to pass a 2024 law threatening a ban if ByteDance did not divest. While the agreement allows TikTok to remain in the US market. Critics note that ByteDance will still license its algorithm to the new company, raising questions about whether security concerns are fully resolved. President Trump praised the deal, calling it a decisive conclusion to the long running dispute. Federal officials warned lawmakers that the lapse of the National Quantum Initiative act risks undermining US Leadership in quantum computing, despite the law's success in strengthening coordination across government, academia and industry. Testifying before the House Science Committee, leaders from the Department of Energy, NIST, NASA and the National Science foundation said the 2018 law created a unified national framework, aligned federal investments and accelerated progress from lab research toward early stage quantum systems with scientific and security relevance. The act expired in 2023, creating uncertainty for funding and workforce pipelines. Lawmakers have introduced a bipartisan reauthorization bill that would authorize nearly $1.5 billion to expand research, commercialization and workforce development. Witnesses cautioned that without sustained investment and stable authorization, the US could fall behind global competitors, particularly China, in the accelerating race to quantum capabilities. Fortinet confirmed active exploitation of a critical forticloud SSO authentication bypass after customers reported compromises of fully patched firewalls. Researchers at Arctic Wolf say Automated attacks began January 15th with attackers rapidly creating admin and VPN accounts and exfiltrating configurations. Fortinet acknowledged the activity mirrors December exploitation and is working on a complete fix until then. Fortinet urges customers to restrict admin access, disable forticloud SSO and treat effective systems as compromised. CISA has listed the flaw as actively exploited. Ireland plans to draft legislation that would explicitly authorize law enforcement to use spyware, According to Justice Minister Jim o', Callaghan, the proposal would create a legal basis for covert surveillance software and expand lawful interception powers to combat serious crime and security threats. Use of spyware would require court authorization and include safeguards to ensure necessity and and proportionality. The bill would also allow electronic scanning tools to collect mobile device identifiers for location tracking. Ireland's Department of Justice will develop the framework with other state agencies. Okta is warning customers about sophisticated phishing kits designed specifically for voice based social engineering or vishing attacks that steal single sign on credentials in real time. According to Okta and reported by Bleeping Computer. The kits are sold as a service and actively used by multiple threat groups during phone calls. Impersonating IT staff. Attackers guide victims through fake login pages that dynamically mirror real authentication and multi factor prompts, allowing credentials and one time passcodes to be intercepted and immediately abused. The attacks can bypass push based MFA and have been used for large scale data theft and extortion, with some activity linked to Shiny Hunters. Okta urges customers to adopt phishing resistant MFA such as Fido 2 keys or passkeys. Under Armour is investigating claims of a major data breach after hackers allegedly posted 72 million customer records online. The incident was flagged by have I Been Pwned? Which linked it to a November 2025 attack attributed to the Everest ransomware Group. Exposed data reportedly includes emails, names, demographics, locations and purchase details, but not payment card data. Under Armour says it's investigating and disputes claims that sensitive systems or passwords were compromised. CISA is urging federal agencies to immediately patch a Zimbra collaboration suite flaw that is being actively exploited. The vulnerability is a local file inclusion issue in Zimbra's webmail interface that allows unauthenticated attackers to access arbitrary files by manipulating request routing. Exploitation could expose sensitive information and enable further compromise if combined with other weaknesses. Although Zimbra released patches in November of last year, CISA added the bug to its known exploited Vulnerabilities catalog this week. Researchers at CrowdSec reported targeted intelligence driven attacks and rising exploitation. CISA also flagged three additional actively exploited vulnerabilities and reminded organizations to prioritize kev listed flaws. Researchers uncovered a major operational security lapse by the Ink ransomware gang that allowed full recovery of data stolen from a dozen US Organizations. The work was conducted by Cyber Centaurs, which shared full findings with Bleeping Computer. While investigating a Rain Inc. Ransomware attack on a client, analysts discovered remnants of the backup tool RESTIC that exposed long lived attacker infrastructure. Scripts with hard coded credentials pointed to cloud repositories storing encrypted data from multiple victims. Controlled analysis confirmed data from 12 unrelated US organizations across healthcare, manufacturing, technology and service sectors. Researchers decrypted and preserved the data, contacted law enforcement and released detection rules to help defenders spot RESTIC abuse tied to Ink ransomware activity. The U.S. justice Department has announced the deportation of two Venezuelan nationals convicted of ATM jackpotting using malware. U.S. department of justice said Luz Granados and Johan Gonzales Jimenez installed malware on ATMs to force machines to dispense cash. Granados received time served and restitution orders, while Gonzalez Jimenez was sentenced to 18 months in prison before deportation. The cases follow broader prosecutions tied to Venezuelan crime groups using the Plautus malware, which authorities say remains active. Coming up after the break, my conversation with Chris Nyhuis, founder and CEO of Vigilant. We're discussing practical steps to protect your money, your identity and your devices and Curl pulls the plug on bug bounties after drowning in AI slop, Stick around.
