CyberWire Daily - France builds its own digital future.

Episode Date: April 14, 2026

France pushes digital sovereignty. Adobe rushes an Acrobat Reader patch. Booking.com confirms a targeted breach. SAP fixes a critical SQL injection bug. A sanctions-dodging fraud network resurfaces. V...iperTunnel infiltrates U.S. and U.K. firms. GlassWorm spreads across developer tools. Researchers dissect Predator spyware’s kernel engine. A lawsuit challenges AI transcription in hospitals. Ted Shorter from Keyfactor unpacks quantum computing at scale. On our Threat Vector segment, David Moulton and ⁠Elad Koren⁠ pull back the curtain on agentic-first security. Preparing for post-quantum perils.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Ted Shorter, CTO and Co-Founder of Keyfactor, discussing the advent of quantum computing at scale, known as "Q-Day". Threat Vector Host David Moulton speaks with returning guest ⁠Elad Koren⁠, Vice President of Product Management for Cortex Cloud at ⁠Palo Alto Networks⁠ on this Threat Vector segment. Together they pull back the curtain on what an agentic-first security experience actually looks like in practice. This isn't a vision deck. The agents are already running. To listen to the full conversation, check it out here. Catch new episodes of Threat Vector every Thursday on your favorite podcast app. Selected Reading France Tees Up Big Public Sector Move Away From US Tech (BankInfo Security) Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw (Bleeping Computer) Booking.com Confirms Data Breach as Hackers Access Customer Details (Hackread) SAP Patches Critical ABAP Vulnerability (SecurityWeek) Triad Nexus Evades Sanctions to Fuel Cybercrime (SecurityWeek) Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses (Hackread) GlassWorm evolves with Zig dropper to infect multiple developer tools (Security Affairs) Predator Spyware's iOS Kernel Exploitation Engine: PAC Bypass, NEON R/W & More (Jamf Threat Labs) Lawsuit: AI Illegally Recorded Doctor-Patient Encounters (BankInfo Security) World Quantum Day (WorldQuantimDay) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Today's sponsor, Rapid 7, has an irresistible invitation for you SISOs and security practitioners out there. A free two-day virtual summit, the subject, preemptive security. Join the Global Cybersecurity Summit on May 12th and 13th from wherever you like. A-list speakers will show you how organizations are disrupting attacks before they can blow towards. your day. You'll see how exposure management, MDR, and AI together let you
Starting point is 00:00:41 make the decisive move. Registration is open at rapid 7.brighttalk.com. France pushes digital sovereignty, Adobe rushes an acrobat reader patch. Booking.com confirms a targeted breach. SAP fixes a critical SQL
Starting point is 00:01:11 injection bug. A sanctions dodging fraud network resurfaces. Viper tunnel infiltrates U.S. and UK firms, glassworms spreads across developer tools. Researchers dissect predator spyware's kernel engine. A lawsuit challenges AI transcription in hospitals. Ted Schorter from Key Factor unpacks quantum computing at scale. On our threat vector segment, David Moulton and Elad Koren pull back the curtain on agentic first security and preparing for post-quantum perils. It's Tuesday, April 14, 26.
Starting point is 00:02:00 I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. It's great as always to have you with us. France is accelerating efforts to reduce reliance on U.S. technology across its public sector, with all government ministries required to submit plans by this fall, outlining how they'll shift toward European or open-source alternatives. The Inter-Ministerial Directorate for Digital Affairs, or Dinam has already begun migrating from Microsoft Windows to Linux
Starting point is 00:02:47 and replacing foreign video conferencing tools with the domestic Vizio platform. Officials describe the initiative as part of a broader strategy to strengthen digital sovereignty and regain control over data, infrastructure, pricing, and vendor risk. Although Dyham itself is small, the directive signals a government-wide shift affecting areas such as workstations, antivirus, artificial intelligence, databases, virtualization, and collaboration tools. France has also moved tens of thousands of health insurance staff onto domestic platforms.
Starting point is 00:03:25 The effort reflects a wider European trend, with Denmark, Germany, and Austria pursuing similar transitions amid concerns about dependence on U.S. providers. Adobe has issued an emergency security update for Acrobat Reader to address a zero-day vulnerability exploited in attack since at least December. The flaw allows malicious PDF files to bypass sandbox protections and access privileged JavaScript APIs, enabling arbitrary code execution and theft of local files simply by opening a document.
Starting point is 00:04:03 The issue was identified by Expemon founder of, Hafei Lee after analysis of a suspicious sample, with additional attacks reported using Russian language oil and gas lures. Adobe initially rated the flaw critical before lowering its severity score and released patches for affected Windows and Mac OS versions. With no mitigations available, users are advised to update immediately. Booking.com has notified customers of a targeted data breach involving unauthorized access to portions of its reservation records. Exposed information may include names, email addresses, phone numbers, postal addresses, and booking details, though the company says payment data was not affected. Booking.com reported it detected and contained
Starting point is 00:04:54 the activity, reset booking-related pin codes, and warned users to watch for suspicious communications impersonating hotels or support staff. Security experts cautioned that access to real reservation details could enable highly convincing fishing, smishing, or vishing attacks. The company has not disclosed how the breach occurred or how many users were impacted. Given its large global user base, analysts say the lack of detail increases risk and customers should treat unexpected booking-related messages with caution. SAP released 20 security notes in its April 26 patch day update, including fixes for a critical SQL injection flaw affecting business planning and consolidation and business warehouse.
Starting point is 00:05:45 The bug could allow low-privileged users to execute arbitrary SQL and access or alter sensitive financial data. SAP also patched a high-severity authorization issue alongside multiple media. and low severity vulnerabilities across several products. No active exploitation has been reported. Users are advised to apply updates promptly. Triad Nexus, a large cybercrime operation linked to Asian organized crime has continued global fraud activity despite sanctions, according to silent push.
Starting point is 00:06:23 Active since at least 2020, the group has caused more than $200 million in losses through cryptocurrency investment scams known as pig-butchering, along with brand impersonation and fishing campaigns. After U.S. sanctions targeted its infrastructure partner Funnull, Triad Nexus shifted tactics using front companies, cloud services, account mules, and infrastructure laundering to maintain operations. The group now geofences U.S. users and is expanding into Spanish, Vietnamese, and Indonesian markets. It also continues relying on bulletproof hosting and hundreds of rotating domains to evade detection while targeting major financial institutions and global brands with convincing cloned websites. Viper Tunnel, a newly identified backdoor discovered by InfoGuard,
Starting point is 00:07:19 has been found inside networks of U.S. and UK businesses and is being used to maintain persistent access later sold to ransomware groups, such as Ransom Hub. Often deployed after fake updates or SOC-Golish infections, the tool hides inside a standard Python module that automatically executes malicious code. Disguised as a system file and protected with multiple encryption layers, it establishes a covert SOX-5 proxy over Port 443 to blend into normal traffic.
Starting point is 00:07:53 Researchers link the malware to UNC 2165, associated with EvilCore. Its evolving modular design and early Linux indicators suggest possible future cross-platform targeting. Glassworm has expanded from malicious NPM packages into a broader software supply chain operation, targeting GitHub NPM, Visual Studio Code ecosystems, and developer browser extensions, according to Akito Security.
Starting point is 00:08:26 In its latest activity, attackers distributed a fake open VsX extension impersonating WakaTime that deployed a ZIG compiled binary dropper with full system access outside the JavaScript sandbox. The malware scans for IDEs such as VS code, cursor, and VS codium, then installs additional malicious extensions across them and removes installation traces. The second stage payload communicates with a salana-based command and control infrastructure, steals data, and installs a persistent remote-access Trojan, including a malicious chrome extension. Researchers advise treating affected systems as compromised and rotating exposed credentials immediately. Predator spyware uses a previously unreported kernel exploitation engine to achieve deep system access on iPhone, phones running iOS versions prior to 17, according to new reverse engineering research from JAMF. The framework relies on a kernel read and write primitive, which repurposes Arm Neon
Starting point is 00:09:38 Vector registers as a covert channel to access kernel memory. This enables predator to bypass protections such as pointer authentication codes by locating signing gadgets inside Apple's JavaScript Core Framework and using a pre-computed cache of signed pointers for fast hook execution. Additional components support remote function execution across processes, transfer kernel privileges between helper modules, and resolve Objective C methods despite address randomization. The toolkit supports 21 iPhone models through the A-16 generation. Researchers say the architecture highlights the growing sophistication of commercial spyware post-exploitation techniques and their ability to undermine hardware-level defenses.
Starting point is 00:10:29 A proposed federal class action lawsuit alleges Sutter Health and Memorial Care Medical Foundation violated privacy laws by using an AI documentation tool from Abridge AI to record patient clinician conversations without informed consent. Plaintiffs claim the system captured sensitive medical details, including symptoms, diagnoses, medications, and mental health disclosures, then transmitted transcripts outside clinical environments for processing. The lawsuit alleges violations of California privacy statutes, medical confidentiality rules, unfair business practice laws, and a federal wiretapping law. A bridge's ambient clinical documentation platform automates note-taking during appointments,
Starting point is 00:11:21 addressing physician workload tied to electronic records. Legal experts say organizations adopting such tools must ensure clear notice, opt-out options, and appropriate data governance, and may require HIPAA business associate agreements if vendors retain recordings or transcripts. Coming up after the break, Ted Schroeder from Key Factor unpacks quantum computing at scale. On today's segment from the Threat Vector podcast, David Moulton speaks with returning guest Elad Koren. They're discussing agentic first security and what it actually looks like in practice. And speaking of quantum, preparing for post-quantum perils.
Starting point is 00:12:13 Stay with us. And now a word from our sponsor, Arcova, formerly Morgan Franklin Cyber. Arcova is a global cybersecurity and AI consulting firm built by practice. petitioners who've been in the seat. They work directly with enterprise teams to solve complex security challenges, building secure-by-design programs that hold up as technology and threats evolve. From focused engagements to long-term partnership, Arcova delivers outcomes that endure because no one should navigate complexity alone. Learn why leading global enterprises trust Arcova at www.arkova.com. That's A.R.C-O-V-A.com.
Starting point is 00:13:14 No, it's not your imagination. Risk and regulation really are ramping up, and these days customers expect proof of security before they'll even do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're getting ready for a sock, to or managing an enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals moving. Companies like Ramp and writers spend 82% less time on audits with Vanta. That means less time chasing paperwork and more time focused on growth. For me, it comes down to this. Over 10,000 companies from startups to large enterprises trust Vanta to help prove their security.
Starting point is 00:14:13 Get started at vanta.com slash cyber. Ted Schorter is CTO and co-founder of Key Factor. I recently got together with him to discuss the advent of quantum computing at scale, known as Q-Day. There's been a ton of research. It's a term I probably heard first maybe 30 years ago when I was working for the government. But it's been the sort of nebulous, you know, may happen, may not sort of thing for, you know, research, project for a very long time. But a lot has been happening that's made it much more real of late.
Starting point is 00:14:59 And I think, you know, first off, there are multiple organizations building quantum computers of various strengths and continue to improve them. And I think, you know, a number of things are on the cusp of happening. One is, I think we are getting to a point where sometime likely within the next year or two, we're going to reach a point where quantum computers are able to perform computation. that convention computers are simply unable to do in any reasonable time. I've seen some stories about moving some schedules up
Starting point is 00:15:34 when it came for organizations being quantum ready when it comes to their cryptography. Do you suppose that's a quiet signal that maybe things are happening on an accelerated schedule? Perhaps. I think it's a louder signal, maybe, in some cases. I think just to sort of go beyond the quantum computing part, While quantum computers can have a lot of promise of doing lots of computations and tremendous benefits to society that we've not been able to achieve yet, they also potentially have this potential threat of being able to break two of the most commonly used cryptographic algorithms that are used in the world today, that being RSA and ACC.
Starting point is 00:16:18 those literally underpin pretty much every digital interaction that we have today. So any time the lock icon shows up in your browser, anytime you receive a software or firmware update, every identity that's on a blockchain, you know, Bitcoin, Ethereum, and so forth, all those identities are ECC. If something was able to break RSA or ECC today, that would be absolutely catastrophic. So the deadline you're referring to really is the notion that the U.S. government, and actually governments around the world, have come up with new algorithms
Starting point is 00:16:51 that can replace RSA and ECC and actually use different mathematics that are widely believed to be immune to the powers of quantum computing. And this deadline is about getting a transition away from everything that uses those algorithms today to using the new algorithms. And that, of course, is a massive, massive change. do you think that breakthroughs in quantum computing will be shared publicly or is this the sort of thing that nation states might keep secure some have shared publicly there's certainly been announcements by in the in the private sector from many places the u.s you know ibn is you know google Microsoft there's been announcements even from china that said, I think
Starting point is 00:17:43 there's this idea of Q-Day, right, the point where the quantum computer is able to break RSA or ECC. When that happens, it's likely going to be internal to some nation-state, and it probably will not be announced. Perhaps a strained analogy, but you know, think about something like
Starting point is 00:18:01 nuclear weapons with nuclear proliferation, right? Will quantum capabilities, will we have a world of haves and have-nots? Well, if we switch away from RSA and ECC, then the haves should only be beneficial, right? The quantum computing, I guess just to level set a little more. Quantum computers don't think of them as a really, really fast conventional computer. They're actually very good at certain types of calculations,
Starting point is 00:18:28 but they're actually not very good at all at all the types of calculations. So that's why it's possible to create new algorithms with new mathematics that is not susceptible to quantum computing. Unfortunately, RSA and ECCR, and that's where the issue is. So what are your recommendations for organizations to prepare for this? Well, I think there's a number of things you can do. Making a change like this is massive. Literally, everything that communicates on a network or accepts a firmware update or software update is going to need to get updated. A lot of that is going to happen for you by your vendors, but it's very,
Starting point is 00:19:08 important to, I guess there's a number of steps. One is, first of all, figure out if you don't know already what the keys to your kingdom are and the things that you most vitally want to protect. That's a really good place to start. You want to make sure that you get an inventory of the cryptography and algorithms and so forth that are being used in those environments. That is not always easy to do. There's not a lot of things that will come out and tell you that. There are tools that can go a long way and helping you get that inventory. And then it comes down to talking to your vendors because really all the software that you use that communicates on the network is going to have to get updated.
Starting point is 00:19:45 And so that means you're going to need to get updates from Microsoft and Google and Apple and any other vendor of any software, firmware, hardware, or so forth in your environment. Your quantum roadmap as an organization effectively is subject to theirs. So you need to be talking to your vendors, understand what their plans are when they plan to transition and then plan accordingly so that you can. you know, start moving, build out automation, and, you know, so that you can move as quickly as you can once you're able to. I guess that's the challenge is right now, there aren't really a lot of operating systems or our software out there
Starting point is 00:20:20 that is ready for quantum. That's going to start changing as we get through 2026. But, you know, that's the game we're in. You can move the timelines up, and this is, I think, what scares me the most. You know, you mentioned Google moving the timeline up. It's such a massive transition. I'm not sure, even if everyone started today and went as fast as they can
Starting point is 00:20:37 and that you'll be able to move everything. So it's, you know, it's just a massive, massive amount of work that needs to happen here. I hear people say that, you know, it's a possibility that we could have a Sputnik moment where suddenly it's revealed that our, you know, our adversaries or perhaps one of our allies have these capabilities and things are kind of different from that point on. If that happens, yeah, I mean, that would be, that's why everyone, you know, they're talking about wanting to move, right? I think, you know, we won't try to avoid that as, you know, as much as possible.
Starting point is 00:21:12 How do you go about coming at this in a rational way without falling into, you know, kind of a chicken little mode? Because it feels so, it's been in the future for so long. And so I think it's hard for folks to wrap their head around any kind of realistic timeline for this. Yeah, yeah. I think some of it goes back to what I mentioned earlier. I mean, I think the first step is, you know, focus on the things that are most important to you. There are other things you can be doing today, for example.
Starting point is 00:21:43 I guess maybe I can give some good news. You know, there are, you know, there's this talk about capturing now, decrypt later, right? Which is definitely a risk, right? The idea that adversaries could be capturing today's, you know, internet traffic, for example, that's being encrypted with RSA or UCC, and just store it, even though they can't decrypt it,
Starting point is 00:22:04 And then once the quantum computer is available, to be able to then decrypted and sift through to find relevant pieces of information and so forth, there are some good things that are happening. So the standards have been out for a little while, and there is some support. So there was a cloud flare announcement that came out at the end of last year. I think it was something like 43%, something in the 40s,
Starting point is 00:22:26 percent of internet traffic was actually already quantum resistant. And that's because browser vendors like Google, and network infrastructure vendors like Cloudflare did create implementations of those new algorithms. And so for a lot of folks, you may not know it, but your Google browser can negotiate to use ML Chem, which is one of the quantum resistant encryption algorithms for the transport layer to encrypt data back and forth between your browser and websites that you visit. If the websites on the other end also support ML Chem, you're actually good. And that's where that 43% comes from. So there is actually some progress in this.
Starting point is 00:23:08 So I guess that's really the good news. The bad news is there's a whole lot left to do. And getting that 43% up to 100% is going to be a lot of work. And that's just internet traffic. When you go internal to organizations, it probably gets a lot more scary. That's Ted Schorter, CTO, and co-founder of Key Factor. On today's segment from the Threat Vector podcast, David Moulton speaks with returning guest, Elad Koren.
Starting point is 00:23:40 they're discussing agentic first security and what it actually looks like in practice. I'm David Moulton, host of the Threat Vector podcast. What you're about to hear is from my latest conversation about the future of security. Something strange is happening inside a security operation centers right now. The analysts sitting at the consoles aren't losing to attackers because they're outgunned. They're losing because they're outnumbered by machines. In my latest episode, Elad Karat, Vice President of Product Management for Cortex Cloud, told me something that stopped me cold. Adversaries can already spin up an attack infrastructure from a single prompt.
Starting point is 00:24:22 Your team is still triaging alerts by hand. That's not a future problem. That's now. Delad, welcome back to ThreatVector. Good to have you here again. Hey, David. Thank you. Great to be here again. Talk to me a little about what's changed since we last spoke. You know, last time we were digging into why reactive security was breaking down, what shifted in how you're thinking about the problem. I think the biggest thing that changed is that there's an acceptance of this gap.
Starting point is 00:25:04 It's no longer a question, right? I think everyone knows that manual triage is basically dead. I think what stayed in the game is more of the fact that leaders, they understand that it's no longer a staffing shortage. I think the industry is widely adopted the concept that it's more about the signal processing shortage and hiring more will not solve the problem. I think that is the fundamental change from that point.
Starting point is 00:25:35 And that means that we're seeing more receptiveness and more wide understanding that to fight AI and to fight machines, you need the proper machines on your side as well. I think that is the biggest thing. Well, let's dig into that a little bit. You know, I keep hearing this phrase, the agentic first analyst experience,
Starting point is 00:25:58 really rolls off of my tongue. That's the kind of term that I think could meet anything or nothing depending on who's using it. And maybe you can help me understand. What does that actually mean in the context of what you're building here and what does it, you know, Why does that matter for the experience for those defenders that are out there looking to grow their capacity? Great, great question.
Starting point is 00:26:27 I think a good way to think about it is probably a good analogy would be cars for a second, right? When we think of agentic-first environments or egentic-first systems, platforms, you should think a self-driving car type of thing, right? It's not just that bolted AI or integrated AI on top of something. That is more of lane assist or cruise control. That is something, you know, adaptive cruise control. You measure the speed from your car in front of you and you can adjust the speed accordingly or lane assist as well. But if you think about self-driving cars, that means that somebody thought of
Starting point is 00:27:15 entire process you need to navigate you need to plan you need to have like the traffic analysis this is the agentic first experience you're thinking on the agents as part of the architecture you're not you're not bolting this on on top of that this is this is where we flipped the the order of things instead of taking existing systems and just applying AI on those systems we thought AI first and being agentic first, be it SAW, cloud, exposure management, you know, what have you, you're thinking of how you can automate things with AI agents and help them do things in a more efficient way to increase the virtual size of any customer's team, any company's team that's using that. And I think that is the fundamental change and difference between, you know, just
Starting point is 00:28:11 AI bolted on or integrated with a Gentic first experience. So help me understand something. You know, I'm imagining I'm a sock analyst. I'm sitting in front of my console today. Normally I'd be handling triage or correlation or, you know, even initial response. But now that's something that I've said, yes, right? Or maybe I don't. Maybe there's some of those things where what you're imagining is, you know, I've seen you do this. Would you like me to take care of it?
Starting point is 00:28:41 And there's some autonomy of the human. But, you know, imagining that you've offloaded some of that work, maybe all of it. What's left for the person to do? And what is that job? Is it better? Is it just very different? I'm trying to paint that picture.
Starting point is 00:29:01 Yeah, I think it's a great discussion because I think many people out there are thinking, oh, so what will we do with AI agents? Will they replace us? Are they complementing us? I think what people tend to forget is that, and I think anyone encounter that, if not encountering that as we speak,
Starting point is 00:29:27 we never get to the more complicated higher-level tasks that we want to do, right? Those that require deep thinking because we are caught in the day-to-day, you know, answering hundreds of emails or doing all the regular things. Think about security analysts, analyzing so many data points and trying to connect the dots and trying to make sense of certain things. Tryash. What if all the AI agents could do all these basic things for all of these analysts?
Starting point is 00:30:00 and they would actually turn a tier one analyst to a tier two, tier three analyst just by being there for them and allowing them to identify the patterns that they are required to identify. What if the tier three analysts could orchestrate all of those and to say, hey, what about those new MOs or what about this potential new threat that I have?
Starting point is 00:30:27 I think this is where, you know, specifically in security, but also generally in software, we're enabling with the AI agents or the agentic error, agentic first platforms, we're enabling humans to do more, not just by using the AI agents. That's given and they'll do more things. It's allowing them that mind share or that attention span, that many, many times is not something we can achieve. to do the more complex things, to invest and investigate those things that require the human mind.
Starting point is 00:31:04 Because, well, let's face it, we are still very much needed in the process. I think now we can utilize our brains to the right task. That's how I view this. So, Eli, you talk to analysts, maybe not their managers, but the analysts themselves,
Starting point is 00:31:21 and I'm curious, what's their emotional response to this picture you're painting? You know, is it relief? Is it maybe some skepticism? I've noticed that in our industry. Is it fear? I think you see a mix of all of those.
Starting point is 00:31:36 And it heavily relies on or dependent on their state of mind, where they are in their career, where they are in the way they see how AI complements what they do. I think in general, the more common reaction that I see is curiosity. it's the understanding that something's going to change. Some of them adopt change really fast. Some of them don't. I think ultimately what we are seeing with analysts
Starting point is 00:32:08 is that they need to trust the system. They need to become more familiar with the new ways of operating. There's an interesting thing that happened this one time. We were interacting with a customer and one of their lead analysts said, well, I need all of these things to be done in your system. And all the things that they listed are things that they've done with the old system. That was a legacy system, right, that they did things manually, they built rules. And they said, well, where can we do all of these things in your platform?
Starting point is 00:32:47 And I was looking at them and smiling and saying, well, you don't have to. you understand it's already done for you yeah you can review all of these things here so some of them are looking at those things and you know the smart policies created the behavioral indicators of compromise that are available in the system and they're looking at that and they're they understand and all the things that they've done in the past building this in a very like specific way you need to maintain those and now they're going into a system that many of the things they did in the past is doing it for them. So I could see that from an inflection point of realizing,
Starting point is 00:33:31 hey, I can become more efficient now. I can do more. And once you turn around someone that is very fixed on how they used to do things, that's the biggest win. So I see a lot of that. And I'm excited about that. This episode is live in your threat vector feed. It's called attackers have agents.
Starting point is 00:34:09 Do you? Thanks for listening. Stay secure. Goodbye for now. Be sure to check out the Complete Threat Vector podcast wherever you get your favorite shows. Most environments trust far more than they should, and attackers know it. Threat Locker solves that by enforcing default deny at the point of execution, With Threat Locker Allow listing, you stop unknown executables cold.
Starting point is 00:35:18 With ring fencing, you control how trusted applications behave. And with Threat Locker DAC, defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards. Threat Locker is the simplest way to enforce zero-trust principles without the operational pain. It's powerful protection that gives CISO's real visibility, real control and real peace of mind. Threat Locker make zero trust attainable, even for small security teams.
Starting point is 00:35:50 See why thousands of organizations choose Threat Locker to minimize alert fatigue, stop ransomware at the source, and regain control over their environments. Schedule your demo at Threatlocker.com slash N2K today. When it comes to mobile application security, good enough is a risk. A recent survey shows that 72% of organizations reported at least one mobile application security incident last year, and 92% of responders reported threat levels have increased in the past two years. Guard Square delivers the highest level of security for your mobile apps without compromising performance, time-to-market, or user experience. Discover how Guard Square provides industry-leading security for your Android and iOS apps at W-Dubrower.
Starting point is 00:36:46 www.gardesquare.com. And finally, it's World Quantum Day, and while it's unlikely, you'll find the perfect greeting card for your favorite quantum engineer at the local hallmark store. The folks at Kusakor gently suggested that organizations stop staring at the quantum horizon like amateur astronomers waiting for a comet and start migrating to post-quantum quantum cryptography now. The company argues the real risk is not guessing when quantum computers will break today's encryption, but how long it takes to replace the encryption once everybody agrees they will. Recent signals from Google, Cloudflare, and India, all pointing toward 2029 migration timelines,
Starting point is 00:37:44 reinforce the message that the clock is already ticking, even if no one agrees exactly when midnight arrives. QSecure says, large enterprises often need up to a decade to complete migration, which makes wait and see less strategy and more procrastination with paperwork. It also warns that inventory exercises without pilot deployments waste time, and that crypto agility is becoming essential as threats evolve quickly. In short, the future may be uncertain, but the migration backlog is very real. And that's the Cyberwire. For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly
Starting point is 00:38:45 changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at n2K.com. N2K's lead producer is Liz Stokes. We're mixed by Trey Hester with original music and sound designed by Elliot Peltston. Our contributing host is Maria Vermazas. Our executive producer is Jennifer Ibin. Peter Kilpsey is our publisher. And I'm Dave Bittner.
Starting point is 00:39:15 Thanks for listening. We'll see you back here tomorrow.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.