CyberWire Daily - Trust lags behind technology.

Episode Date: April 21, 2026

Anthropic’s Mythos proves irresistible despite claimed supply chain risks.Iran claims U.S. backdoors hit its networks. New Coast Guard rules target maritime OT security. A fresh NGate Android malwar...e variant emerges. Thousands of ActiveMQ servers face active exploitation risk. CISA adds eight flaws to its KEV list. Progress patches MOVEit and LoadMaster bugs. Attackers impersonate IT staff over Microsoft Teams. A ransomware negotiator admits working with BlackCat. Google Gemini asks, “May we see your photos please?” Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today’s Industry Voices Elad Koren, Vice President, Product Management, Cortex Cloud at Palo Alto Networks, discusses building AI natively into platforms, managing complexity and trust, and taking a measured, experimental approach during the industry’s “messy middle” phase. If you enjoyed this conversation, tune into the full interview here. Selected Reading The US NSA is using Anthropic's Claude Mythos despite supply chain risk (Security Affairs) Anthropic secretly installs spyware when you install Claude Desktop (That Privacy Guy) Iran claims US used backdoors in networking equipment (The Register) Maritime Cybersecurity Rules Make Waves (GovInfoSecurity) New NGate variant hides in a trojanized NFC payment app (We Live Security) Actively exploited Apache ActiveMQ flaw impacts 6,400 servers (Bleeping Computer) CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133) (Help Net Security) Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster (SecurityWeek) Microsoft: Teams increasingly abused in helpdesk impersonation attacks (Bleeping Computer) Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims (United States Department of Justice) Google Starts Scanning All Your Photos As New Update Goes Live (Forbes) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. No, it's not your imagination. Risk and regulation really are ramping up, and these days customers expect proof of security before they'll even do business. That's where Vanta comes in. Vanta automates your compliance process and brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're getting ready for a SOC2 or managing an end-toe, enterprise governance risk and compliance program, Vanta helps keep you secure and keeps your deals
Starting point is 00:00:44 moving. Companies like Ramp and Writers spend 82% less time on audits with Vanta. That means less time chasing paperwork and more time focused on growth. For me, it comes down to this. Over 10,000 companies from startups to large enterprises trust Vanta to help prove their security. Get started at vanta.com slash cyber. Anthropics mythos proves irresistible despite claimed
Starting point is 00:01:26 supply chain risks. Iran claims U.S. back doors hit its networks. New Coast Guard rules target maritime OT security.
Starting point is 00:01:34 A fresh NGate Android malware variant emerges. Thousands of active MQ servers face active exploitation risk. Sisa adds
Starting point is 00:01:43 eight flaws to the known exploited vulnerabilities list. Progress, patches, Move It, and Loadmaster
Starting point is 00:01:48 bugs. attackers impersonate IT staff over Microsoft teams. A ransomware negotiator admits working with Black Cat. Our guest is Elad Koren, Vice President of Product Managent for Cortex Cloud at Palo Alto Networks. He's discussing building AI natively into platforms. And Google Gemini asks, may we see your photos, please? It's Tuesday, April 21st, 2026.
Starting point is 00:02:22 I'm Dave Bittner, and this is your Cyberwire, Tell Briefing. Thanks for joining us here today. It's great as always to have you with us. Axios reports that the U.S. National Security Agency is using Anthropics Mythos preview model, even as the Department of
Starting point is 00:02:52 Defense labels Anthropic a supply chain risk, highlighting the growing tension between AI capability and security governance. Mythos is especially strong at finding software vulnerabilities, which makes it valuable for cyber defense, but
Starting point is 00:03:08 potentially useful for offensive activity if misused. This dual-use nature reflects a broader policy challenge. Agencies may depend on advanced AI tools despite concerns about vendor trust, oversight, and strategic reliance. Anthropics-related Project Glasswing initiative aims to apply mythos defensively with industry partners to secure critical infrastructure. The episode underscores how operational urgency is pushing governments to adopt frontier AI faster than procurement rules and risk frameworks can adapt. Elsewhere, security researcher Alexander Hemp reports that installing Anthropics Clodd desktop on Mac OS
Starting point is 00:03:55 automatically deployed an undocumented native messaging bridge across multiple chromium-based browsers without user notice or consent. The manifest allows approved browser extensions to launch a local helper binary outside the browser sandbox with user-level privileges, potentially enabling access to authenticated sessions, page content, and automation features if activated. Hanf says the files were installed even for browsers not present on the system and were repeatedly reinstalled after deletion. Anthropics documentation describes similar capabilities for its browser integration but does not document this specific bridge behavior. The author argues the design expands a tax surface and weakens browser isolation,
Starting point is 00:04:44 raising concerns about transparency, consent, and supply chain trust in desktop AI integrations. Iranian media claims U.S. intelligence used hidden back doors or botnets to, disable networking equipment from vendors, including Cisco, Juniper, Fortinette, and Microtic during recent wartime disruptions, even while Iran was largely disconnected from the global Internet. The allegations suggest firmware-level sabotage triggered remotely, though the outages are difficult to verify due to Iran's ongoing nationwide connectivity restrictions. Some reports instead proposed compromise devices formed part of a pre-positioned botnet, Chinese state media has amplified the claims, citing them as evidence of long-standing assertions
Starting point is 00:05:36 that the United States embeds surveillance capabilities in networking infrastructure. Meanwhile, monitoring group net blocks reports Iran's internet blockade has lasted more than 50 days with selective access granted to favored users, underscoring the limited visibility into events on the ground. A new U.S. Coast Guard rule requiring cybersecurity controls for operational technology in ports and for large U.S. flagged vessels is expected to significantly expand the maritime cybersecurity market amid rising geopolitical risk. Operators must appoint cybersecurity officers, conduct risk assessments, develop vessel and facility cybersecurity plans by July 27, and comply with incidents. reporting and training requirements already in effect. Industry experts say the rule will help security teams justify funding, though guidance on implementation details remains limited.
Starting point is 00:06:38 The Coast Guard estimates compliance will cost about $134 million annually, a large share of a maritime cybersecurity services market valued at $186 million globally in 2024. While larger firms may build internal capabilities, abilities, smaller operators may rely on outsourcing. Enforcement capacity remains uncertain as the Coast Guard prepares to integrate cyber checks into existing inspections. Researchers at ESET identified a new NGATE Android malware variant that trogenizes the legitimate handy pay app to relay payment card NFC data and steal pins for fraudulent ATM withdrawals and transactions. The campaign, active
Starting point is 00:07:30 since November of last year, targets users in Brazil through fake lottery and counterfeit Google Play websites distributing the modified app. Researchers say the injected malicious code shows signs of possible generative AI involvement, though this remains unconfirmed. Like earlier NGate attacks using tools such as NFCGate, attackers modified handi-paid directly to reduce cost and suspicion. The malware forwards card data to attacker devices and exfiltrates pins to a command and control server, reflecting a broader rise in NFC-enabled financial fraud. More than 6,400 Internet-exposed Apache Active MQ servers are vulnerable to active exploitation of a high-severity code injection flaw, according to Shadow Server.
Starting point is 00:08:23 The issue, caused by improper input validation, allows authenticated attackers to execute arbitrary code and was reportedly identified with assistance from the clawed AI tool after remaining undiscovered for 13 years. Adobe patched the flaw in March, but many systems remain unpatched. SISA has ordered federal agencies to remediate the risk by April 30th. Speaking of SISA, they've added eight vulnerabilities to the known exploited vulnerabilities catalog, including three affecting Cisco Catalyst SDWAN manager, which Cisco confirmed as exploited.
Starting point is 00:09:02 The update also includes flaws in paper cut, NGMF, JetBrains Team City, Kentico Experience, Quest Case Appliances, and Sinakor-Zimbra Collaboration Suite, some link to ransomware and espionage activity. Federal agencies must remediate all eight by April 20th. Progress software released patches for multiple MoveIt web application firewall and loadmaster vulnerabilities that could allow authenticated attackers to execute arbitrary commands through improperly sanitized API inputs and file uploads. The flaws affect administrative functions in Progress ADC products. Another issue enables specially crafted requests to bypass firewall protections. Progress says there are no reports of active exploits.
Starting point is 00:09:55 but urges customers to update affected systems promptly. Microsoft warns threat actors are abusing external Microsoft Teams chats to impersonate IT or help desk staff and trick employees into granting remote access to enterprise systems. In observed campaigns, attackers initiate support sessions using tools like Quick Assist, then perform reconnaissance with command prompt and PowerShell, established assistance through DLL side-loading and move laterally using Windows remote management. They deploy additional remote tools and use utilities such as R-Clone to selectively exfiltrate sensitive data to cloud storage. Because the activity relies heavily on legitimate
Starting point is 00:10:43 software and native administrative protocols, detection is difficult. Microsoft advises organizations to treat external teams' messages as untrusted and restrict remote assistance and WIN-R-M usage to reduce risk. A Florida man and former ransomware negotiator, Angelo Martino, pleaded guilty to conspiring with Black Cat ransomware operators to target U.S. companies in 2023. Prosecutors say Martino abused his role at a cyber incident response firm to share victims' confidential negotiation strategies
Starting point is 00:11:21 and insurance limits with attackers, helping increase ransom payments. He also joined accomplices Ryan Goldberg and Kevin Martin in deploying Black Cat ransomware against multiple victims, including an attack that yielded about $1.2 million in Bitcoin. Authorities have seized more than $10 million in assets linked to the scheme. Martino faces up to 20 years in prison with sentencing scheduled for July. Officials say the case highlights insider risk
Starting point is 00:11:53 within the ransomware response ecosystem. Coming up after the break, my conversation with Elad Koren from Palo Alto Networks. We're discussing building AI natively into platforms. And Google Gemini asks, may we see your photos, please? Quick question. Have you watched Project Hail Mary yet?
Starting point is 00:12:34 Humanity is facing an existential threat and racing to solve it with the clock ticking. For security teams, that probably hits close to home with AI use rapidly spreading. Everyone's using AI, marketing, sales, engineering. Chris the intern without security even knowing about it. That's where Nudge Security comes in.
Starting point is 00:12:55 Nudge finds Shadow AI apps, integrations, and agents on day one and helps you enforce policy without blocking productivity. Try it free at Nudgesecurity.com slash cyberwire. Maybe that's an urgent, message from your CEO, or maybe it's a deep fake trying to target your business. Dopple is the AI-native social engineering defense platform fighting back against impersonation
Starting point is 00:13:29 and manipulation. As attackers use AI to make their tactics more sophisticated, Dopple uses it to fight back, from automatically dismantling cross-channel attacks to building team resilience and more. Doppel, outpacing what's next in social engineering. Learn more at Dopple.com. That's do P-P-P-E-L.com. Elad Koren is vice president for product management with Cortex Cloud at Palo Alto Networks.
Starting point is 00:14:08 I caught up with him at the 26 R-SAC Conference for this sponsored industry voices segment discussing building AI natively into platforms. I just heard a story earlier today of someone that had a very reliable system built
Starting point is 00:14:26 on an agent that can train for them, but it actually invented some tickers that never existed, right? Well, so how can you prevent something like that? You create the right barrails and the right agents that will analyze this, and you need a system, and this is a real building. Well, here we are at RASAC 2026, and it's my pleasure to welcome to the program, Elad Koren, who is vice president for product management,
Starting point is 00:14:58 And Cortex Cloud at Palo Alto Networks, a lot. Thanks so much for joining us. Thank you for having. Before we dig in here, how's the week going for you with the show? I'd ask, are you keeping busy? But that's sort of a rhetorical question. Yeah, so many people here, so many meetings, interesting meetings with a lot of interesting people. I think all in all, this is the biggest week for the cyber industry.
Starting point is 00:15:26 And definitely something we've. fuel as well. Yeah. I want to dig in with you on AI, which of course is the hot topic here this year. You may have notice. But particularly agentic AI, which is the hottest of the hot parts of the hot topic this year. First of all, just from a really high level, how are you and your colleagues approaching this transition to the dominance of a in the conversation.
Starting point is 00:16:01 Yeah, I think one is evident. It's everywhere. It's in a conversation with customers, organizations, a lot of other vendors that are throwing this into the mix. I think
Starting point is 00:16:15 what we're seeing now is a race. A race to who can add AI to their solution, the fastest way. We are the way we are thinking about it And I think, you know, there are many approaches. Naturally, we think ours is the right one to address this.
Starting point is 00:16:36 We all agree at the baseline for everyone that you cannot really fight machines with only humans. You need machines to come to the assistance of humans when fighting with machines, which are the adversaries, the sprawl of AI, the hand of those that are trying to infiltrate, breach information, et cetera. I think what we're seeing is that the best approach, and this is what resonates with many of
Starting point is 00:17:07 the organizations we are having conversations with, is that when we built specifically in the vortex platform, when we built the platform itself, we thought of AI as an inherent part of the platform. It's not something
Starting point is 00:17:23 bold to go. Okay. And what it helps with is the access to the data, the lake, everything exists there. You don't need to reach out to other systems. Everything is right there and available. But also, it helps a lot with
Starting point is 00:17:38 multiple agents that are trying to do different things, right? Because we're, as humans, we are thinking about the, you know, we are optimistic features, right? We have to. So, everyone are saying, great, when we have a Jetty AI, all of our problems
Starting point is 00:17:54 will be solved. Oh, guess what? We were adding complexity. We're not just removing the complexity. So our agents from different vendors or different tasks or jobs to be done are going to interact with each other. Are they really going to imagine a kitchen with so many cooks? What happens? Somebody gets burnt. So we are, the way we're thinking about it is, you know, AI needs to be an integral part of the solution so that all the agents can be an integral part of the solution so they're orchestrated well and working well with each other. This is our philosophy going at it, and we see that it resonates.
Starting point is 00:18:32 How is that playing out? I mean, it strikes me as something that could be easier said than done to place appropriate guardrails on there. I can imagine all the agents vying to be the one, the alpha. Well, yes or no. When you design the agents in a way that, one, bleats back and relies on the purpose. people or the employees, the humans that created them. And they have the right guardrails in place to make sure that they cannot do things that are more than what the human created them can do.
Starting point is 00:19:08 So this is basic. But also, they have a task. They have a potential journey that they need to take. And if you have two agents, one needs to take care of one thing and the other needs to take of something else. they operate as two humans. And if the system is designed to look at potential collusions or potential cases where they may contradict,
Starting point is 00:19:32 you think about what should happen when such two, three, four, maybe ten regions do on the system and how they interact with data, and you plan for this. If you plan for this and you design the system in such a way, then it definitely solves the problem in advance. Does it remove all problems? Probably not, right? But I think this is, this is more.
Starting point is 00:19:53 I like to call this time when we are in the messy middle. We are in the messy middle. We are discovering that as we go along. If somebody says that they know how it's going to look in three, four, five years, well, either they have a crystal ball or their life. So I think we're discovering this. Yes, we are solving for those. We are as an industry solving for those specific cases.
Starting point is 00:20:20 But I think generally speaking, there's a good understanding. of how the fundamentals work. So it sounds to me like you're optimistic about the direction that we're headed and we're going to be able to strike that necessary balance?
Starting point is 00:20:37 Yes, yes. I think, and it has a few aspects to it. One, we still have a way to go as it pertains to trust, right? Let just like people would go into a waymo,
Starting point is 00:20:53 10 years ago? Something changed. They trusted. It's the same with having autonomous systems. You cannot just jump at the autonomous system. You have to gain this trust. You have to start with a smaller, simpler things. You then have to grow up and be more at more complex stuff.
Starting point is 00:21:15 Well, one or two or three agents collaborate and bring to a resolution or mediation of something, It can be cloud. It can be sock. Whatever, right? And only then you have that trust in the system. So this is one aspect. But the other thing is the capabilities.
Starting point is 00:21:33 Many of the capabilities today are not quite there. We see hallucinations. We see, you know, I just heard a story earlier today of someone that had a very reliable system built on an agent that can trade for them, but it actually invented some tickers that never existed, right? Well, so how do you prevent some? something like that, you create the right guardrails and the right agents that will analyze this. And you need a system.
Starting point is 00:22:00 And this is what we're building. So it's trust, it's the right infrastructure, it's the right capabilities, it's the right guardrails. And when you start doing all of those, you cannot design them from the get-go. Perfect. It's never the case. We have to discover the problems, solve the problems, discover more problems, solve those problems and move on. This is how we build complex systems, right? Yeah, what's your advice to that person who says, I am nervous about this?
Starting point is 00:22:31 I seize the potential problems. But at the same time, I'm afraid that if I don't jump on board, my competitors are going to outpace me. It's just a fact and certain. However, I think the responsible thing to do is to decide on the right risk appetite. I can definitely see a future where someone, a vendor, that is staying still not really hasting to put in AI their solutions in waiting for like six more months. Maybe that will prove to be the right strategy. Let's take a different lens to look at that, that specific question. If you try to do vibe coding a year ago with just Jet Jik-T or any other vendor out there, would it be successful?
Starting point is 00:23:31 Probably not. Probably you'll get a lot of not that great code and probably very messy. But then you waited and now you have so many vibe code. solutions. I don't know if one of our viewers or listeners have tried to use one of the platforms to create an app
Starting point is 00:23:56 with vibe coding, about a year ago, it's very different that it is today. So if someone waits, so vendor waits, you know, they're concerned, great. Do your diligence. Learn. Experiment, explore. I always tell all of my teams, if you
Starting point is 00:24:12 want to be at the the edge of technology, you have to experiment. We're not pushing that into production. But try it. If you don't try, you don't understand the new boundaries. Boundaries have changed. So this is my advice. Try everything
Starting point is 00:24:28 that you can, experiment. Do not add it to your product just yet until you know what purpose it serves. Because if you're just adding AI for the sake of adding AI, it means nothing. The customers will call it out. But if you're adding something that has true benefit,
Starting point is 00:24:44 either cutting some of the costs, bringing solutions and bringing benefit better to the customers, then you should know what it does, right? And you should do the right, both education as well as learning in the process so that you can plan it properly. And I think that is the best thing that organizations, not to jump into this just like for the sake of a half. Yeah.
Starting point is 00:25:07 Well, Al-a-a-a-law, thank you so much for joining us. Elad Koran is vice president for product management, for Cortex Cloud at Palo Alto Networks. Thanks so much. Thank you. That's Elad Corrin from Cortex Cloud at Palo Alto Networks. Local news is in decline across Canada, and this is bad news for all of us. With less local news, noise, rumors, and misinformation fill the void, and it gets harder to separate truth from fiction.
Starting point is 00:25:51 That's why CBC News is putting more journalists in more places across. Canada, reporting on the ground from where you live, telling the stories that matter to all of us, because local news is big news. Choose news, not noise. CBC News. This episode is brought to you by Tell Us Online Security. Oh, tax season is the worst. You mean hack season?
Starting point is 00:26:16 Sorry, what? Yeah, cybercriminals love tax forms. But I've got Tellus Online Security. It helps protect against identity theft and financial fraud, so I can start. stress less during tax season, or any season. Plans start at just $12 a month. Learn more at talus.com slash online security. No one can prevent all cybercrime or identity theft.
Starting point is 00:26:36 Conditions apply. Hey, ladies and gentlemen, guess what? You came on a great night. Tonight is, may we see your photos, please? There you go. And finally, Google's latest Google Photos update invites users to let Gemini browse their memories in the name of convenience and possibly creativity.
Starting point is 00:27:03 By opting in to its new personal intelligence feature, users allow the AI to scan photos of friends, family, and life events, so it can generate more personalized images without needing detailed prompts. In theory, this saves time. In practice, it means your camera roll, that quiet archive of vacations, receipts, pets, and accidental screenshots, becomes part of Gemini's working knowledge. Google says the system does not directly train models on private photo libraries,
Starting point is 00:27:36 though limited prompt and response data may still be used to improve performance. The feature is optional, adjustable, and launching first in the United States. Still, it quietly reframes the trade-off. Fewer instructions for the AI, more access to your life. As always, with convenience upgrades, the fine print arrives slightly after the excitement. All right, thank you very much for playing. May we see your photos, please. And that's the Cyberwire.
Starting point is 00:28:18 For links to all of today's stories, check out our daily briefing at thecyberwire.com. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review. in your favorite podcast app. Please also fill out the survey in the show notes or send an email to Cyberwire at N2K.com.
Starting point is 00:28:44 N2K's lead producer is Liz Stokes. We're mixed by Trey Hester with original music and sound design by Elliot Peltzman. Our contributing host is Maria Vermazes. Our executive producer is Jennifer Ivan. Peter Kilty is our publisher, and I'm Dave Bittner.
Starting point is 00:28:59 Thanks for listening. We'll see you back here tomorrow.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.