Logo
    Search

    Podcast Summary

    • Russian Intelligence Hacks Multiple US Government Agencies Through SolarWinds SoftwareRussian hackers gained access to US gov't agencies through SolarWinds software, a significant cyber espionage campaign, highlighting the importance of securing software supply chains

      A sophisticated cyberattack believed to be orchestrated by Russian intelligence gained access to the computer systems of multiple US government agencies, including the Treasury and Commerce Departments, through a third-party software company called SolarWinds. This attack, which may have started as early as March 2020, was particularly effective due to the hackers' approach of infiltrating the software supply chain rather than directly targeting the agencies. The scale and sophistication of this hack is being described as one of the biggest and most significant cyber espionage campaigns against the US government. The full extent of the data that was taken and the potential impact on other departments and organizations is still being assessed. This incident underscores the importance of securing software supply chains and the potential risks associated with third-party software.

    • Russian Hackers Gain Access to SolarWinds Network SoftwareRussian hackers breached SolarWinds network software, giving extensive access to US gov't agencies including treasury, commerce, state, and Los Alamos nuclear lab. Hack went undetected for months, likely due to use of legitimate software. Embarrassing for US as cyber superpower, extent of stolen info unknown but suspected espionage.

      Russian hackers gained access to the SolarWinds network monitoring software, giving them extensive access to various US government agencies and sensitive information. The high skill level and use of specific techniques suggest involvement from the Russian intelligence agency SVR. Agencies affected include the treasury department, commerce department, state department, and Los Alamos nuclear laboratory. The hack went undetected for months due to the hackers using legitimate software. This is a significant embarrassment for the US as a leading cyber superpower, and the Trump administration may not want to acknowledge the breach before leaving office. The full extent of the information taken is unknown, but it appears to be a classic case of espionage.

    • History of Russian Cyberattacks on USRussian cyberattacks on US are long-standing, sophisticated, and require proactive cybersecurity defenses

      Cyberattacks, particularly those carried out by advanced threat actors like Russia, pose a significant threat to national security. The Russians have been engaging in cyberattacks against the United States for over two decades, starting with the Moonlight Maze attack in the mid-1990s. These attacks have become increasingly sophisticated, with the Russians using tactics like social engineering and spear-phishing to gain access to sensitive information. The 2020 election may have provided an opportunity for the Russians to launch another attack while the focus was on protecting the election networks. Cyberattacks are attractive to attackers because they are cheap, virtually invisible, and can be carried out by highly skilled engineers from anywhere in the world. The United States has not been effective in defending against these attacks, and the response to past attacks has been largely reactive rather than preventative. The history of Russian cyberattacks against the United States highlights the need for more robust cybersecurity defenses and a more proactive approach to cybersecurity.

    • Russia's cyberattacks against the US have gone unpunishedRussia's cyberattacks on US have emboldened them, as there are no significant consequences for such actions

      Russia's cyberattacks against the United States, including the hack of the Democratic National Committee and the Clinton campaign, have gone unpunished, emboldening Russia to continue such activities. The United States' hesitance to respond with proportionate force creates a gray area where adversaries believe they can get away with cyberattacks without significant consequences. This failure of deterrence was acknowledged publicly in 2018 when the head of the NSA testified that adversaries do not currently fear significant retaliation for cyberattacks on America.

    • Cyber warfare's unique challenges for deterrenceCyber warfare's ability to be adjusted in intensity and involvement of many players creates uncertainty and risk, requiring careful navigation to protect interests without escalation. US and others have engaged, but clear red lines are lacking.

      Cyber warfare poses a unique challenge for deterrence due to its ability to be adjusted in intensity and the large number of players involved. The US and other countries have engaged in cyber attacks, and while these actions have not yet led to full-blown war, the line between peaceful cyber espionage and acts of war is blurred. The Russians, among other adversaries, have been increasingly bold in their cyber activities, raising concerns about potential escalation. The utility of cyber as a weapon short of war makes it an attractive option for countries, but its lack of clear red lines and potential for miscalculation creates uncertainty and risk. The US and other countries must navigate this complex landscape carefully to protect their interests while avoiding unnecessary escalation. Additionally, it's important to note that the US is not without blame in the form of cyber warfare, as seen in the US and Israel's cyberattack on Iran's nuclear program a decade ago.

    • Deterring Cyber Attacks: Denial, Punishment, and International RulesEffective cyber attack deterrence requires a balance of strong defenses, consequences for attackers, and international norms, while addressing underlying motivations.

      Deterring cyber attacks involves a combination of defense and punishment. The first approach, deterrence by denial, focuses on building robust cyber defenses to prevent attacks. The second approach, deterrence by punishment, involves imposing consequences on attackers. A third approach is to establish international rules prohibiting certain types of cyber attacks. However, implementing such rules may be challenging due to the vested interests of governments in possessing advanced cyber capabilities. As for the incoming presidency of Joe Biden, it remains to be seen whether he will take a harder line against cyber attacks from adversaries like Russia and China. While Biden has expressed his intent to respond forcefully, the historical context of past cyber attacks and the challenges of escalating against nuclear powers make this a complex issue to navigate. Ultimately, to effectively deter cyber attacks, there is a need to strike a balance between defense, punishment, and international norms, while addressing the underlying fear that the costs of using cyber attacks may outweigh the benefits.

    • Republicans acknowledge Biden's victory, paving way for US-Russia cooperationThe GOP recognizes Joe Biden as President-elect, signaling a potential new chapter in US-Russia relations. The FDA is set to approve Moderna's COVID-19 vaccine, bringing hope in the fight against the pandemic.

      Despite some lingering resistance, the Republican Party, led by Senate Majority Leader Mitch McConnell, has acknowledged Joe Biden's victory in the presidential election. This acceptance marks a significant shift and paves the way for a potential new era of cooperation between the United States and Russia, as Russian President Vladimir Putin has congratulated Biden on his win. Furthermore, the FDA is expected to authorize the use of Moderna's coronavirus vaccine, adding another effective tool to the fight against the pandemic. These developments signify progress on both the political and health fronts, offering hope for a smoother transition and a return to normalcy.

    Recent Episodes from The Daily

    A Brutal Debate for Biden

    A Brutal Debate for Biden

    In the first debate of the 2024 race, President Biden hoped to make the case that Donald J. Trump was unfit to return to the White House. Instead, Mr. Biden’s weak performance deepened doubts about his own fitness for the job.

    Astead W. Herndon, who covers politics for The Times, explains what happened.

    Guest: Astead W. Herndon, a national politics reporter for The New York Times and the host of the politics podcast “The Run-Up.”

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 28, 2024

    The Doping Scandal Rocking the Upcoming Olympics

    The Doping Scandal Rocking the Upcoming Olympics

    A new doping scandal is rocking the world of competitive swimming, as the Paris Olympics approach. These allegations are raising questions about fairness in the sport and whether the results at the summer games can be trusted.

    Michael S. Schmidt, one of the reporters who broke the story, explains the controversy and what it reveals about the struggle to police doping in sports.

    Guest: Michael S. Schmidt, an investigative reporter for The New York Times.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 27, 2024

    France’s Far Right at the Gates of Power

    France’s Far Right at the Gates of Power

    The far right in France had a big win this month, crushing the party of President Emmanuel Macron in elections for the European Parliament. But the results did not affect France’s government at home — until Mr. Macron changed that.

    Roger Cohen, the Paris bureau chief for The Times, discusses the huge political gamble Mr. Macron has taken, which has brought the far right closer than ever to gaining real power in France.

    Guest: Roger Cohen, the Paris bureau chief for The New York Times.

    Background reading: 

    • Battered by the far right in voting for the European Parliament, Emmanuel Macron called for new elections in France.
    • The president has challenged voters to test the sincerity of their support for the far right. Were the French letting off steam in the European elections, or did they really mean it?

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 26, 2024

    The Plan to Defeat Critics of Israel in Congress

    The Plan to Defeat Critics of Israel in Congress

    A powerful group supporting Israel is trying to defeat sitting members of Congress who have criticized the country’s deadly war against Hamas.

    Nicholas Fandos, who covers New York politics for The Times, explains why it appears that strategy may work in today’s Democratic primary in New York.

    Guest: Nicholas Fandos, who covers New York politics and government for The New York Times.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 25, 2024

    The Army of Poets and Students Fighting a Forgotten War

    The Army of Poets and Students Fighting a Forgotten War

    Warning: this episode contains descriptions of injuries.

    Myanmar is home to one of the deadliest, most intractable civil wars on the planet. But something new is happening. Unusual numbers of young people from the cities, including students, poets and baristas, have joined the country’s rebel militias. And this coalition is making startling gains against the country’s military dictatorship.

    Hannah Beech, who covers stories across Asia for The Times, discusses this surprising resistance movement.

    Guest: Hannah Beech, a Bangkok-based reporter for The New York Times, focusing on investigative and in-depth stories in Asia.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 24, 2024

    'Animal,' Episode 4: Ferrets

    'Animal,' Episode 4: Ferrets

    In a broken world, what can we gain by looking another animal in the eye? "Animal" is a six-part, round-the-world journey in search of an answer. In Episode 4, the writer Sam Anderson soothes his anxiety by visiting a convention center in Ohio.

    For photos and videos of Sam's adventure with manatees, visit nytimes.com/animal.

    The Daily
    enJune 23, 2024

    America’s Top Doctor on Why He Wants Warning Labels on Social Media

    America’s Top Doctor on Why He Wants Warning Labels on Social Media

    Warning: This episode contains mentions of bullying and suicide.

    A rising tide of mental health problems among teenagers has sent parents, teachers and doctors searching for answers. This week, the U.S. surgeon general, Dr. Vivek H. Murthy, offered one: social media.

    Today, Dr. Murthy discusses his proposal to require platforms such as YouTube, TikTok and Instagram to include warning labels, like those that appear on tobacco and alcohol products.

    Guest: Dr. Vivek H. Murthy, the U.S. surgeon general.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 21, 2024

    The Mysterious Gun Study That’s Advancing Gun Rights

    The Mysterious Gun Study That’s Advancing Gun Rights

    In the battle to dismantle gun restrictions, raging in America’s courts even as mass shootings become commonplace, a Times’ investigation has found that one study has been deployed by gun rights activists to notch legal victories with far-reaching consequences.

    Mike McIntire, an investigative reporter for The Times, discusses the study and the person behind it.

    Guest: Mike McIntire, an investigative reporter at The New York Times.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday. 

    The Daily
    enJune 20, 2024

    A Novel Legal Strategy for Mass Shooting Victims’ Families

    A Novel Legal Strategy for Mass Shooting Victims’ Families

    As mass shootings plague the United States, victims’ families continue to search for accountability. To that end, a pair of lawsuits by the families of victims of the Uvalde school shooting will try a new tactic.

    J. David Goodman, the Houston bureau chief for The Times, discusses the unusual targets of the lawsuits and profiles the lawyers behind them.

    Guest: J. David Goodman, the Houston bureau chief for The New York Times.

    Background reading: 

    • The Uvalde lawsuits are among the most far-reaching to be filed in response to the escalating number of mass shootings in the United States.

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 18, 2024

    Related Episodes

    Ep. 1160 - We Are Under Attack

    Ep. 1160 - We Are Under Attack

    A massive suspected Russian cyberhack hits a load of American agencies; Democrats insist on retribution while pushing for wins in Georgia; and stimulus talks continue to drag out.

    Get your copy of "How to Destroy America in Three Easy Steps" here: https://utm.io/uHjV

    If you like The Ben Shapiro Show, become a member TODAY with promo code: SHAPIRO and enjoy the exclusive benefits for 10% off at https://www.dailywire.com/shapiro

    Learn more about your ad choices. Visit podcastchoices.com/adchoices

    The Solarwinds Blame Game

    The Solarwinds Blame Game

    In the aftermath of the SolarWinds breach, comes the scapegoat. 

    In this episode, Darnley discusses his distain of the ex-CEO of Solarwinds (Now rebranded N-Able), and his inability to concede fault in the downfall of Solarwinds cybersecurity is an example for all leaders to take ownership of their organizations. 

    Support the show

    Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.

    The CyberPHIx Roundup: Industry News & Trends, 6/7/21

    The CyberPHIx Roundup: Industry News & Trends, 6/7/21

    The CyberPHIx Roundup is your quick source for keeping up with the latest in cybersecurity news, trends and industry leading practices, specifically for the healthcare industry.

    In this episode, our host Brian Selfridge highlights the following topics trending in healthcare cybersecurity this week:

    • Major shifts in cyber liability coverages and protections and results from a recently released U.S. Government Office of Accountability (GAO) report
    • Scripps Health system network outage continues a month after initial cyberattack
    • Russian SolarWinds attackers are back at it with a large spear phishing campaign following a compromise of USAID systems
    • Security firm Rapid7 becomes a victim of a software supply chain breach targeting source code
    • OCR’s latest settlement details and analysis on the resolution agreement with Peachstate Health Management
    • OCR and HHS “wall of shame” aggregate reporting trends for 2021 and analysis of major reported breaches this past month
    • U.S. House Committee on Homeland Security advances five new bills to improve cyber defenses

    The CyberPHIx Roundup: Industry News & Trends, 1/13/21

    The CyberPHIx Roundup: Industry News & Trends, 1/13/21

    The CyberPHIx Roundup is your quick source for keeping up with the latest cybersecurity news, trends and industry leading practices, specifically for the healthcare industry.

    In this episode, our host Brian Selfridge highlights the following topics trending in healthcare cybersecurity this week:

    • The House passed an amendment to the HITECH Act that provides OCR enforcement safe harbors for adoption of security best practices including NIST and HITRUST
    • OCR guidance issued for HIEs and disclosures of PHI to public health authorities during the pandemic
    • NSA cybersecurity advisory about cloud attack techniques that are successfully bypassing standard access controls
    • A new FBI ransomware advisory for the DopplePaymer ransomware strain
    • NSA’s guidance for addressing attacks targeting outdated encryption protocols including SSL and TLS
    • NIST released cybersecurity standard for PACS and radiology systems
    • The latest updates on the groundbreaking SolarWinds attack and related recommendations for healthcare entities