4.6 • 1K Ratings
🗓️ 1 May 2025
⏱️ 28 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:10.2 | Traditional pen testing is resource intensive, slow, and expensive, |
0:17.4 | providing only a point-in-time snapshot of your application's security, leaving it vulnerable |
0:22.7 | between development cycles. Automated scanners alone are unreliable in detecting faults within |
0:28.9 | application logic and critical vulnerabilities. Outpost 24's continuous pen testing as a service |
0:35.5 | solution offers year-round protection, |
0:38.4 | with recurring manual penetration testing conducted by Crest-certified pen-testers, |
0:44.1 | allowing you to stay ahead of threats and ensure your web applications are always secure. |
0:49.9 | Thank you. updates from RSA 2025. |
1:08.5 | Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop |
1:15.0 | high-level software exploits. |
1:17.4 | An FBI official warns that China is the top threat to U.S. critical infrastructure. |
1:22.5 | Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. |
1:29.2 | France accuses Russia's fancy bear of targeting at least a dozen French government and |
1:33.5 | institutional entities. Sonic Wall has issued an urgent alert about active exploitation of a high |
1:39.4 | severity vulnerability in its secure mobile access appliances. A China-linked APT group known as the Wizards is abusing an IPV6 networking feature. |
1:49.6 | Gremlin Steeler emerges as a serious threat. |
1:52.6 | A 23-year-old Scottish man linked to the scattered spider hacking group has been extradited |
1:57.0 | from Spain to the United States. |
1:58.9 | Senators urge FTC action on consumer neural data. |
2:02.6 | New WordPress malware masquerades as an anti-malware plugin. |
2:06.3 | Our guest is Andy Chow from Project Discovery, the winner of the 20th annual RSAC Innovation |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.