meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

AI’s blind spots need human eyes.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 14 February 2025

⏱️ 30 minutes

🧾️ Download transcript

Summary

Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple’s App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. You can read more in "How Cybercriminals Are Using AI: Exploring the New Threat Landscape." Selected Reading Putting the human back into AI is key, former NSA Director Nakasone says (The Record) Court Documents Shed New Light on DOGE Access and Activity at Treasury Department (Zero Day) Musk's DOGE team: Judges to consider barring it from US government systems (Reuters) Anyone Can Push Updates to the DOGE.gov Website (404 Media) Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster (Bleeping Computer) Apple app tracking rules more strict for others – watchdog (The Register) PostgreSQL flaw exploited as zero-day in BeyondTrust breach (Bleeping Computer) CISA Releases 20 ICS Advisories Detailing Vulnerabilities & Exploits (Cyber Security News)  Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins (GB Hackers)  SonicWall Firewall Vulnerability Exploited After PoC Publication (SecurityWeek) Have I Been Pwned likely to ban resellers (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.7

Hey, everybody, Dave here. Have you ever wondered where your personal information is lurking online?

0:19.1

Like many of you, I was concerned about my data being sold by

0:23.1

data brokers. So I decided to try, delete me. I have to say, delete me is a game changer.

0:29.9

Within days of signing up, they started removing my personal information from hundreds of data brokers.

0:36.3

I finally have peace of mind knowing my data privacy

0:39.3

is protected. Delete Me's team does all the work for you with detailed reports so you know

0:45.2

exactly what's been done. Take control of your data and keep your private life private by signing up

0:51.4

for Delete Me. Now at a special discount for our listeners, today get 20%

0:56.6

off your DeleteMe plan when you go to join deleteme.com slash N2K and use promo code N2K at checkout.

1:05.7

The only way to get 20% off is to go to join deleteme.com slash n2k and enter code n2k at checkout.

1:14.0

That's join deleteme.com slash n2k code n2k.

1:18.2

Okay.

1:18.2

Okay.

1:22.2

I'm

1:23.6

The Nakhassoni addresses AI at the Munich Cybersecurity Conference.

1:36.6

Court documents reveal the degree to which Doge actually has access.

1:40.7

Dutch police dismantle a bulletproof hosting operation.

1:43.7

German officials investigate Apple's app tracking.

1:46.7

Hackers exploited security flaws in beyond trust.

1:49.9

Sisa issues 20 new ICS advisories.

1:52.8

The new Astoroth fishing kit bypasses 2FA.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.