4.6 • 1K Ratings
🗓️ 29 May 2024
⏱️ 39 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | The IT world used to be simpler. You only had to secure and manage environments that you controlled. |
0:20.0 | Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere. |
0:27.0 | This means poor visibility, security gaps, and added risk. |
0:31.0 | That's why Cloudflare created the first ever connectivity cloud. |
0:35.6 | Visit Cloud.com to protect your business everywhere you do business. An alleged leak of Google's search algorithm contradicts the company's public statements. |
0:58.0 | German researchers discover a critical vulnerability in a T.P. Link router. Breach forums is back. Maybe. |
1:06.2 | The Seattle Public Library suffers a ransomware attack. A Georgia man gets 10 years for money laundering |
1:12.2 | and romance scams, and the Treasury Department |
1:14.7 | sanctions a group of botnet operators. |
1:17.4 | 44,000 individuals are affected by the breach of a major U.S US title insurance company. |
1:23.0 | Microsoft describes North Korea's Moonstone Slete, |
1:27.1 | advocating for a more architectural approach |
1:29.7 | to cybersecurity. |
1:31.1 | Maria Vermasis speaks with Wiesis Executive Director Lynn |
1:34.4 | Dome and a panel of N2K experts about the 2024 cyber talent study, and a |
1:40.3 | cracked password results in a multi-million dollar windfall. It's Wednesday, May 29, 2024. I'm Dave Bitner and this is your cyberwire intel briefing. Thanks again for joining us here today. It is great to have you with us. |
2:20.0 | A significant leak of 2,500 internal Google documents |
2:25.0 | reveals detailed insights into how the company's search algorithm functions |
2:30.0 | contradicting Google's longstanding public statements. |
2:34.0 | SEO expert Rand Fishkin, who received the documents, |
2:38.5 | claims they show Google has misled the public about its ranking processes. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.