4.6 • 1K Ratings
🗓️ 29 April 2024
⏱️ 28 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | The IT world used to be simpler. You only had to secure and manage environments that you controlled. |
0:20.0 | Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere. |
0:27.0 | This means poor visibility, security gaps, and added risk. |
0:31.0 | That's why Cloudflare created the first ever connectivity cloud. |
0:35.6 | Visit Cloud.com to protect your business everywhere you do business. Ockta warns of a credential. A |
0:57.0 | Congressman looks to the EPA to protect water systems from cyber threats. |
1:01.0 | CISA unveil security guidelines for critical infrastructure. |
1:04.0 | Researchers discover a stealthy botnet as a service coming from China. |
1:08.0 | The UK prohibits easy IOT passwords. |
1:12.0 | New vulnerabilities are found in Intel processors. A Global Bank CEO |
1:16.4 | shares insights on cyber security. Users report mandatory Apple ID Resets. A preview of N2K cyberwire activity at |
1:25.3 | RSA conference, and police in Japan find a clever way to combat gift card |
1:30.8 | fraud. |
1:33.0 | It's Monday, April 29, 2024. |
1:37.0 | It's Monday, April 29, 2024. I'm Dave Bitner and this is your CyberWire Intel briefing. Identity and Access Management Company, Octa, warns of what they're describing as an unprecedented |
2:07.4 | surge in credential stuffing attacks, where attackers use stolen user names and passwords from previous breaches |
2:14.7 | to access online services. These attacks often involve anonymizing proxies like |
2:20.7 | Tor and residential proxies including En Sox, |
2:24.6 | Luminati, and Data Impulse automated through scripting tools. |
2:29.8 | Octa's observations align with recent findings by Duo Security and |
2:34.2 | Cisco Talos on similar tactics used in brute force attacks? A significant |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.