meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

AVCheck goes dark in Operation Endgame.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 2 June 2025

⏱️ 23 minutes

🧾️ Download transcript

Summary

An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today’s Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics. Complete our annual audience survey before August 31. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today’s episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference. Selected Reading Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer) DHS budget request would cut CISA staff by 1,000 positions (Federal News Network) Cybercom’s defensive arm elevated to sub-unified command (DefenseScoop) vBulletin Vulnerability Exploited in the Wild (SecurityWeek) Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine) Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer) Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer) Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines) Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield) The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw  (SecurityWeek) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.7

And now a word from our sponsor, SpyCloud. Identity is the new battleground, and attackers are

0:17.8

exploiting stolen identities to infiltrate your organization.

0:21.6

Traditional defenses can't keep up.

0:23.9

SpyCloud's holistic identity threat protection helps security teams uncover and automatically

0:29.3

remediate hidden exposures across your users, from breaches, malware and fishing to neutralize

0:35.6

identity-based threats like account takeover, fraud, and ransomware.

0:40.0

Don't let invisible threats compromise your business.

0:43.0

Get your free corporate darknet exposure report at spycloud.com slash cyberwire and see what

0:49.9

attackers already know. That's spycloud.com slash cyberwire.

1:09.3

An international law enforcement operation dismantles a V-check.

1:13.9

Trump's 2026 budget looks to cut over 1,000 positions from SISA.

1:18.7

Cybercommand's defensive wing gains subunified command status.

1:23.0

A critical V-bulletin vulnerability is actively exploited.

1:26.9

A creed takes over Russian markets as credential

1:29.8

theft kingpin. Qualcomm patches three actively exploited zero days in its adreno GPU drivers.

1:36.7

Researchers unveiled details of a Cisco iOS XC Zero Day. Microsoft warns a memory corruption flaw

1:43.3

in the legacy JS script engine is under active

1:46.1

exploitation. A closer look at the stealthy Electrodectus loader. On today's afternoon, CyberT

1:52.5

and Johnson speaks with Hugh Thompson, RSAC program committee chair. And decoding AI hallucinations

2:00.3

with physics.

2:08.4

It's Monday, June 2nd, 2025. I'm Dave Bittner, and this is your Cyberwire Intel briefing.

...

Transcript will be available on the free plan in 16 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.