meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Can connected cars jeopardize national security?

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 23 September 2024

⏱️ 32 minutes

🧾️ Download transcript

Summary

The US is set to propose a ban on Chinese software and hardware in connected cars. Dell investigates a breach of employee data. Unit 42 uncovers a North Korean PondRAT and a red team tool called Splinter. Marko Polo malware targets cryptocurrency influencers, gamers, and developers. An Iranian state-sponsored threat group targets Middle Eastern governments and telecommunications.The alleged Snowflake hacker remains active and at large. German officials quantify fallout from the CrowdStrike incident. Apple’s latest macOS update has led to widespread issues with cybersecurity software and network connectivity. Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Supercharging your graphing calculator. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Read their blog "Surging Hype: An Update on the Rising Abuse of GenAI" here. Selected Reading Exclusive: US to propose ban on Chinese software, hardware in connected vehicles (Reuters) Dell investigates data breach claims after hacker leaks employee info (Bleeping Computer) North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages (Security Affairs) Global infostealer malware operation targets crypto users, gamers (Bleeping Computer) Iranian-Linked Group Facilitates APT Attacks on Middle East Networks (Security Boulevard) Hacker behind Snowflake customer data breaches remains active (CyberScoop) Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool (Palo Alto Networks) Organizations are changing cybersecurity providers in wake of Crowdstrike outage (Help Net Security) Cybersecurity Products Conking Out After macOS Sequoia Update (SecurityWeek) Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating (Ars Technica) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Hey everybody, Dave here.

0:14.7

Have you ever wondered where your personal information is lurking online?

0:19.6

Like many of you, I was concerned about my data being sold by data brokers.

0:24.0

So I decided to try Delete Me.

0:27.0

I have to say, Delete Me is a game changer.

0:30.0

Within days of signing up, they started removing my personal information from hundreds of data brokers.

0:36.0

I finally have peace of mind knowing my data privacy is protected.

0:41.0

The Leopney's team does all the work for you with detailed reports so you know exactly what's been done.

0:47.0

Take control of your data and keep your private life private by signing up for Delete Me.

0:52.0

Now at a special discount for our listeners, private by signing up for Delete Me.

0:52.7

Now at a special discount for our listeners,

0:55.2

today get 20% off your Delete Me plan

0:58.4

when you go to Join Delete Me.com slash N2K and use promo code n two k at check out the only way to get

1:06.4

20% off is to go to join delete me dot com slash n two k and enter code n two k at check out. That's join delete me.com slash n2k

1:17.0

code n2k. The US is set to propose a ban on Chinese software and hardware in connected cars.

1:37.0

Dell investigates a breach of employee data.

1:39.4

Unit 42 uncovers a North Korean pond rat and a red team tool called Splinter.

1:44.7

Marco Polo malware targets cryptocurrency influencers, gamers, and developers.

1:50.0

An Iranian state-sponsored threat group targets Middle Eastern governments and telecommunications.

1:55.3

The alleged snowflake hacker remains active and at large.

1:59.4

German officials quantify fallout from the crowd strike incident.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.