4.6 • 1K Ratings
🗓️ 23 May 2024
⏱️ 34 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | And now a word from our sponsor, Netscope. |
0:14.4 | Netscope is a worldwide leader in Sassy and Zero Trust. |
0:18.2 | Its unified platform Netscope 1 provides optimized access and zero trust security for people, devices, and data anywhere |
0:26.3 | they go. |
0:27.3 | Helping customers reduce risk, accelerate performance, and get unrivaled visibility into |
0:32.2 | any cloud, web, and private application activity. |
0:35.0 | To learn more about how NetScope helps customers be ready for anything on their sassy journey, |
0:41.0 | visit any T-S-K's K OPE.com. Spyware is discovered on US hotel check-in systems. A Microsoft outage affects multiple services. in and Apple's Wi-Fi positioning systems, |
1:12.6 | Scotland's NRS reveals a sensitive data leak. |
1:15.8 | Rapid 7 tracks the rise in zero-day exploits and mass compromise events. |
1:20.4 | The SEC hits the operator of the New York Stock Exchange with a $10 million fine. |
1:26.0 | Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. |
1:31.7 | The FCC considers AI disclosure rules for political ads. |
1:36.0 | N2K T-minus Space Daily Podcast host Maria Vermasis speaks with guests Brianna Bass and |
1:42.1 | Unile Tatar sharing their work on legal perspectives on cyber |
1:46.2 | attacks targeting space systems and tone-blasting underwater data centers. It's Thursday, May 23rd, 2024. I'm Dave Bitner and this is your cyberwire intel briefing. CyberWire Intel Intel Intel Briefing. Thanks for joining us here today. It's great to have you with us. |
2:28.0 | Tech Crunch discovered that the consumer-grade spyware app PC Tattletail was running on the check-in systems of at least |
2:36.4 | three Windham hotels in the US. |
2:39.4 | The spyware continuously captured screenshots of hotel booking systems, |
2:44.0 | exposing guest details, and partial payment card numbers due to a security flaw. |
2:49.0 | These screenshots were accessible to anyone online who knew how to exploit the flaw. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.