4.6 • 1K Ratings
🗓️ 2 October 2025
⏱️ 27 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:10.1 | At TALIS, they know cybersecurity can be tough and you can't protect everything, |
| 0:17.6 | but with TALIS, you can secure what matters most. |
| 0:23.2 | With TALIS's industry-leading platforms, you can protect critical applications, data, and identities, anywhere and at scale with the highest |
| 0:29.7 | ROI. That's why the most trusted brands and largest banks, retailers, and healthcare companies in the |
| 0:36.1 | world rely on Talis to protect what matters most. Applications, retailers, and healthcare companies in the world rely on Talis to protect what matters most. |
| 0:40.0 | Applications, data, and identity. |
| 0:42.6 | That's Talis. |
| 0:44.0 | T-H-A-L-E-S. |
| 0:45.8 | Learn more at Talisgroup.com slash cyber. |
| 0:50.0 | Thank you. CISA CISA furloughs most of its workforce due to the government shutdown. |
| 1:09.2 | The U.S. Air Force confirms its investigating a |
| 1:11.9 | sharepoint-related breach. Google warns of a large-scale extortion campaign targeting executives. |
| 1:18.3 | Researchers uncover Android spyware campaigns disguised as popular messaging apps. |
| 1:23.5 | An extortion group claims to have breached Red Hat's private GitHub repositories. |
| 1:28.0 | A software provider for recreational vehicle and power sports dealers suffers a ransomware breach. |
| 1:33.9 | Patchwork APT deploys a new power shell loader using scheduled tasks for persistence. |
| 1:40.0 | A Tennessee senator urges aggressive U.S. action to prepare for a post-quantum future. |
| 1:45.5 | Our guest is Cynthia Kaiser, SVP of Halcyon's Ransomware Research Center, |
| 1:50.4 | and former Deputy Assistant Director at the FBI's Cyber Division, |
| 1:54.3 | joining us with insights on the government shutdown. |
| 1:57.5 | And a Malaysian man pleads guilty to supporting a massive crypto fraud and protected |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.