4.6 • 1K Ratings
🗓️ 13 September 2025
⏱️ 24 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:10.1 | At TALIS, they know cybersecurity can be tough and you can't protect everything, |
| 0:17.6 | but with TALIS, you can secure what matters most. |
| 0:23.2 | With TALIS's industry-leading platforms, you can protect critical applications, data, and identities, anywhere and at scale with the highest |
| 0:29.7 | ROI. That's why the most trusted brands and largest banks, retailers, and healthcare companies in the |
| 0:36.1 | world rely on Talis to protect what matters most. Applications, retailers, and healthcare companies in the world rely on Talis to protect what matters most. |
| 0:40.0 | Applications, data, and identity. |
| 0:42.6 | That's Talis. |
| 0:44.0 | T-H-A-L-E-S. |
| 0:45.8 | Learn more at Talisgroup.com slash cyber. |
| 0:50.0 | Thank you. Hello, everyone, and welcome to the Cyberwires Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, |
| 1:14.3 | solving some of the hard problems and protecting ourselves in a rapidly evolving cyberspace. |
| 1:20.1 | Thanks for joining us. |
| 1:27.1 | So we tried to approach it in a way where we have kind of multimodal attacks. |
| 1:33.0 | It's not just a simple prompt injection. |
| 1:36.0 | Now that we have the, I guess, influence of agentic AI, right? |
| 1:41.8 | So we have agents that can do web searches, can look at the Google Drive, |
| 1:48.8 | look at your email. This kind of brings in that traditional cybersecurity factor there. What are |
| 1:54.8 | the security boundaries, right? That's Amanda Russo, principal AI security researcher from Stryker. |
| 2:01.8 | The research we're discussing today is titled The Silent Exfiltration, |
| 2:06.1 | Zero-Click Agenic AI hack that can leak your Google Drive with one email. |
| 2:27.0 | So we wanted to look into how can we cross those security boundaries through just prompts, either indirect prompts or direct prompts. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.