meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

E-commerce or E-spying?

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 27 June 2024

⏱️ 24 minutes

🧾️ Download transcript

Summary

Arkansas sues Temu over privacy issues. Polyfil returns and says they were wronged. An NYPD database was found vulnerable to manipulation. Google slays the DRAGONBRIDGE. Malwarebytes flags a new Mac stealer campaign. Patch your gas chromatographs. Microsoft warns of an AI jailbreak called Skeleton Key. CISA tracks exploited vulnerabilities in GeoServer, the Linux kernel, and Roundcube Webmail. In our 'Threat Vector' segment, host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. Metallica is not hawking metal crypto. Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector Segment In this segment of the Palo Alto Networks podcast 'Threat Vector,' host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. They discuss how Foote's personal experience with his son's cancer diagnosis drove him to apply cybersecurity principles in developing an innovative approach, called Functional Precision Medicine, which tailors cancer treatment to individual patients. The conversation also covers the role of mentorship, the importance of interdisciplinary skills, and the transformative potential of AI in both cybersecurity and medical fields. You can listen to the full episode here. Selected Reading Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’ (The Verge) Polyfill claims it has been 'defamed', returns after domain shut down (Bleeping Computer) NYPD officer database had security flaws that could have let hackers covertly modify officer data (City & State New York) Google TAG: New efforts to disrupt DRAGONBRIDGE spam activity (Google) ‘Poseidon’ Mac stealer distributed via Google ads (Malwarebytes) Gas Chromatograph Hacking Could Have Serious Impact: Security Firm (SecurityWeek) Microsoft warns of novel jailbreak affecting many generative AI models (CSO Online) CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilities (SecurityWeek) Metallica’s X account hacked to promote crypto token (Cointelegraph) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Struggling to secure on-prem apps with modern identity, don't worry, you're not alone.

0:17.0

Join industry leaders from Fortune 500 organizations to secure your apps on any cloud with any IDP,

0:24.0

regardless of your environment's complexity.

0:27.0

Meet Strata's identity orchestration platform, Mavericks.

0:31.0

Say goodbye to the headaches of app refactoring and legacy tech debt.

0:35.0

With identity orchestration, you can modernize legacy apps to use MFA or passwordless authentication in a few weeks.

0:42.0

Migrate from one IDP to another, and so much more without

0:46.2

changing the app.

0:47.6

No matter your IAM use case, Strata extends the value of your current identity investments.

0:53.7

And the best part, you can try it for free today.

0:56.9

Visit strata.io slash cyberwire to share your biggest identity challenge

1:02.5

and they'll hook you up with a complimentary pair of Airponts Pro.

1:06.7

Don't miss out. Visit strata.io slash cyberwire.

1:10.8

That's strata dot i.o slash cyberwire. Arkansas sues Temu over privacy issues, Polyfill returns and says they were wronged.

1:34.8

An NYPD database was found vulnerable to manipulation.

1:38.6

Google Slaays the Dragon Bridge.

1:41.1

Malware Bites flags a new Mac Steeler campaign.

1:44.0

Patch your gas chromatographs.

1:46.0

Microsoft warns of an AI jailbreak called Skeleton Key.

1:50.0

CISA tracks exploited vulnerabilities in Geo Server, the Linux kernel, and Round Cube webmail.

1:56.7

In our Threat Vector segment, Dave Moulton speaks with Jim Foote, CEO of First Assent Biomedical

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.