4.6 • 1K Ratings
🗓️ 7 August 2025
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:09.7 | And now a word from our sponsor, Threat Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks. |
0:26.6 | Allow listing is a deny-by-default software that makes application control simple and fast. Ring fencing is an application containment strategy, ensuring apps can only access the files, |
0:32.6 | registry keys, network resources, and other applications they truly need to function. |
0:38.3 | Shut out cyber criminals with world-class endpoint protection from threat locker. |
0:43.3 | Microsoft warns of a high severity vulnerability in exchange server hybrid deployments. |
1:00.9 | A Dutch airline and a French telecom report data breaches. |
1:04.5 | Researchers reveal new HTTP request smuggling variants. |
1:09.0 | An Israeli spyware maker may have rebranded to evade U.S. sanctions. |
1:13.9 | CyberArk patches critical vulnerabilities in its secrets management platform. |
1:18.5 | The Akira gang uses a legit Intel CPU tuning driver to disable Microsoft Defender. |
1:24.8 | ChatTPT connectors are shown vulnerable to indirect prompt injection. |
1:29.3 | Researchers expose new details about the Vex Trio Cybercrime Network. |
1:34.1 | Sonic Wall says a recent SSL VPN-related cyber activity is not due to a zero-day. |
1:40.5 | Ryan Whelan from Accenture is our man on the street at Black Hat, |
1:47.6 | and to Android's dream of concierge duty. It's Thursday, August 7, 2025. It's Thursday, August 7th, 2025. |
2:05.1 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us. |
2:23.3 | It's great to have you with us, as always. |
2:26.2 | Microsoft has issued a warning about a high severity vulnerability in exchange server hybrid deployments. |
2:33.3 | The flaw could let attackers with access to on-premises exchange |
2:37.5 | escalate privileges in exchange online undetected. |
2:42.3 | In hybrid setups, both environments share a service principle for authentication. |
... |
Transcript will be available on the free plan in 16 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.