4.6 • 1K Ratings
🗓️ 24 July 2024
⏱️ 34 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | Quick. Quick question. Do your end users always work on company-owned devices and IT approved |
0:20.4 | apps? If the answer is no, then my next question is, how do you keep company |
0:26.1 | data safe on all those unmanaged apps and devices? One password has an answer to this |
0:32.1 | question, extended access management |
0:34.9 | One Password extended access management helps you secure every sign-in for every |
0:40.7 | app on every device because it solves the problem traditional IAM and |
0:45.6 | MDM can't touch. Check it out at one password.com slash |
0:50.8 | x-am that's one password.com slash |
0:55.0 | X AM. StarGazer Goblin hosts malicious code repositories on GitHub. |
1:15.0 | Crowd strike blames buggy validation checks for last week's major incident. |
1:20.0 | The Breach Forum's database reveals Threat Actor Opset. |
1:23.4 | Windows Hello for Business was found vulnerable to downgrade attacks. |
1:27.5 | A medical center in the U.S. Virgin Islands is hit with ransomware. |
1:31.4 | Inter Isle analyzes the fishing landscape. |
1:34.4 | The FTC orders eight companies to explain algorithmic pricing. |
1:38.8 | Meta cracks down on the Nigerian Yahoo boys. |
1:42.0 | A fake IT worker gets caught in the act. My conversation with Nick |
1:46.1 | Fillingham and Wendy Zononi, co-hosts of Microsoft Securities The Blue Hat Podcast. And researchers wonder if proving your human proves profitable for Google. It's Wednesday, July 24th, 2024. |
2:07.0 | I'm Dave Bitner, and this is your CyberWire Intel briefing. Thank you for once again joining us. It is great as always to have you here with us. |
2:32.2 | A secret network of around 3,000 ghost accounts |
2:36.6 | on GitHub has been manipulating the platform to promote malware and fishing links, as revealed by research from cybersecurity firm Checkpoint. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.