4.6 • 1K Ratings
🗓️ 5 May 2025
⏱️ 25 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:09.7 | And now a word from our sponsor, SpyCloud. Identity is the new battleground, and attackers are |
0:17.8 | exploiting stolen identities to infiltrate your organization. |
0:21.6 | Traditional defenses can't keep up. |
0:23.9 | SpyCloud's holistic identity threat protection helps security teams uncover and automatically |
0:29.3 | remediate hidden exposures across your users, from breaches, malware and fishing to neutralize |
0:35.6 | identity-based threats like account takeover, fraud, and ransomware. |
0:40.0 | Don't let invisible threats compromise your business. |
0:43.0 | Get your free corporate darknet exposure report at spycloud.com slash cyberwire and see what |
0:49.9 | attackers already know. That's spycloud.com slash cyberwire. |
1:09.3 | Researchers uncover serious vulnerabilities in this signal fork reportedly used by top government officials. |
1:15.9 | Sessa adds a second Comvalt flaw to its known exploited vulnerabilities catalog. |
1:20.8 | XAI exposed a private API key on GitHub for nearly two months. |
1:25.9 | Forta Guard uncovers the cyber espionage campaign targeting |
1:28.8 | critical national infrastructure in the Middle East. Threat brokers advertise a new SS7-Z0-day |
1:34.6 | exploit on cybercrime forums. The SteelC Info-Stealer and malware loader gets an update. Pass |
1:41.1 | keys blazed the trail to a passwordless future on our afternoon cyber tea segment |
1:46.4 | with Anne Johnson and speaks with Christina Marillo, head of information security at the New York |
1:51.7 | Giants. And Cubism meets computing. The Z80 goes full Picasso. |
1:57.0 | Thank you. Casa. |
2:10.8 | It's Monday, May 5th, 2025. |
2:28.2 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. Hello, everyone, and welcome back. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.