4 • 38 Ratings
🗓️ 31 May 2025
⏱️ 8 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | This is TechCrunch. |
0:06.4 | Hi, this is Ava from Vanta. |
0:09.4 | In today's digital world, compliance regulations are changing constantly, and earning |
0:14.1 | customer trust has never mattered more. Vanta helps companies get compliant fast and stay |
0:19.5 | secure, with the most advanced AI automation |
0:22.1 | and continuous monitoring out there. So whether you're a startup going for your first SOC2 |
0:26.2 | or ISO-27,001, or a growing enterprise managing vendor risk, Banta makes it quick, easy, and |
0:32.4 | scalable. And I'm not to say that because I work here. Get started today at vanta.com. |
0:37.3 | Today, we're going to look at how a decade-old patent dispute could upend Uber's business. |
0:43.1 | I'm your Monchake and your Saturday Daily Crunch featuring three of the most talked-about tech |
0:48.1 | headlines. This starts now. The White House is investigating after one or more people reportedly accessed the contacts from the |
0:58.2 | personal phone of White House Chief of Staff, Susie Wilds, and use the information to contact |
1:04.5 | other top officials and impersonate her. Wilde reportedly told people that her phone was hacked. |
1:10.6 | The Wall Street Journal first reported the hack of Wilde's phone people that her phone was hacked. The Wall Street Journal first reported |
1:12.2 | the hack of Wild's phone. CBS News also confirmed the reporting. The hacker or hackers are |
1:18.8 | set to have accessed Wilde's phone contacts, including the phone numbers of other top U.S. officials |
1:24.3 | and influential individuals. Now, the Wall Street Journal reports that those who received phone calls impersonating Wilds |
1:30.9 | used AI to impersonate her voice and sent text messages from a number not associated with Wilds. |
1:38.6 | White House spokesperson Anna Kelly would not say, when asked by TechCrunch, |
1:43.1 | if authorities had determined if a cloud |
1:45.2 | account associated with Wild's personal device was compromised, or if Wilde's phone was targeted |
1:51.2 | by a more advanced cyber attack, such as one that involves the use of government-grade spyware. |
... |
Transcript will be available on the free plan in 8 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from SpokenLayer, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SpokenLayer and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.