4.6 • 1K Ratings
🗓️ 24 April 2025
⏱️ 24 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:09.7 | And now a word from our sponsor, SpyCloud. Identity is the new battleground, and attackers are |
0:17.8 | exploiting stolen identities to infiltrate your organization. |
0:21.6 | Traditional defenses can't keep up. |
0:23.9 | SpyCloud's holistic identity threat protection helps security teams uncover and automatically |
0:29.3 | remediate hidden exposures across your users, from breaches, malware and fishing to neutralize |
0:35.6 | identity-based threats like account takeover, fraud, and ransomware. |
0:40.0 | Don't let invisible threats compromise your business. |
0:43.0 | Get your free corporate darknet exposure report at spycloud.com slash cyberwire and see what |
0:49.9 | attackers already know. That's spycloud.com slash cyberwire. Verizon and Mandient call for layered defenses against evolving threats. |
1:14.5 | Cisco Talos describes Toymaker and Cactus threat actors. |
1:18.5 | Researchers discover a major Linux security flaw which allows root kits to bypass traditional detection methods. |
1:24.7 | Ransomware groups are experimenting with new business models. |
1:28.1 | Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division shares the latest on Salt Typhoon. |
1:34.2 | And global censorship takes a coffee break. |
1:48.8 | It's Thursday, April 24th, 2024. |
2:08.4 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us again here today. |
2:09.7 | It's great to have you with us. |
2:14.5 | Two of the cybersecurity industry's most anticipated annual reports, |
2:22.2 | the Verizon 2025 Data Breach Investigations Report, the DBIR, and Mandian's M-Trens 2025 report, offer a revealing look at the evolving threat landscape. Drawing on tens of thousands |
2:29.5 | of real-world incidents, both reports provide critical insights into how threat actors operate, |
2:35.7 | what vulnerabilities they exploit, and which sectors are most at risk. Together, they highlight |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.