4.6 • 1K Ratings
🗓️ 8 July 2025
⏱️ 26 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:09.7 | And now a word from our sponsor, Cloud Range. |
0:17.4 | At Cloud Range, they believe cybersecurity readiness starts with people, not just technology. |
0:22.9 | That's why their proactive simulation-based training helps security teams build confidence and |
0:28.1 | skill from day one. By turning potential into performance, they empower SOC and incident response |
0:34.4 | teams to respond quickly, smartly, and in sync with evolving threats. |
0:39.5 | Learn how Cloud Range is helping organizations |
0:41.9 | stay ahead of cyber risks at www.com. |
0:47.3 | Thank you. Researchers release proof-of-concept exploits for Citrix bleed to Grafana patches four high-severity vulnerabilities. |
1:09.0 | A hacker claims to have breached Spanish telecom giant |
1:12.2 | telephonica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial |
1:17.8 | espionage. Beware a new ransomware group called Burt. Call of duty goes offline after reports of |
1:24.8 | RCE vulnerabilities. President Trump's spending bill allocates hundreds of |
1:28.8 | millions for cybersecurity. Nearly 26 million job seekers' resumes and personal data are leaked. |
1:35.2 | SISA adds four actively exploited vulnerabilities to the known exploited vulnerabilities catalog. |
1:40.7 | For threat vector, host David Moulton speaks with Daniel Frank and Tom Focterman from Palo Alto Network's threat research team about hunting threats in developer environments and outsmarting AI scraper bots with math. |
1:59.0 | It's Tuesday, July 8th, 2025. |
2:05.8 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. It's great to have you with us. |
2:25.9 | Researchers have released proof-of-concept exploits for Citrix bleed 2, a critical flaw in Citrix, |
2:33.0 | net-scaler AD ADC and gateway devices. |
2:36.5 | The bug lets attackers steal user session tokens by sending malformed post-login requests, |
2:43.5 | revealing memory contents. Citrix bleed 2 is similar to the 2023 Citrix bleed flaw |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.