4.6 • 1K Ratings
🗓️ 30 May 2024
⏱️ 35 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | The IT world used to be simpler. You only had to secure and manage environments that you controlled. |
0:20.0 | Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere. |
0:27.0 | This means poor visibility, security gaps, and added risk. |
0:31.0 | That's why Cloudflare created the first ever connectivity cloud. |
0:35.6 | Visit Cloud.com to protect your business everywhere you do business. Operation end game. Operation Endgame takes down malware operations around the globe. |
0:57.7 | A major botnet operator is arrested. |
1:00.1 | Ticketmaster's massive data breach is confirmed and so is Google's SEO algorithm leak. |
1:05.8 | Journalists and activists in Europe were targeted with Pegasus spyware. |
1:10.0 | Octa warns users of a credential stuffing attack, NIST hopes to clear out the n-vD backlog. |
1:16.4 | Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security. |
1:23.0 | Light Spy Surveillance Malware comes to MacOS. |
1:26.0 | On our Threat Vector segment, |
1:28.0 | host David Moulton speaks with Greg Jones, |
1:30.0 | chief information security officer at Xavier University of Louisiana. |
1:35.0 | And Chat, GPT briefly gets a God mode. It's Thursday, May 30th, 2024. |
1:54.0 | I'm Dave Bittner, and this is your CyberWire Intel briefing. An international law enforcement operation codenamed Operation Endgame |
2:16.0 | has seized over 100 servers used by major malware |
2:20.0 | loader operations like Ist ID, Pekabot and Trichbot. The operation conducted from May |
2:26.6 | 27th through the 29th spanned Europe and North America. Authorities arrested four individuals, one in Armenia and three in Ukraine, |
2:36.6 | and identified eight fugitives who will be added to Europol's Most Wanted List. |
2:42.0 | The seized infrastructure hosted over 2,000 domains providing illicit services. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.