meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Orange you glad you didn't fall for this?

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 25 February 2025

⏱️ 29 minutes

🧾️ Download transcript

Summary

A hacker claims to have stolen internal documents from  a major French telecommunications company. A security breach hits Russia’s financial sector. Cyberattacks targeting ICS and OT surged dramatically last year. Chinese group Silver Fox is spoofing medical software. The UK Home Office’s new vulnerability reporting policy risks prosecuting ethical hackers. Ransomware actors are shifting away from encryption. A sophisticated macOS malware campaign is distributing Poseidon Stealer. The LightSpy surveillance framework evolves into a cross-platform espionage tool. A Chinese botnet is targeting Microsoft 365 accounts using password spraying attacks. Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. There may be a backdoor in your front door. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. Selected Reading Orange Group confirms breach after hacker leaks company documents (Bleeping Computer) Russia warns of breach of major IT service provider LANIT serving the financial sector (Beyond Machines)  Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors (CyberScoop) China's Silver Fox spoofs medical imaging apps to hijack patients' computers (The Register) UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution (The Record) Only a Fifth of Ransomware Attacks Now Encrypt Data (Infosecurity Magazine) Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site (Cyber Security News)  Exploits for unpatched Parallels Desktop flaw give root on Macs (Bleeping Computer) LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms (GB Hackers)  Chinese Botnet Bypasses MFA in Microsoft 365 Attacks (Infosecurity Magazine) CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability (SecurityWeek) A single default password exposes access to dozens of apartment buildings (TechCrunch) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.7

Hey, everybody, Dave here. Have you ever wondered where your personal information is lurking online?

0:19.1

Like many of you, I was concerned about my data being sold by

0:23.1

data brokers. So I decided to try, delete me. I have to say, delete me is a game changer.

0:29.9

Within days of signing up, they started removing my personal information from hundreds of data brokers.

0:36.3

I finally have peace of mind knowing my data privacy

0:39.3

is protected. Delete Me's team does all the work for you with detailed reports so you know

0:45.2

exactly what's been done. Take control of your data and keep your private life private by signing up

0:51.4

for Delete Me. Now at a special discount for our listeners, today get 20%

0:56.6

off your DeleteMe plan when you go to join deleteme.com slash N2K and use promo code N2K at checkout.

1:05.7

The only way to get 20% off is to go to join deleteme.com slash n2k and enter code n2k at checkout.

1:14.0

That's join deleteme.com slash n2k code n2k.

1:18.2

Okay.

1:18.2

Okay.

1:22.2

I'm

1:23.6

The A hacker claims to have stolen internal documents from a major French telecommunications company.

1:37.8

A security breach hits Russia's financial sector.

1:40.8

Cyber attacks targeting ICS and OT surge dramatically last year. Chinese group Silver

1:46.7

Fox is spoofing medical software. The UK's home office's new vulnerability reporting policy

1:52.2

risks prosecuting ethical hackers. Ransomware actors are shifting away from encryption. A sophisticated

1:58.5

macOS malware campaign is distributing Poseidon Steeler. The

2:02.8

light spy surveillance framework evolves into a cross-platform espionage tool. A Chinese botnet is

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.