4.6 • 1K Ratings
🗓️ 2 July 2024
⏱️ 29 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the CyberWire Network, powered by N2K. |
0:07.0 | The IT world used to be simpler. You only had to secure and manage environments that you controlled. |
0:20.0 | Then came new technologies and new ways to work. Now employees, apps, and networks are everywhere. |
0:27.0 | This means poor visibility, security gaps, and added risk. |
0:31.0 | That's why Cloudflare created the first ever connectivity cloud. |
0:35.6 | Visit Cloud.com to protect your business everywhere you do business. A new open S.S.S.H vulnerability affects Linux systems, the Supreme Court sends social media |
0:59.6 | censorship cases back to the lower courts. |
1:02.5 | Chinese hackers exploit a new Cisco Zero Day. |
1:05.7 | HubSpot investigates unauthorized access to customer accounts. |
1:09.5 | Japanese media giant Katakawa confirmed data leaks from a ransomware attack. |
1:14.8 | Fake Bat is a popular malware loader. |
1:17.1 | Volcano Demon is a hot new ransomware group. |
1:20.5 | Google launches a KVM hypervisor bug bounty program. |
1:24.0 | Johannes Ulrich from the Sans Technology Institute discusses defending against API attacks. |
1:29.0 | And good night, sleep tight, don't let the hackers bite. It's Tuesday, July 2nd, 2024. |
1:45.0 | I'm Dave Bittner and this is your CyberWire Intel briefing. Thanks for joining us here once again. It is great to have you with us. |
2:10.0 | A new open S.S.S.S.H vulnerability, dubbed regression with a capital S.S.H in the middle of the word |
2:18.0 | regression allows unauthenticated remote code execution with root privileges on glibsy-based Linux systems. |
2:26.7 | Discovered by Kualis in May of this year, the flaw results from a race condition in the |
2:32.0 | SSHD signal handler. |
2:34.0 | It can be exploited if a client fails to authenticate within the default 120 second |
2:39.6 | login grace time, triggering unsafe, |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.