meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Tea time is over.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 29 July 2025

⏱️ 28 minutes

🧾️ Download transcript

Summary

Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the Chaos ransomware gang. Our guest is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group, to talk about their work on the security of PDF files.  The unintended privacy paradox of data brokers. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group, to talk about their work on "PDFs: Portable documents, or perfect deliveries for phish?" Selected Reading A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating (404 Media) CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching (Beyond Machines) CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine (Infosecurity Magazine) Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration (CyberScoop) Health System Settles Web Tracker Lawsuit for Up to $9.25M (GovInfo Security) Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data (Bleeping Computer) Endgame Gear mouse config tool infected users with malware (Bleeping Computer) Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning (GB Hackers) FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang (Infosecurity Magazine) Hundreds of registered data brokers ignore user requests around personal data (CyberScoop) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:10.2

Bad actors don't break in, they log in.

0:16.0

Attackers use stolen credentials in nearly nine out of ten data breaches,

0:20.2

and once inside, thereafter one thing,

0:22.6

your data.

0:23.9

Veronis's AI-powered data security platform secures your data at scale.

0:29.2

Across Lass, SaaS, and hybrid cloud environments, join thousands of organizations who trust

0:35.4

Veronis to keep their data safe.

0:37.3

Get a free data risk assessment at Veronis to keep their data safe.

0:41.0

Get a free data risk assessment at veronis.com. Things get worse in the T-Dating app breach.

0:59.9

Sissa adds three vulnerabilities to its known exploited vulnerabilities catalog.

1:04.2

Researchers uncover a critical flaw in Google's AI coding assistant.

1:08.5

A Missouri health system agrees to a $9.25 million settlement over claims it

1:13.1

used web tracking tools. Sploit light could let attackers bypass Apple's TCC framework to steal

1:19.6

sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the

1:25.9

oyster back door in popular IT tools. The FBI nabs

1:29.9

over $2.4 million in Bitcoin from the chaos ransomware gang. Our guest is Jason Schultz, technical

1:36.4

leader for Cisco Talos Security Intelligence and Research Group to talk about their work on the

1:41.5

security of PDF files and the unintended privacy paradox of data brokers.

2:05.7

It's Tuesday, July 29th, 2025.

2:24.8

I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today.

2:26.1

It's great to have you with us.

...

Transcript will be available on the free plan in 7 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.