4.6 • 1K Ratings
🗓️ 29 July 2025
⏱️ 28 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:10.2 | Bad actors don't break in, they log in. |
0:16.0 | Attackers use stolen credentials in nearly nine out of ten data breaches, |
0:20.2 | and once inside, thereafter one thing, |
0:22.6 | your data. |
0:23.9 | Veronis's AI-powered data security platform secures your data at scale. |
0:29.2 | Across Lass, SaaS, and hybrid cloud environments, join thousands of organizations who trust |
0:35.4 | Veronis to keep their data safe. |
0:37.3 | Get a free data risk assessment at Veronis to keep their data safe. |
0:41.0 | Get a free data risk assessment at veronis.com. Things get worse in the T-Dating app breach. |
0:59.9 | Sissa adds three vulnerabilities to its known exploited vulnerabilities catalog. |
1:04.2 | Researchers uncover a critical flaw in Google's AI coding assistant. |
1:08.5 | A Missouri health system agrees to a $9.25 million settlement over claims it |
1:13.1 | used web tracking tools. Sploit light could let attackers bypass Apple's TCC framework to steal |
1:19.6 | sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the |
1:25.9 | oyster back door in popular IT tools. The FBI nabs |
1:29.9 | over $2.4 million in Bitcoin from the chaos ransomware gang. Our guest is Jason Schultz, technical |
1:36.4 | leader for Cisco Talos Security Intelligence and Research Group to talk about their work on the |
1:41.5 | security of PDF files and the unintended privacy paradox of data brokers. |
2:05.7 | It's Tuesday, July 29th, 2025. |
2:24.8 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. |
2:26.1 | It's great to have you with us. |
... |
Transcript will be available on the free plan in 7 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.