4.6 • 1K Ratings
🗓️ 8 April 2025
⏱️ 32 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:09.7 | Secure access is crucial for U.S. public sector missions, ensuring that only authorized users can access certain systems, |
0:22.1 | networks, or data. Are your defenses ready? |
0:25.2 | Cisco's security service edge delivers comprehensive protection for your network and users. |
0:31.1 | Experience the power of zero trust and secure your workforce wherever they are. |
0:36.1 | Elevate your security strategy by visiting |
0:38.3 | Cisco.com slash go.s. |
0:42.1 | That's C-I-S-C-O-com |
0:45.1 | slash geo-slash-S-E. |
0:48.1 | Thank you. Is Doge using AI to monitor federal employees? |
1:07.0 | Google's latest Android update addresses two zero days. Scattered Spider continues its |
1:12.9 | fishing and malware campaigns. Ransomware's grip is slipping. Toddy Cat exploits a critical |
1:18.7 | flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Avanti |
1:25.4 | Connect secure appliances remain exposed online to a critical remote code |
1:29.7 | execution vulnerability. Sisa confirms active exploitation of a critical vulnerability in Crush |
1:35.2 | FTP. In our industry voices segment, we're joined by Matt Radeleck, VP of Incident Response |
1:41.3 | at Veronis, on turning to gamers to build resilient cyber teams and AI outfish's |
1:48.1 | human red teams. |
2:04.8 | It's Tuesday, April 8th, 2025. |
2:25.4 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. Thanks for joining us here today. It's great to have you with us. |
2:34.5 | The Trump administration's use of Elon Musk's Doge team continues to raise serious cybersecurity and transparency concerns. |
2:41.7 | According to a Reuters exclusive, Doge is reportedly using AI to monitor federal employee communications for perceived disloyalty to Trump or Musk, including scanning platforms like Microsoft |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.