4.7 • 984 Ratings
🗓️ 23 July 2025
⏱️ 18 minutes
🧾️ Download transcript
Don’t sleep on that SharePoint exploit from earlier this week as it seems to have led to a ton of still active breaches. Apple has a new insurance plan for you. Elon wants even more money for xAI. The Chinese are still churning ahead with their AI models. And three different stories about AI and privacy.
Links:
See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Click on a timestamp to play from that location
0:00.0 | Welcome to the TechMeme right home for Wednesday, July 23rd, 2025. I'm Brian McCalla today. |
0:09.2 | Don't sleep on that SharePoint exploit from earlier this week as it seems to have led to a ton of still active breaches. |
0:15.8 | Apple has a new insurance plan for you. Elon wants even more money for XAI. |
0:20.8 | The Chinese are still churning |
0:22.3 | ahead with their AI models and three different stories about AI and privacy. Here's what you |
0:27.4 | miss today in the world of tech. Probably need to update you on something important. Microsoft says |
0:36.8 | it, quote, has observed two |
0:38.4 | named Chinese nation-state actors, Linen Typhoon and Violet Typhoon, exploiting the SharePoint |
0:44.8 | Zero Day vulnerabilities. Quoting, Bleeping Computer, we assess that at least one of the actors |
0:50.4 | responsible for this early exploitation is a Chinese nexus threat actor. It's critical to |
0:55.6 | understand that multiple actors are now actively exploiting this vulnerability. Charles Carmackold, |
1:00.7 | CTO of Google Cloud's Mandient Consulting, told Leaping Computer yesterday. Cybersecurity firm |
1:06.4 | Checkpoint also revealed on Monday that it discovered the first signs of exploitation on July |
1:10.7 | 7th, |
1:11.6 | adding that the attackers targeted dozens of entities across the government, telecommunications, |
1:16.2 | and software sectors in North America and Western Europe. |
1:19.2 | Microsoft Patch the two flaws as part of the July Patch Tuesday updates used by |
1:23.1 | threat actors to compromise fully patched SharePoint servers. |
1:26.7 | Since then, it released emergency |
1:28.0 | patches for SharePoint subscription edition, SharePoint 2019, and SharePoint 2016 to address both |
1:33.6 | RCE flaws, end quote. And, uh, yeah, a source tells Bloomberg that the U.S. National |
1:40.3 | Nuclear Security Administration was among those breached by that hack. No sensitive information |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Amalgamated Internets, LLC, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Amalgamated Internets, LLC and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.