meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Yippee-ki-yay, cybercriminals! [OMITB]

CyberWire Daily

N2K Networks, Inc.

Tech News, News, Daily News, Technology

4.61K Ratings

🗓️ 25 December 2025

⏱️ 38 minutes

🧾️ Download transcript

Summary

While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:11.4

Most environments trust far more than they should, and attackers know it.

0:16.3

Threat Locker solves that by enforcing default deny at the point of execution.

0:22.7

With Threat Locker Allow listing,

0:28.8

you stop unknown executables cold. With ring fencing, you control how trusted applications behave,

0:35.0

and with Threat Locker DAC, defense against configurations, you get real assurance that your environment is free of misconfigurations and clear visibility into whether you meet compliance standards.

0:41.4

Threat Locker is the simplest way to enforce zero-trust principles without the operational pain.

0:46.8

It's powerful protection that gives CISO's real visibility, real control, and real peace of mind.

0:53.2

Threat Locker makes zero-trust attainable, even for small security teams.

0:58.0

See why thousands of organizations choose Threat Locker to minimize alert fatigue,

1:02.4

stop ransomware at the source, and regain control over their environments.

1:07.1

Schedule your demo at Threatlocker.com slash N2K today.

1:34.2

Okay, so tell me this doesn't feel exactly like the start of that one movie.

1:42.5

Yeah, office party, lights flickering, everyone pretending to be festive while secretly thinking about email notifications.

1:44.2

Oh yeah, what's that one movie where the's just trying to enjoy the holiday and then everything

1:48.0

goes terribly wrong?

1:49.8

That's like half the Hallmark Channel, Dave.

1:52.8

No, no.

1:53.4

I know what he means.

1:54.5

Big building, holiday party, chaos.

1:57.5

Oh, no.

1:58.2

Wait a minute.

...

Transcript will be available on the free plan in 4 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2026.