4.8 • 1.3K Ratings
🗓️ 14 January 2025
⏱️ 29 minutes
🧾️ Download transcript
Introducing China’s shadow over U.S. telecom networks. from CyberWire Daily.
Follow the show: CyberWire Daily
New reports shed light on both Volt and Salt Typhoons. Tenable updates faulty Nessus Agents and resumes plugin updates. A new infostealer campaign targets gamers on Discord. A fake version of a popular browser extension has been discovered stealing login credentials and conducting phishing attacks. ESET warns Windows 10 users of a potential “security fiasco.” A vulnerability in Nuclei allows attackers to bypass template signature verification and inject malicious code. An Indiana dental practice pays a $350,000 settlement over an alleged ransomware coverup. Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Farewell to a visionary leader.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Read Tim’s article on the UN cybercrime treaty here.
The US’s Worst Fears of Chinese Hacking Are on Display in Guam (Bloomberg)
How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons (Wall Street Journal)
China protests US sanctions for its alleged role in hacking, complains of foreign hacker attacks (AP News)
Tenable Disables Nessus Agents Over Faulty Updates (SecurityWeek)
New Infostealer Campaign Uses Discord Videogame Lure (Infosecurity Magazine)
Beware! Malicious EditThisCookie Chrome Extension Steals Login Credentials (Cyber Security News)
Windows 10 users urged to upgrade to avoid "security fiasco" (Bleeping Computer)
Nuclei flaw lets malicious templates bypass signature verification (Bleeping Computer)
Dental Practice Pays State in Alleged Data Breach 'Cover Up' (GovInfo Security)
Tenable CEO Amit Yoran Dead at 54 (SecurityWeek)
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to [email protected].
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:09.2 | It's the most wonderful time. |
0:13.4 | Are you a smart booker or a silly booker? |
0:16.4 | Smart bookers get access to a three-airport lounge by booking a five-star holiday with On the Beach. |
0:22.8 | Silly bookers? |
0:23.9 | Well, enjoy those cues at the bar. |
0:26.2 | Stop booking around and visit Onthebeach.com.uk. |
0:30.5 | Conditions apply. |
0:31.7 | Seven night minimum stay, outbound only from selected airports for up to six people, at all protected. |
0:37.8 | On the beach. |
0:41.6 | And now, a message from our sponsor, Z-Scaler, the leader in cloud security. |
0:47.3 | Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware |
0:56.5 | attacks and a $75 million record payout in 2024. |
1:01.2 | These traditional security tools expand your attack surface with public-facing IPs that are |
1:06.3 | exploited by bad actors, more easily than ever, with AI tools. |
1:10.9 | It's time to rethink your security. |
1:13.5 | Z-scaler Zero Trust Plus AI stops attackers by hiding your attack surface, making apps and IPs invisible, |
1:21.8 | eliminating lateral movement, connecting users only to specific apps, not the entire network, |
1:27.9 | continuously verifying every request based on identity and context, |
1:32.8 | simplifying security management with AI-powered automation, |
1:36.6 | and detecting threats using AI to analyze over 500 billion daily transactions. |
1:42.7 | Hackers can't attack what they can't see. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Jenkins and Jonez, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Jenkins and Jonez and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.