meta_pixel
Tapesearch Logo
Log in
The Colin Cowherd Podcast

You Might Also Like: CyberWire Daily

The Colin Cowherd Podcast

iHeartPodcasts and The Volume

Sports, Football, Basketball, Sports News, News

4.81.1K Ratings

🗓️ 25 January 2025

⏱️ 36 minutes

🧾️ Download transcript

Summary

Introducing Hacking the bureau. from CyberWire Daily.

Follow the show: CyberWire Daily

The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulnerability in its Pluggable Authentication Module)software.  Google releases an open-source library for software composition analysis. CISA hopes to close the software understanding gap. Pumakit targets critical infrastructure. Simplehelp patches multiple flaws in their remote access software. The FTC bans GM from selling driver data. HHS outlines their efforts to protect hospitals and healthcare. Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense. Even the best of red teamers are humbled by AI. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.


CyberWire Guest

Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense, and how universities can get involved.


Selected Reading

FBI Has Warned Agents It Believes Hackers Stole Their Call Logs (Bloomberg)

US Announces Sanctions Against North Korean Fake IT Worker Network (SecurityWeek)

Russian Star Blizzard hackers exploit WhatsApp accounts to spy on nonprofits aiding Ukraine (The Record)

Yubico PAM Module Vulnerability Let Attackers Bypass Authentications In Certain Configurations (Cyber Security News)

Google Releases Open Source Library for Software Composition Analysis (SecurityWeek)

Closing the Software Understanding Gap (CISA)

Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure (Cyber Security News)

Vulnerabilities in SimpleHelp Remote Access Software May Lead to System Compromise (SecurityWeek)

FTC hands GM a 5-year ban on selling sensitive driver info to data brokers (The Record)

How HHS has strengthened cybersecurity of hospitals and health care systems (CyberScoop)

Microsoft AI Red Team says security work will never be done (The Register) 


Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 


Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

Learn more about your ad choices. Visit megaphone.fm/adchoices

DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to [email protected].

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:09.5

And now a message from our sponsor, Z-Scaler, the leader in cloud security.

0:17.2

Enterprises have spent billions of dollars on firewalls and VPNs, yet breaches continue to rise by an 18% year-over-year increase in ransomware attacks and a $75 million record payout in 2024.

0:31.1

These traditional security tools expand your attack surface with public-facing IPs that are exploited by bad actors,

0:38.0

more easily than ever, with AI tools.

0:40.8

It's time to rethink your security.

0:43.4

Z-scaler Zero Trust Plus AI stops attackers

0:47.0

by hiding your attack surface,

0:49.3

making apps and IPs invisible,

0:51.7

eliminating lateral movement,

0:53.5

connecting users only to specific apps, not the

0:56.5

entire network, continuously verifying every request based on identity and context, simplifying security

1:03.8

management with AI powered automation, and detecting threats using AI to analyze over 500 billion

1:10.7

daily transactions.

1:12.6

Hackers can't attack what they can't see.

1:14.9

Protect your organization with Z-Scaler, Zero Trust, and AI.

1:19.6

Learn more at z-scaler.com slash security.

1:27.1

Thank you. The FBI warns agents of hacked call and text logs.

1:41.1

The U.S. Treasury sanctions entities tied to North Korea's fake IT worker operations.

1:46.5

Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of non-profits

1:51.2

supporting Ukraine.

1:52.9

Ubiko discloses a critical vulnerability in its plugable authentication module software.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from iHeartPodcasts and The Volume, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of iHeartPodcasts and The Volume and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.