4.6 • 1K Ratings
🗓️ 28 February 2025
⏱️ 27 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:12.5 | Cyber threats are evolving every second, and staying ahead is more than just a challenge. |
0:17.8 | It's a necessity. |
0:19.1 | That's why we're thrilled to partner with Threat Locker, |
0:21.6 | a cybersecurity solution trusted by businesses worldwide. Threat Locker is a full suite of solutions |
0:27.8 | designed to give you total control, stopping unauthorized applications, securing sensitive data, |
0:34.1 | and ensuring your organization runs smoothly and securely. |
0:39.0 | Visit Threatlocker.com today to see how a default-deny approach can keep your company safe and compliant. |
0:46.3 | Thank you. Chilin Ransomware Gang claims responsibility for attack against Lee Enterprises. |
1:05.8 | Thai police arrest suspected hacker behind more than 90 data leaks. |
1:10.2 | Java Ghost uses compromised AWS environments to launch fishing campaigns. |
1:14.8 | Lotus Blossom cyber espionage campaigns target Southeast Asia. |
1:19.0 | Malware abuses Microsoft Dev tunnels for C2 communication. |
1:22.9 | Protecting the food supply. |
1:24.8 | Today's guest is Keith Malarski, chief global ambassador at Q&Tel and former FBI |
1:30.1 | special agent, discussing crypto being the target of the cyber underground. And an interview with |
1:36.8 | Iron Man? |
1:55.8 | Music Today is Friday, February 28th, 20203. |
2:00.3 | I'm Maria Varmazis, host of T-minus Space Daily, in for Dave Bittner. |
2:03.0 | And this is your Cyberwire Intel briefing. |
2:20.9 | The Chilean Ransomware Group yesterday claimed responsibility for an attack against Iowa-based newspaper publisher Lee Enterprises reports Security Week. |
2:34.5 | The group claims to have stolen around 350 gigabytes of data, including investor records, financial arrangements that raise questions, payments to journalists and publishers, funding for tailored news stories, and approaches to obtaining insider information. |
... |
Transcript will be available on the free plan in -32 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.