meta_pixel
Tapesearch Logo
CyberWire Daily

Remote hijacking at your fingertips.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 19 March 2025

⏱️ 28 minutes

🧾️ Download transcript

Summary

A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. Europol warns of a “shadow alliance” between state-backed threat actors and cybercriminals. Sekoia examines ClearFake. A critical PHP vulnerability is under active exploitation. A sophisticated scareware phishing campaign has shifted its focus to macOS users. Phishing as a service attacks are on the rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered StilachiRAT. CISA confirms active exploitation of a critical Fortinet vulnerability. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. AI coding assistants get all judgy.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources. This week, Chris is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. Today’s question comes from N2K’s ISACA® Certified Information Security Manager® (CISM®) Practice Test. The CISM exam helps to affirm your ability to assess risks, implement effective governance, proactively respond to incidents and is the preferred credential for IT managers, according to ISACA.To learn more about this and other related topics under this objective, please refer to the following resource: CISM Review Manual, 15th Edition, 1.0, Information Security Governance, Introduction. Have a question that you’d like to see covered? Email us at [email protected]. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers. Additional source: https://www.isaca.org/credentialing/cism#1 Selected Reading Critical AMI MegaRAC bug can let attackers hijack, brick servers (bleepingcomputer) Europol Warns of “Shadow Alliance” Between States and Criminals (Infosecurity Magazine) ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery (Sekoia.io Blog) PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems (cybersecuritynews) Scareware Combined With Phishing in Attacks Targeting macOS Users (securityweek) Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge (Infosecurity Magazine) New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware (gbhackers) Microsoft Warns of New StilachiRAT Malware (SecurityWeek) Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns (Infosecurity Magazine) AI coding assistant Cursor reportedly tells a 'vibe coder' to write his own damn code (TechCrunch) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:10.2

And now a brief message from our sponsor, Drop Zone AI.

0:17.0

Is your sock drowning in alerts, with legitimate threats sitting in queues for hours or even days?

0:23.6

The latest Sands SOC survey report reveals alert fatigue and limited automation are SOC team's greatest barriers.

0:31.6

Dropzone AI, recognized by Gartner as a cool vendor, directly addresses these challenges through autonomous recursive

0:39.4

reasoning investigations, quickly eliminating false positives, enriching context and enabling analysts

0:46.2

to prioritize real incidents faster. Take control of your alerts and investigations with

0:52.6

Dropzone AI.

1:15.4

A.I. A critical vulnerability could let attackers hijack and potentially disable vulnerable servers.

1:21.5

Europol warns of a shadow alliance between state-backed threat actors and cybercriminals.

1:23.7

Sequoia examines clear fate.

1:27.3

A critical Ph.P vulnerability is under active exploitation. A sophisticated scareware

1:29.1

fishing campaign has shifted its focus to macOS users. Fishing as a service attacks are on the

1:34.9

rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered

1:41.8

Stalachi Rat. Sisa confirms active exploitation of a critical Fortinette vulnerability.

1:47.6

On our cert bite segment, Chris Hare is joined by Troy McMillan

1:50.9

to break down a question targeting the ISACA certified information security manager exam

1:56.1

and AI coding assistants, get all judging.

2:00.3

Thank you. And AI coding assistants, get all judgy.

2:12.2

It's Wednesday, March 19th, 2025.

2:16.2

I'm Dave Bittner, and this is your Cyberwire Intel briefing.

2:36.2

A critical vulnerability in American Megatrends International's MegaRack Baseboard Management Controller, that's AMI's BMC software, could let attackers hijack and potentially disable

...

Transcript will be available on the free plan in -13 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.