4.6 • 1K Ratings
🗓️ 19 March 2025
⏱️ 28 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:10.2 | And now a brief message from our sponsor, Drop Zone AI. |
0:17.0 | Is your sock drowning in alerts, with legitimate threats sitting in queues for hours or even days? |
0:23.6 | The latest Sands SOC survey report reveals alert fatigue and limited automation are SOC team's greatest barriers. |
0:31.6 | Dropzone AI, recognized by Gartner as a cool vendor, directly addresses these challenges through autonomous recursive |
0:39.4 | reasoning investigations, quickly eliminating false positives, enriching context and enabling analysts |
0:46.2 | to prioritize real incidents faster. Take control of your alerts and investigations with |
0:52.6 | Dropzone AI. |
1:15.4 | A.I. A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. |
1:21.5 | Europol warns of a shadow alliance between state-backed threat actors and cybercriminals. |
1:23.7 | Sequoia examines clear fate. |
1:27.3 | A critical Ph.P vulnerability is under active exploitation. A sophisticated scareware |
1:29.1 | fishing campaign has shifted its focus to macOS users. Fishing as a service attacks are on the |
1:34.9 | rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered |
1:41.8 | Stalachi Rat. Sisa confirms active exploitation of a critical Fortinette vulnerability. |
1:47.6 | On our cert bite segment, Chris Hare is joined by Troy McMillan |
1:50.9 | to break down a question targeting the ISACA certified information security manager exam |
1:56.1 | and AI coding assistants, get all judging. |
2:00.3 | Thank you. And AI coding assistants, get all judgy. |
2:12.2 | It's Wednesday, March 19th, 2025. |
2:16.2 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. |
2:36.2 | A critical vulnerability in American Megatrends International's MegaRack Baseboard Management Controller, that's AMI's BMC software, could let attackers hijack and potentially disable |
... |
Transcript will be available on the free plan in -13 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.