4.6 • 1K Ratings
🗓️ 25 March 2025
⏱️ 26 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:12.0 | Investigating is hard enough. Your tools shouldn't make it harder. |
0:16.6 | Maltigo brings all your intelligence into one platform and gives you curated data, |
0:21.4 | along with a full suite of tools to handle any digital investigation. |
0:25.5 | Plus, with on-demand courses and live training, your team won't just install the platform. |
0:30.6 | They'll actually use it and connect the dots so fast, |
0:34.4 | cybercriminals won't realize they're already in cuffs. |
0:38.2 | Maltigo is trusted by global law enforcement, financial institutions, and security teams worldwide. |
0:44.3 | See it in action now at Maltigo.com. Critical remote code execution vulnerabilities affect Kubernetes controllers. |
1:06.1 | Senior Trump administration officials allegedly used unsecured platforms for national security discussions. |
1:12.6 | Even experts like Troy Hunt get fished. Google acknowledges user data loss but doesn't explain it. |
1:19.3 | Chinese hackers spent four years inside an Asian telecom firm. Snake key logger is a stealthy multi-stage |
1:26.1 | credential stealing malware. |
1:33.1 | A cybercrime crackdown results in over 300 arrests across seven African countries. |
1:40.2 | And the Pew Research Center figures out how its online polling got slightly forked. Music It's Tuesday, March 25th, 2025. |
1:55.8 | I'm Dave Bittner, and this is your Cyberwire Intel briefing. |
2:12.5 | Thank you. and this is your Cyberwire Intel briefing. Thanks for joining us here today. |
2:14.4 | Great to have you with us. |
2:16.2 | Wiz research discovered four critical remote code |
2:19.1 | execution vulnerabilities dubbed Ingris Nightmare in the Ingris EngineX controller for Kubernetes. |
2:27.5 | These flaws allow unauthenticated attackers to inject malicious ingenics configurations, |
2:34.0 | leading to full cluster takeover and unauthorized access to all secrets across namespaces. |
... |
Transcript will be available on the free plan in -7 days. Upgrade to see the full transcript now.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.