meta_pixel
Tapesearch Logo
CyberWire Daily

The nightmare you can’t ignore.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 25 March 2025

⏱️ 26 minutes

🧾️ Download transcript

Summary

Critical Remote Code Execution vulnerabilities affect Kubernetes controllers. Senior Trump administration officials allegedly use unsecured platforms for national security discussions. Even experts like Troy Hunt get phished. Google acknowledges user data loss but doesn’t explain it. Chinese hackers spent four years inside an Asian telecom firm. SnakeKeylogger is a stealthy, multi-stage credential-stealing malware. A cybercrime crackdown results in over 300 arrests across seven African countries. Ben Yelin, Caveat co-host and Program Director, Public Policy & External Affairs at the University of Maryland Center for Health and Homeland Security, joins to discuss the Signal national security leak. Pew Research Center figures out how its online polling got slightly forked. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin, Caveat co-host and Program Director, Public Policy & External Affairs at the University of Maryland Center for Health and Homeland Security, on the Signal national security leak. Selected Reading IngressNightmare: critical Kubernetes vulnerabilities in ingress NGINX controller (Beyond Machines) Remote Code Execution Vulnerabilities in Ingress NGINX (Wiz)  Ingress-nginx CVE-2025-1974: What You Need to Know (Kubernetes)  Trump administration is reviewing how its national security team sent military plans to a magazine editor (NBC News) The Trump Administration Accidentally Texted Me Its War Plans (The Atlantic) How Russian Hackers Are Exploiting Signal 'Linked Devices' Feature for Real-Time Spying (SecurityWeek) Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List (Troy Hunt) 'Technical issue' at Google deletes some customer data (The Register) Chinese hackers spent four years inside Asian telco’s networks (The Record) Multistage Info Stealer SnakeKeylogger Attacking Individuals and Businesses to Steal Logins (Cyber Security News) Over 300 arrested in international crackdown on cyber scams (The Record) How a glitch in an online survey replaced the word ‘yes’ with ‘forks’ (Pew Research) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:12.0

Investigating is hard enough. Your tools shouldn't make it harder.

0:16.6

Maltigo brings all your intelligence into one platform and gives you curated data,

0:21.4

along with a full suite of tools to handle any digital investigation.

0:25.5

Plus, with on-demand courses and live training, your team won't just install the platform.

0:30.6

They'll actually use it and connect the dots so fast,

0:34.4

cybercriminals won't realize they're already in cuffs.

0:38.2

Maltigo is trusted by global law enforcement, financial institutions, and security teams worldwide.

0:44.3

See it in action now at Maltigo.com. Critical remote code execution vulnerabilities affect Kubernetes controllers.

1:06.1

Senior Trump administration officials allegedly used unsecured platforms for national security discussions.

1:12.6

Even experts like Troy Hunt get fished. Google acknowledges user data loss but doesn't explain it.

1:19.3

Chinese hackers spent four years inside an Asian telecom firm. Snake key logger is a stealthy multi-stage

1:26.1

credential stealing malware.

1:33.1

A cybercrime crackdown results in over 300 arrests across seven African countries.

1:40.2

And the Pew Research Center figures out how its online polling got slightly forked. Music It's Tuesday, March 25th, 2025.

1:55.8

I'm Dave Bittner, and this is your Cyberwire Intel briefing.

2:12.5

Thank you. and this is your Cyberwire Intel briefing. Thanks for joining us here today.

2:14.4

Great to have you with us.

2:16.2

Wiz research discovered four critical remote code

2:19.1

execution vulnerabilities dubbed Ingris Nightmare in the Ingris EngineX controller for Kubernetes.

2:27.5

These flaws allow unauthenticated attackers to inject malicious ingenics configurations,

2:34.0

leading to full cluster takeover and unauthorized access to all secrets across namespaces.

...

Transcript will be available on the free plan in -7 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.