meta_pixel
Tapesearch Logo
CyberWire Daily

When retaliation turns digital.

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 10 January 2025

⏱️ 30 minutes

🧾️ Download transcript

Summary

New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS info-stealer has been updated. A California health services organization reports a data breach. A Florida firm pays a $337,750 HIPAA settlement following a 2018 breach. Samsung patches Android devices. A Proton Mail outage hits users worldwide. A popular e-card site recovers from malware. CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about the future of certifications. That’s a feature, not a hack.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about certifications and where they could be heading. You can check out their 2024 ISC2 Cybersecurity Workforce study here.  Selected Reading Chinese hackers breached US government office that assesses foreign investments for national security risks (CNN) Supreme Court considers whether to allow TikTok ban to take effect (NBC News)  Ivanti VPN zero-day exploited by Chinese hackers (SC Media) New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards (Cyber Security News) Banshee macOS Malware Expands Targeting (SecurityWeek) BayMark Health Services Reports Data Breach, Exposing Patient Information (The Cyber Express) Florida Firm Fined $337K by Feds for Data Deleted in Hack (BankInfo Security) Samsung Patches Multiple Vulnerabilities That Let Attackers Execute Arbitrary Code (Cyber Security News) Proton Mail still down as Proton recovers from worldwide outage (Bleeping Computer) GroupGreeting e-card site attacked in “zqxq” campaign (Malwarebytes) Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures (SecurityWeek) Facebook awards researcher $100,000 for finding bug that granted internal access (RocketNews) Developers sent into security panic by 'useful feature' (The Register) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the Cyberwire Network, powered by N2K.

0:08.8

Ready to launch your business? Get started with the commerce platform made for entrepreneurs.

0:13.9

Shopify is specially designed to help you start, run and grow your business with easy customizable themes that let you build your brand marketing tools

0:22.3

that get your products out there integrated shipping solutions that actually save you time from

0:26.7

startups to scale ups online in person and on the go Shopify is made for entrepreneurs like you

0:33.1

sign up for your one dollar a month trial at Shopify.com slash setup.

0:41.9

Ransomware, supply chain attacks, and zero-day exploits can strike without warning,

0:47.2

leaving your businesses sensitive data and digital assets vulnerable.

0:51.6

But imagine a world where your cybersecurity strategy could prevent these threats.

0:56.3

That's the power of the Threat Locker's Zero Trust endpoint protection platform.

1:01.7

Robust cybersecurity is a non-negotiable to safeguard organizations from cyber attacks.

1:07.5

Threat Locker implements a proactive, deny-by-default approach to cybersecurity blocking every action process and user unless specifically authorized by your team this least-privileged methodology mitigates the exploitation of trusted applications and ensures protection for your organization 24-7-365.

1:29.2

IT professionals are empowered by Threat Locker application Allow listing, ring-fencing,

1:35.1

network control, and EDR solutions, enhancing their cybersecurity posture,

1:40.0

and streamlining internal IT and security operations.

1:44.3

To learn more about how Threat Locker can help mitigate unknown threats in your digital environment

1:49.3

and align your organization with respected compliance frameworks, visit Threatlocker.com.

1:55.6

Thank you. New New details About

2:10.6

About

2:15.6

The US Treasury Department, the Supreme Court considers the TikTok ban.

2:16.6

Chinese hackers exploit a zero-day flaw

2:19.0

in Avanti-Connect-Secure VPN. A new credit card skimmer malware targets WordPress checkout pages.

...

Transcript will be available on the free plan in -34 days. Upgrade to see the full transcript now.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.