
Sign up to save your podcasts
Or
Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the Chaos ransomware gang. Our guest is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group, to talk about their work on the security of PDF files. The unintended privacy paradox of data brokers.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we are joined by Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group, to talk about their work on "PDFs: Portable documents, or perfect deliveries for phish?"
Selected Reading
A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating (404 Media)
CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching (Beyond Machines)
CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine (Infosecurity Magazine)
Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration (CyberScoop)
Health System Settles Web Tracker Lawsuit for Up to $9.25M (GovInfo Security)
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data (Bleeping Computer)
Endgame Gear mouse config tool infected users with malware (Bleeping Computer)
Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning (GB Hackers)
FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang (Infosecurity Magazine)
Hundreds of registered data brokers ignore user requests around personal data (CyberScoop)
Audience Survey
Complete our annual audience survey before August 31.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
4.8
989989 ratings
Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the Chaos ransomware gang. Our guest is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group, to talk about their work on the security of PDF files. The unintended privacy paradox of data brokers.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we are joined by Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence & Research Group, to talk about their work on "PDFs: Portable documents, or perfect deliveries for phish?"
Selected Reading
A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating (404 Media)
CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching (Beyond Machines)
CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine (Infosecurity Magazine)
Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration (CyberScoop)
Health System Settles Web Tracker Lawsuit for Up to $9.25M (GovInfo Security)
Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data (Bleeping Computer)
Endgame Gear mouse config tool infected users with malware (Bleeping Computer)
Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning (GB Hackers)
FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang (Infosecurity Magazine)
Hundreds of registered data brokers ignore user requests around personal data (CyberScoop)
Audience Survey
Complete our annual audience survey before August 31.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at [email protected] to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
1,982 Listeners
364 Listeners
639 Listeners
371 Listeners
182 Listeners
314 Listeners
408 Listeners
925 Listeners
7,917 Listeners
163 Listeners
190 Listeners
311 Listeners
76 Listeners
128 Listeners
43 Listeners