Podcast Episode Details

Back to Podcast Episodes

Can connected cars jeopardize national security?


Season 8 Episode 2156


The US is set to propose a ban on Chinese software and hardware in connected cars. Dell investigates a breach of employee data. Unit 42 uncovers a North Korean PondRAT and a red team tool called Splinter. Marko Polo malware targets cryptocurrency influencers, gamers, and developers. An Iranian state-sponsored threat group targets Middle Eastern governments and telecommunications.The alleged Snowflake hacker remains active and at large. German officials quantify fallout from the CrowdStrike incident. Apple’s latest macOS update has led to widespread issues with cybersecurity software and network connectivity. Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Supercharging your graphing calculator. 


Remember to leave us a 5-star rating and review in your favorite podcast app.


Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.


CyberWire Guest

Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Read their blog "Surging Hype: An Update on the Rising Abuse of GenAI" here


Selected Reading

Exclusive: US to propose ban on Chinese software, hardware in connected vehicles (Reuters)

Dell investigates data breach claims after hacker leaks employee info (Bleeping Computer)

North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages (Security Affairs)

Global infostealer malware operation targets crypto users, gamers (Bleeping Computer)

Iranian-Linked Group Facilitates APT Attacks on Middle East Networks (Security Boulevard)

Hacker behind Snowflake customer data breaches remains active (CyberScoop)

Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool (Palo Alto Networks)

Organizations are changing cybersecurity providers in wake of Crowdstrike outage (Help Net Security)

Cybersecurity Products Conking Out After macOS Sequoia Update (SecurityWeek)

Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating (Ars Technica)


Share your feedback.


Published on 1 year, 2 months ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate