A new story from The CyberWire

The CyberWire
|

Automatic TRANSCRIPT

In an environment <Speech_Male> you already has <Speech_Male> administrative <Speech_Music_Male> access why <Speech_Music_Male> not just put in <Speech_Music_Male> ransomware rather <Speech_Music_Male> <Advertisement> than to <Speech_Music_Male> a mining <Speech_Music_Male> expedition. <Speech_Music_Male> Now, clearly, <Speech_Music_Male> mining is less <Speech_Music_Male> destructive <Speech_Music_Male> but it can <Speech_Music_Male> also take <Speech_Music_Male> <Advertisement> down in environment <Speech_Music_Male> <Advertisement> as we've seen with the fear <Speech_Music_Male> <Advertisement> of our clients over <Speech_Music_Male> <Advertisement> the last <SpeakerChange> two to three <Speech_Music_Male> <Advertisement> years. <Speech_Music_Male> <Advertisement> Alright <Speech_Music_Male> <Advertisement> well, Justin Harvey <Speech_Music_Male> <Advertisement> thanks for joining us. <Music> <Advertisement> They. <Music> <Music> <Music> Able. <Music> <Music> <Music> <Advertisement> <Speech_Music_Male> <SpeakerChange> <Speech_Music_Male> <Speech_Male> Thanks to all of <Speech_Male> our sponsors for making <Speech_Male> the cyber wire possible <Speech_Male> especially <Speech_Male> are supporting sponsor <Speech_Male> proof points observed <Speech_Male> the leading <Speech_Male> people centric <Speech_Male> insider threat management <Speech_Male> solution <Speech_Male> <Advertisement> learn more at <Silence> <Advertisement> observed <SpeakerChange> dot com. <Music> <Advertisement> <Music> <Music> <Music> <Music> <Music> <Music> <Speech_Music_Male> And <Speech_Music_Male> <Advertisement> that's the cyber wire. <Speech_Music_Male> <Advertisement> For links <Speech_Music_Male> <Advertisement> to all of today's stories, <Speech_Music_Male> <Advertisement> check out our daily <Speech_Music_Male> <Advertisement> briefing at the cyber <Speech_Music_Male> <Advertisement> wire, dot com, <Speech_Music_Male> <Advertisement> and for <Speech_Music_Male> <Advertisement> professionals and cybersecurity <Speech_Music_Male> <Advertisement> leaders who <Speech_Music_Male> <Advertisement> want to stay abreast of <Speech_Music_Male> <Advertisement> this rapidly evolving <Speech_Music_Male> <Advertisement> field sign <Speech_Music_Male> <Advertisement> up for cyber pro <Speech_Music_Male> <Advertisement> will save you <Speech_Music_Male> <Advertisement> time keep you informed <Speech_Music_Male> <Advertisement> and it'll pick <Speech_Music_Male> <Advertisement> you up when you're feeling <Speech_Music_Male> <Advertisement> down. <Speech_Music_Male> <Advertisement> Listen for us on your <Speech_Music_Male> <Advertisement> Alexa Smart Speaker <Speech_Music_Male> <Advertisement> to. <Speech_Music_Male> Don't forget to check out <Speech_Music_Male> <Advertisement> the grumpy old GEEKS <Speech_Music_Male> <Advertisement> podcast where I contribute <Speech_Music_Male> <Advertisement> to a regular segment <Speech_Music_Male> called security <Speech_Music_Male> ha I <Speech_Music_Male> joined Jason and Brian <Speech_Music_Male> <Advertisement> on their show for a lively <Speech_Music_Male> <Advertisement> discussion of the latest <Speech_Music_Male> <Advertisement> security news every <Speech_Music_Male> <Advertisement> week, you can <Speech_Music_Male> <Advertisement> find grumpy geeks <Speech_Music_Male> <Advertisement> where all the fine <Speech_Music_Male> <Advertisement> podcasts are listed <Speech_Music_Male> <Advertisement> and check <Speech_Music_Male> <Advertisement> out the recorded future <Speech_Music_Male> <Advertisement> podcast, which <Speech_Music_Male> <Advertisement> I also host <Speech_Music_Male> <Advertisement> subject. There <Speech_Music_Male> <Advertisement> is security intelligence. <Speech_Music_Male> <Advertisement> Every <Speech_Music_Male> <Advertisement> week we talked <Speech_Music_Male> <Advertisement> to interesting people about <Speech_Music_Male> <Advertisement> timely cybersecurity <Speech_Music_Male> <Advertisement> topics <Speech_Music_Male> <Advertisement> that sad recorded <Speech_Music_Male> <Advertisement> future. Dot <Speech_Music_Male> <Advertisement> Com slash <Speech_Music_Male> <Advertisement> podcast. <Speech_Music_Male> <Advertisement> The cyber wire <Speech_Music_Male> <Advertisement> podcast is proudly <Speech_Music_Male> <Advertisement> produced in Maryland <Speech_Music_Male> <Advertisement> the startup studios of <Speech_Music_Male> <Advertisement> data tribe with <Speech_Music_Male> <Advertisement> their co building the <Speech_Music_Male> <Advertisement> next generation of cybersecurity <Speech_Music_Male> <Advertisement> teams <Speech_Music_Male> <Advertisement> and technologies <Speech_Music_Male> <Advertisement> are amazing. <Speech_Music_Male> <Advertisement> Cyber wire team <Speech_Music_Male> <Advertisement> is Elliott peltzman <Speech_Music_Male> <Advertisement> route precaut- <Speech_Music_Male> <Advertisement> Stefan very <Speech_Music_Male> <Advertisement> healthy bond <Speech_Music_Male> <Advertisement> tim. No Dr <Speech_Music_Male> <Advertisement> Joe Kerrigan <Speech_Music_Male> <Advertisement> Herald -Tario <Speech_Music_Male> <Advertisement> Been Yellen Nick <Speech_Music_Male> <Advertisement> Veliky Tina Johnson <Speech_Music_Male> <Advertisement> and it Mo- <Speech_Music_Male> <Advertisement> Chris. Russell <Speech_Music_Male> <Advertisement> John Patrick Jennifer <Speech_Music_Male> <Advertisement> Ivan Rick <Speech_Music_Male> <Advertisement> Howard Peter Kilby <Speech_Music_Male> <Advertisement> and I'm Dave Pfiffner. <Speech_Music_Male> <Advertisement> Thanks for <Speech_Music_Male> <Advertisement> listening. <SpeakerChange> See <Speech_Music_Male> you back here. Tomorrow. <Music>

Coming up next