CyberWire Daily - Houken blends stealth and chaos.

Episode Date: July 2, 2025

French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&T combats SIM swapping and account takeover attacks. A Missouri physician... group suffers a cyber attack. Qantas doesn’t crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The Feds sanction a Russian bulletproof hosting service. Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst shares the latest technology workforce trends. The ICEBlock app warms up to users. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, sharing the latest workforce technology trends. Will recently appeared on our CISO Perspectives podcast with host Kim Jones in the “What’s the “correct” path for entering cyber?” episode. If you are not already an N2K Pro member, you can learn more about that here.  Got cybersecurity, IT, or project management certification goals? For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify. Selected Reading French cybersecurity agency confirms government affected by Ivanti hacks (The Record) Ransomware gang attacks German charity that feeds starving children (The Record) AT&T deploys new account lock feature to counter SIM swapping (CyberScoop) Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients (Beyond Machines) Australia's Qantas says 6 million customer accounts accessed in cyber hack (Reuters) Security Advisories on Agorum Core Open (usd) Virginia student loan administrator Southwood Financial hit by ransomware attack (Beyond Machines) Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work (The Record) Johnson Controls starts notifying people affected by 2023 breach (Bleeping Computers) ICEBlock, an app for anonymously reporting ICE sightings, goes viral overnight after Bondi criticism (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network powered by N2K. Risk and compliance shouldn't slow your business down. HyperProof helps you automate controls, integrate real-time risk workflows, and build a centralized system of trust so your teams can focus on growth, not spreadsheets. From faster audits to stronger stakeholder confidence, HyperProof gives you the business advantage of smarter compliance. Visit www.hyperproof.io to see how leading teams are transforming their GRC programs.
Starting point is 00:01:01 French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn't crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agoram Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The feds sanction a Russian bulletproof hosting service. Johnson Controls A student loan administrator in Virginia gets hit by the Akira Ransomware Group. The Fed sanction a Russian bulletproof hosting service.
Starting point is 00:01:28 Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Marco, CEO of 4.1 Insights and N2K Cyberwire's senior workforce analyst, shares the latest technology workforce trends, and the IceBlock app warms up to users. It's Wednesday, July 2nd, 2025. I'm Dave Fittner, and this is your CyberWire Intel Briefing. Thanks for joining us. It's great to have you with us. France's cybersecurity agency ANSI reported that multiple government, telecom, media, finance, and transport
Starting point is 00:02:26 entities were targeted last year by a hacking campaign exploiting zero-day vulnerabilities in Avanti cloud service appliances. The intrusion set, dubbed HALCN, is linked to the same threat actor Mandiant Tracks as UNC 5174. ANSI suspects HALCN is run by private operators selling access and data to state-linked bodies, resembling Chinese contractor hacking groups such as APT-41. The campaign showed both espionage and profit motives, including crypto miner deployments and mass email theft from a South American ministry. Attackers used advanced zero-day exploits alongside noisy, public Chinese tools, suggesting a multi-party approach.
Starting point is 00:03:14 ANSI warns Hauchen and UNC 5174 remain active, targeting internet-facing systems globally for opportunistic exploitation. targeting internet-facing systems globally for opportunistic exploitation. German charity Deutsche Welthungerhilfe, WHH, which provides food and emergency aid globally, has been attacked by a ransomware-as-a-service group. The hackers listed WHH on their darknet leak site, demanding 20 bitcoin, about $2.1 million, for stolen data. It's unclear if the charity's systems were encrypted, but WHH confirmed it will not pay the ransom. The charity immediately shut down affected systems, engaged cybersecurity experts, informed
Starting point is 00:04:01 data protection authorities, and involved police. Despite the attack, WHH continues its humanitarian work in Gaza, Ukraine, Sudan, and beyond. The same ransomware group as previously targeted hospitals and nonprofits, including Easter Seals, WHH emphasized that their mission remains unchanged, stating their aid is more important than ever amid ongoing global crises. AT&T widely launched its Wireless Account Lock feature Tuesday to combat SIM swapping and account takeover attacks. Available for individual, business, and prepaid customers, the lock prevents changes to billing info, number transfers, SIM swaps, and device upgrades
Starting point is 00:04:50 without verification via the app or customer support. Only primary and secondary account holders can manage settings. This follows similar security moves by T-Mobile and Verizon. The launch comes amid heightened concerns after breaches like salt typhoon, with experts urging stronger multi-factor protections. Essie Health, a physician group in Greater St. Louis, suffered a cyberattack exposing
Starting point is 00:05:18 data of over 263,000 patients. Discovered on April 21, the breach affected electronic medical records and disabled phone systems, forcing staff to use manual processes. Stolen data includes names, Social Security numbers, medical records, and insurance details. The attack's method was not disclosed. There's no evidence of misuse so far, but Essie Health is offering 12 months of free identity protection while law enforcement investigates. Qantas has reported Australia's largest data breach in years after a hacker accessed a
Starting point is 00:05:56 third-party call center platform containing data on six million customers. Exposed information includes names, emails, phone numbers, birth dates, and frequent flyer numbers. The airline detected unusual activity and acted quickly to contain the breach, with no impact on operations or flight safety. While cybercrime group Scattered Spider has targeted other airlines recently, Qantas has not attributed the breach. The incident adds to Qantas' reputational challenges following COVID-era controversies, illegal worker dismissals, and ticketing scandals. CEO Vanessa Hudson apologized, emphasizing data security is taken seriously. The airline notified national cybersecurity and privacy agencies and said no passwords or login credentials were compromised,
Starting point is 00:06:47 though a significant data exposure is expected. Security researchers at USD Hero Lab discovered multiple critical vulnerabilities in Agoram Core Open that allow unauthenticated attackers to fully compromise systems. Chained together, these flaws enable remote code execution with root privileges, open that allow unauthenticated attackers to fully compromise systems. Chained together, these flaws enable remote code execution with root privileges. Issues include command injection, path traversal, plain text password storage, XML external entity attacks, SSRF, cross-site scripting, and incorrect authorization. The findings were responsibly disclosed to Agoram.
Starting point is 00:07:26 These vulnerabilities pose a severe risk, enabling full system takeover without authentication if left unpatched. Southwood Financial, a private student loan administrator in Virginia, suffered a ransomware attack attributed to the Akira Ransomware Group. The incident began on March 25th when suspicious activity disrupted its computer network. An investigation revealed that personal data belonging to borrowers and potential employees was compromised. Exposed information includes names, social security numbers, birth dates, addresses, phone numbers, emails, and other account details. The number of affected individuals has not been disclosed.
Starting point is 00:08:09 Southwood began notifying impacted people on June 27 and filed a data breach report with Vermont's Attorney General on June 30. The company is offering credit monitoring services and set up a helpline for questions and assistance related to potential identity theft or fraud. The U.S. Treasury Department sanctioned Russia-based AZA Group, accusing it of providing bulletproof hosting services to ransomware gangs and darknet drug markets. AZA Group allegedly helped criminals evade law enforcement by renting IP addresses, servers,
Starting point is 00:08:46 and domains used for malware, fraud, and cyber attacks targeting U.S. defense and tech firms. CEO Arseny Penzev and three other leaders were sanctioned. Penzev and General Director Yuri Bozoyan were arrested in Russia for drug trafficking ties to the Black Sprut marketplace. EISA has also been linked to pro-Kremlin disinformation campaigns like Doppelganger. Subsidiaries, EISA International, EISA Logistic, and Cloud Solutions were included in the sanctions, part of a broader crackdown on criminal infrastructure used by cyber gangs. The action was coordinated with the UK and international partners.
Starting point is 00:09:30 Johnson Controls is notifying individuals affected by a major ransomware attack that disrupted its global operations from February to September 2023. The multinational building automation and HVAC giant, employing over 100,000 people across 150 countries, confirmed attackers accessed its systems, stealing data and encrypting devices. The Dark Angels ransomware group is suspected, demanding a $51 million ransom to decrypt systems and delete 27 terabytes of stolen corporate data. The attack forced Johnson Controls to shut down parts of its IT infrastructure, affecting
Starting point is 00:10:12 customer services worldwide. Costs for incident response and remediation had reached $27 million by early 2024 and are expected to rise. Dark Angels uses double extortion tactics, threatening to leak stolen data online to pressure victims into paying ransom. 2023, I guess you can't rush these things. ["Dark Angels Theme"] Coming up after the break, Will Marco, CEO of 4.1 Insights and N2K CyberWire's Senior Workforce Analyst, shares the latest technology workforce trends, and the IceBlock app warms
Starting point is 00:10:57 up to users. Stay with us. Did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Semperis created Purplenight, the free security assessment tool that scans your Active Directory for hundreds of vulnerabilities and shows you how to fix them. Join thousands of IT pros using PurpleKnight to stay ahead of threats. Download it now at sempris.com slash purple-knight. That's sempris.com slash purple dash night.
Starting point is 00:11:51 And now a word from our sponsor, Spy Cloud. Identity is the new battleground, and attackers are exploiting stolen identities to infiltrate your organization. Traditional defenses can't keep up. Spy Cloud's holistic identity threat protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware, and phishing to neutralize identity-based threats like account takeover, fraud, and ransomware. Don't let invisible threats compromise your business.
Starting point is 00:12:22 Get your free corporate dark net exposure report at spycloud.com slash cyberwire and see what attackers already know. That's spycloud.com slash cyberwire. Will Marco is CEO of 4.1 Insights and also an N2K CyberWire senior workforce analyst. I recently caught up with him for the latest on technology workforce trends. I've, you know, really, I say taken a back door into the cybersecurity world as well as the IT world more generally. I've been analyzing both the cybersecurity as well as the IT workforce now for over 12 years.
Starting point is 00:13:11 And I really just kind of stumbled into that because I've always loved economic analysis. I mean, who doesn't love analyzing data on a Friday night? Not sure what anybody else does for fun. But I've always enjoyed wrapping my head around problems that really reside at the intersection of quantitative analysis and public policy. And the workforce is, it really fits the bill. And so I've now been analyzing the cybersecurity workforce in particular for well over a decade, and I've released a number of reports looking at the cyber workforce, but really my work in the space has culminated in the development of CyberSeat.org.
Starting point is 00:13:47 I was one of the original founders of that website and have been producing data on the cybersecurity workforce now for a good chunk of my career. And so it's really become a passion project for me, as well as something that hopefully adds a little bit of value to the community. Well, let's talk about some of the workforce challenges that you see the cybersecurity industry facing today. What is top of mind for you? I think that lately the cybersecurity workforce has really just been facing whiplash.
Starting point is 00:14:20 We were coming off of the pandemic lows and then the pandemic highs where everybody was stocking up as many cybersecurity workers as well as IT workers as possible because everybody assumed that we were going to be moving online and everything was going to be going digitally for the foreseeable future. And so I think that a lot of people really got it stuck in their heads that, oh, this is going to be the way of the future. These jobs aren't going to go anywhere. And what we found is that in many cases, well, those jobs didn't really go anywhere, but the demand definitely shifted over the past couple of years. Once interest rates started rising, once there was more geopolitical uncertainty across the globe, which led to economic uncertainty and all of these other
Starting point is 00:15:05 factors have led to a bit of a pullback in hiring for cyber workers as well as IT workers more generally. And I think that a lot of people are now having to recalibrate what their expectations were for jobs both in cyber as well as in the IT industry more generally. Now, the common narrative is that, well, a lot of this disruption is driven by AI. And we might talk about that a little bit later. I'm not quite sold on that idea just yet. But we're also now starting to see
Starting point is 00:15:33 that although there was a pullback in demand for cyber jobs over the past few years, we're starting to see an uptick again. And the latest CyberSeq data, which were just released a few weeks ago, really confirm that. As we saw a growth of about 50,000 job openings calling for cybersecurity workers. And so I think the pendulum is starting to swing back the other way again. And this is leading to that whiplash, where I think a lot of people just don't know what's going on in such a frothy market.
Starting point is 00:16:01 Where do you fall on the notion of there being a cybersecurity talent shortage? So this is always a bit of a contentious issue, depending upon who you ask. I think that where I fall is probably somewhere in the middle compared to what other people might say. Some folks swear that there's a talent shortage. Some people say, oh, it's completely manufactured. There is no shortage. We have all of these people out there who are getting cybersecurity degrees and saying, hey, we can't find cybersecurity jobs. And I think the way that I come at this issue is that I try to take a very data-informed perspective. And what we found when
Starting point is 00:16:40 we look at the data is that there is clear evidence of a talent shortage. The latest numbers from CyberSeek suggests that we only have about 74 skilled cybersecurity workers for every 100 that employers demand. However, that does mask the reality that a lot of people in the field are facing. And that reality is that if your resume isn't stuffed full of degrees that are fancy, certifications that are fancy, many years of experience in the field, then you're actually probably going to have a pretty hard time finding a job, especially if you're an entry-level worker. When we unpack the data a little bit more, we find that we actually have a surplus of
Starting point is 00:17:23 workers at the entry level. Last time I checked, it was about a 10% surplus, which meant we had about 110 entry-level workers for every 100 that employers were demanding. And so I think this is why you're starting to hear these conflicting reports from employers as well as individuals where employers are saying, hey, we't find the cyber security workers we need and individuals are saying hey We're having a hard time finding a job even though we did everything we were supposed to to enter into the field reality is a lot of employers are looking for somebody who has heightened years of experience or fancy credentials and
Starting point is 00:17:59 If you just finished a cyber program or a boot camp It's gonna be really tough for you to get your foot in the door for the limited number of entry-level jobs that there are. And so I think that while, yes, we do see evidence of a talent gap broadly, we also find that there's an expectations gap between what employers are requesting and what's actually available in the candidate pool. And that leads to a lot of the challenges that we hear
Starting point is 00:18:26 and the discordant messages from people across the cyber ecosystem. And where do we stand when it comes to the employers in terms of them being willing and able to upskill the people who are already working for them? It's a great question. And I think that a lot of employers are coming around to the realization that you really do have to invest
Starting point is 00:18:49 in your people because you're not gonna be able to go out and find that mythical purple unicorn candidate who has a CISSP and maybe a few other fancy credentials, has 10 plus years of previous experience in the technical cyber role, and has the 25 different skills that you're looking for, credentials, has 10 plus years of previous experience in the technical cyber role, and has the 25 different skills that you're looking for, some of which have not even been available on the market for very long.
Starting point is 00:19:13 And no training programs are really focusing on them. And so I think that the more forward thinking employers are starting to come around to the idea that you really do have to invest in your people. But not all of the employers have really come around to that way of thinking just yet. But we do find that the companies who do, they see significant ROI on their training investments. When we find that employers are training for certain skills that are hard to find, on average, they can save $10,000 or more for their hiring costs per role that they're hiring for. And we see similar things when we
Starting point is 00:19:52 look at employers who are willing to take out a degree requirement. We see similar things when employers are willing to take out certain certification requirements that might be nice to have, but not need to have. And so it's not only good for employers to invest in upskilling and re-skilling their people because they just have a limited candidate pool of folks who have those purple unicorn skills, but it's also good for their bottom line as a result. Looking at the education and training programs themselves, how successful are they at preparing candidates for the challenges they're going to find in the real world? I think that a lot of the training programs out there
Starting point is 00:20:35 are doing an admirable job of preparing their students for the real world, but it is always difficult when you're trying to translate what you're learning in the classroom to on the job experience. And so I think some of the more innovative programs have started to try and incorporate more hands-on learning into their curriculum. Some are now even partnering with local municipality-focused SOCs or security operations centers where students may get firsthand experience working
Starting point is 00:21:08 in a SOC that is providing real cybersecurity services to local municipalities or small businesses that otherwise wouldn't be able to find a cost-effective cybersecurity service option available. And so I think that there are some innovative approaches that training providers are trying to take, and most are really trying admirably to connect with employers in the cybersecurity ecosystem
Starting point is 00:21:34 to learn more about the in-demand skills, the in-demand credentials, and the knowledge, skills, and abilities that are needed to enter into the field. and the knowledge, skills, and abilities that are needed to enter into the field. Like a lot of sectors, I think the cybersecurity workforce has struggled with diversity. We're talking about gender, race, or even neurodiversity. What sort of things are working when it comes to that and what isn't? It's a great question. And I'll preface this by saying that when we look
Starting point is 00:22:06 at the data, we actually see a mixed picture in terms of the trajectory of the cybersecurity industry as it relates to diversity. On the one hand, we have seen that over the past 10 or so years, the industry has made some significant strides in terms of trying to bring in people with more ethnic diversity. It's still not quite the same level we see in IT more broadly, but it has grown fairly
Starting point is 00:22:31 dramatically in terms of representation, but it's actually gone in the opposite direction when it comes to gender diversity. And so you see a bit of a mixed picture when you look at the data. And I think that one of the things that has been most effective for organizations who are trying to build a more diverse workforce is they're expanding the aperture of their talent pipeline and they're recruiting from non-traditional sources of talent relative to where they've looked in the past. So for example, that doesn't necessarily mean you put out a big sign that says, hey, we're looking for more diverse candidates, but it might mean that you're saying, well, hey,
Starting point is 00:23:07 we're willing to hire somebody who doesn't have a bachelor's degree, or we're willing to hire somebody who doesn't have five to 10 years of prior work experience. And I usually liken this to hiring for missionaries versus mercenaries. I think that the default for many organizations for a long time has been you go after that mercenary who has many years of prior work experience, has a pristine resume, has all of these fancy skills and certifications and credentials, but guess what? There's a limited pool of those people.
Starting point is 00:23:37 And if you want to hire them, so do 20 of your biggest competitors. And you're just going to be poaching from one another and driving up salaries as you try to hire folks from this limited pool of talent. But by contrast, when we see that employers are willing to hire people who don't come in the door with a pristine resume, that they are usually rewarded with longer tenure rates, lower turnover rates, higher employee engagement, and a more diverse workforce,
Starting point is 00:24:06 often without even having explicit diversity goals. And so I really think that many employers should think about how to expand the aperture of the candidate pool and their talent pipeline so that they can start to hire more of these missionaries and save some money by not hiring quite so many mercenaries. more of these missionaries and save some money by not hiring quite so many mercenaries. Hmm.
Starting point is 00:24:25 Well, let's talk about AI. What's your outlook here? How do you suppose AI and automation might reshape the cybersecurity workforce? I think that AI is one of those hot button topics where everybody has an opinion and everybody has, I think, a vested interest in trying to tell you that their opinion is going to be correct, often because there is a vested agenda that they have lurking behind the scenes. But the reality is, hey, it's a big new technology that is impacting many facets of the economy.
Starting point is 00:25:01 And it's one of the fastest growing fields that we've ever tracked. And it's certainly the fastest growing in the IT space right now. But what I like to say is that it's really too early to make definitive statements. We're in the first inning, and we're really not sure yet exactly what direction this technology is going to go. That said, we still can at least get a hazy gaze
Starting point is 00:25:26 into our crystal ball if we try to look. And what we're starting to see is that AI is certainly becoming more integrated into the day-to-day workflows for a lot of cybersecurity teams are using it to help automate certain processes and workflows, especially as it relates to things like threat intelligence and just being able
Starting point is 00:25:45 to search through all the reams and reams of data that are coming in constantly in their networks. But it's also helping people to write more effectively. In some cases, it's also helping people to write code more quickly. But there's always some danger in any new technology that it gets misused. And we're also starting to see that AI has some unintended consequences for many individuals and many teams. And one of the biggest consequences
Starting point is 00:26:15 is that new research is coming out showing the more you use AI, the worse your critical thinking gets. You're offloading a lot of your thinking over to this new tool. And like any muscle, if you don't use it, you lose it. And that has some problematic implications, especially for our cybersecurity teams, where hey, you have to be a good critical thinker. You have to have a healthy dose of skepticism when looking at the information that's being presented to you. And so I think that this is going to be one of the big challenges that both the cybersecurity
Starting point is 00:26:45 workforces as well as the workforce more broadly is going to have to grapple with as it relates to AI is, yes, it's a powerful tool, but we also need to ensure that we're not handing over all of the reins to AI just yet and still retaining some critical thought for ourselves as well. What sort of advice would you have for someone who's looking to break into cybersecurity these days? I would say that you really have to be able to both learn the technical side of cybersecurity but also the human side.
Starting point is 00:27:18 One of the things that we're seeing in the data is that yes, cybersecurity workers, they have to know technical skills and yes, you should always be focusing on embedding the latest and greatest skill sets into your arsenal. But we're also seeing is that cybersecurity jobs are more likely to be requesting many human skills, like critical thinking, like communication, like all of these legacy, quote unquote, foundational skills that have been important for a long time, and they're going to continue to be important and perhaps even more so in The age of AI because as AI is able to take over some of the rote technical tasks that people were performing in the past it puts a premium on the skills that are more uniquely human and I think that what we're consistently hearing from employers is that,
Starting point is 00:28:06 hey, it's great to have somebody who has technical skills, but we need somebody who can liaise with multiple teams, who can communicate technical concepts to a non-technical audience, and can just show the human empathy needed to be able to collaborate effectively with people across the organization. And so, well, I think it's always going to be important to focus on building the latest and greatest skills that are in demand. I think it's always going to be valuable to obtain new certifications that employers value. Let's not forget about the human skills that have enduring value. Never underestimate the importance of that public speaking class, right?
Starting point is 00:28:47 Exactly, exactly. I probably use that more than just about any other class I took. That's right, that's right. That's Will Marcos, CEO of 4.1 Insights and an N2K CyberWire senior workforce analyst. If you'd like to hear more from Will, he was a guest on our CSO Perspectives podcast right here on the N2K CyberWire network. Did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Sempris created PurpleKnight, the free security assessment tool that scans
Starting point is 00:29:33 your Active Directory for hundreds of vulnerabilities and shows you how to fix them. Join thousands of IT pros using PurpleKnight to stay ahead of threats. Download it now at sempris.com slash purple-night. That's sempris.com slash purple-night. Get to Toronto's main venues like Budweiser Stage and the new Rogers Stadium with Go Transit. Thanks to Go Transit's special online e-ticket fairs, a $10 one-day weekend pass offers unlimited travel on any weekend day or holiday, anywhere along the Go network. And the weekday group passes offer the same weekday travel flexibility
Starting point is 00:30:16 across the network, starting at $30 for two people and up to $60 for a group of five. Buy your online Go pass ahead of the show at Gotransit.com slash tickets. And finally, IceBlock, an iPhone app for anonymously spotting ICE agents, has soared to the top of Apple's U.S. app store, thanks in part to U.S. Attorney General Pam Bondi's criticism, which apparently doubled as free marketing. About 20,000 users in Los Angeles alone now receive alerts whenever ICE is sighted within a five-mile radius, making it something of a Pokemon Go for immigration enforcement. TechCrunch verified the app doesn't collect user data after Bondi's late Monday remarks downloads exploded overnight, proving once again that if you want something to disappear
Starting point is 00:31:11 from public interest, the worst thing you can do is talk about it on national TV. And that's the CyberWire. For links to all of today's stories, check out our daily briefing at the cyberwire.com. We'd love to hear from you. We're conducting our annual audience survey to learn more about our listeners. We're collecting your insights through the end of this summer. There's a link in the show notes. Please do check it out. N2K's senior producer is Alice Carruth.
Starting point is 00:31:54 Our producer is Liz Stokes. We're mixed by Elliot Peltzman and Trey Hester with original music by Elliot Peltzman. Our executive producer is Jennifer Iben. Peter Kilpey is our publisher. And I'm Dave Bittner. Thanks for listening. We'll see you back here tomorrow. Hey everybody, Dave here. I've talked about DeleteMe before, and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up.
Starting point is 00:32:50 DeleteMe keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved knowing my privacy isn't something I have to worry about every day. The Delete Me team handles everything. It's the set it and forget it piece of mind. And it's not just for individuals. Delete Me also offers solutions for businesses, helping companies protect their employees'
Starting point is 00:33:19 personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special deal, 20% off your DeleteMe plan. Just go to JoinDeleteMe.com slash N2K and use promo code N2K at checkout. That's JoinDeleteMe.com slash N2K, code n2k.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.