CyberWire Daily - Turbulence in the cloud.

Episode Date: June 27, 2025

Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Rese...archers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker’s bold marketing campaign ends with a guilty plea. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app. Selected Reading Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine) Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek) CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine) Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek) Prompt injection in malware sample targets AI code analysis tools (SC Media) Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record) Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries’ (The Record) NSA’s Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record) Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network powered by N2K. Risk and compliance shouldn't slow your business down. HyperProof helps you automate controls, integrate real-time risk workflows, and build a centralized system of trust so your teams can focus on growth, not spreadsheets. From faster audits to stronger stakeholder confidence, HyperProof gives you the business advantage of smarter compliance. Visit www.hyperproof.io to see how leading teams are transforming their GRC programs.
Starting point is 00:01:00 Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. Citrix bleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in OpenVSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Ramazes speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. And one Kansas City hacker's bold marketing campaign
Starting point is 00:01:44 ends with a guilty plea. It's Friday, June 27, 2025. I'm Dave Bittner and this is your CyberWire intel briefing. Happy Friday and thanks for joining us. It's great to have you with us. Hawaiian Airlines has reported a cybersecurity incident affecting some of its IT systems. The airline posted updates yesterday confirming that flights are operating safely and on schedule despite the disruption. The company stated it's working with experts and federal authorities while restoring systems in an orderly manner, implying some systems were taken offline.
Starting point is 00:02:43 No details have been released about the nature of the cyber event or whether customer data was impacted. The FAA said it is in contact with the airline and monitoring the situation. This incident follows a similar cyber attack on Canada's WestJet Airlines less than two weeks ago. Hawaiian Airlines was recently acquired by Alaska Airlines, with plans to integrate their systems under a single passenger service platform. Microsoft has shared progress on its Windows Resiliency Initiative, launched after last
Starting point is 00:03:17 year's major CrowdStrike incident that caused global Windows outages. In July 2024, a faulty CrowdStrike update crashed systems due to its use of kernel drivers for security functions. In response, Microsoft announced a redesign to reduce risks when endpoint security software interacts with the Windows kernel. The Windows Resiliency Initiative, or WRI, launched in November of last year and aims to boost Windows reliability and resilience. Microsoft is working with vendors like CrowdStrike, Bitdefender, SentinelOne, and Trend Micro to ensure safer update processes.
Starting point is 00:04:00 Starting next month, some partners will preview a new security platform allowing antivirus and endpoint protection tools to run in user mode instead of the kernel, enhancing stability and recovery. Microsoft has also released an e-book on digital resilience and introduced features like quicker PC recovery, hot patch security updates without reboots, and Windows 365 Reserve, offering temporary cloud PCs when primary devices fail. A critical vulnerability, dubbed Citrix Bleed 2, has been discovered in Citrix Netscaler ADC and Gateway devices and is reportedly being exploited in the wild.
Starting point is 00:04:43 This out-of-bounds read flaw allows attackers to extract session tokens, bypass multi-factor authentication and hijack user sessions. Similar to the 2023 Citrix bleed, this vulnerability targets session tokens rather than cookies. It affects multiple versions. Security firm ReliaQuest reports medium confidence of active exploitation based on session hijacking, MFA bypassing, LDAP reconnaissance, and activity from VPN-related IPs. Additionally, a separate memory overflow vulnerability is under active attack, potentially causing denial of service. Citrix urges immediate patching and session termination.
Starting point is 00:05:33 Researchers at Koi Security have disclosed a critical vulnerability in OpenVSX, the open source extension marketplace hosted by the Eclipse Foundation. The flaw exposed the publishing account's secret token to any extension or its dependencies. This token acts as a super admin credential, giving attackers the ability to publish malicious extensions or overwrite existing ones, potentially compromising over 8 million developers. OpenVSX is widely used by VS code-based editors like Cursor, Gitpod, and WindSurf as an alternative to Microsoft's marketplace. Koi Security warned that attackers could have installed keyloggers, information stealers, or backdoors, posing a solar winds-like supply chain risk for developer tooling.
Starting point is 00:06:25 The vulnerability was discovered in early May and has now been patched after thorough vetting. SecurityWeek reached out to the Eclipse Foundation for further comment, but so far has received none. Checkpoint researchers have discovered a malware sample containing a prompt injection designed to bypass AI code analysis tools. Uploaded to VirusTotal in early June, the sample included a string instructing large language models to act as a calculator and reply with no malware detected. Named Skynet by its author, the malware is half-complete and acts as a proof-of-concept rather than fully functional malware. It uses bytewise rotating XOR obfuscation with a hard-coded key, sandbox evasion techniques,
Starting point is 00:07:17 and decrypts an embedded Tor client to create a controllable proxy before deleting its installation directly to cover its tracks. OpenAI's O3 and GPT 4.1 models identified the prompt injection as a jailbreak attempt. Researchers warn this reflects the next evolution in malware, targeting AI-driven defenses with prompt injection and jailbreak methods to evade detection. with prompt injection and jailbreak methods to evade detection. Amnesty International has condemned what it calls Cambodia's grossly inadequate response to human trafficking in online scamming compounds. Its two-year study, released Thursday, documented 53 active scam centers where workers are forced
Starting point is 00:08:02 to assist in fraudulent operations, often under threat from guards armed with electric batons. Victims are lured with fake job offers, trapped in prison-like compounds, and made to run cryptocurrency scams, create fake websites, or set up bank accounts for money laundering. Some describe pig-butchering scams, where scammers build trust before defrauding victims. Despite police rescues, Amnesty says abuses continue, with authorities often freeing only those who contact them while ignoring others. Survivors also reported collusion between police and traffickers. The UN estimates Southeast Asia's scam centers generate $40 billion annually.
Starting point is 00:08:50 The Thai government has closed border crossings and halted fuel exports to Cambodia in response as organized criminal networks shift operations from Myanmar to Cambodia. Senators Rick Scott and Gary Peters have introduced the No Adversarial AI Act to ban federal agencies from using AI tools made in countries deemed foreign adversaries, including China, Russia, Iran, and North Korea. The bill would create and update a federal list every 180 days, prohibiting tools like China's DeepSeek, which reportedly aids China's military and shares user data with its government. Exceptions would exist for research, requiring written justification to Congress. The legislation aims to protect national security and personal data from potential exploitation
Starting point is 00:09:45 by adversarial AI systems. It follows reports that a USDA employee attempted to access DeepSeq but was blocked. Lawmakers compared the move to past bans on foreign software such as TikTok and Kaspersky, framing it as necessary to keep U.S. government technology secure against evolving threats. Patrick Ware, a 34-year NSA veteran, has been appointed executive director of U.S. Cyber Command, becoming its top civilian leader. He replaces Morgan Adamski, who is expected to move to the private sector after serving
Starting point is 00:10:24 in the role since June of 2024. The position traditionally filled by an NSA official is the number three role at Cyber Command, where it takes over during a period of leadership uncertainty, as Cyber Command has lacked a permanent chief since General Timothy Hogg was fired nearly three months ago. A planned appointment of Lieutenant General Richard Angle was reportedly rejected by the White House for undisclosed reasons. Ware will oversee strategic initiatives, talent management, and partnerships amid questions
Starting point is 00:10:58 about the future of the Cyber Command 2.0 overhaul. Ware holds electrical engineering degrees from the University of Maryland and Johns Hopkins University. We wish Mr. Ware the very best as he steps into this critical role, guiding U.S. Cyber Command through its next chapter of challenges and opportunities. Coming up after the break, Maria Vermazes speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. And one Kansas City hacker's bold marketing campaign ends with a guilty plea. Stick around.
Starting point is 00:11:55 Did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Sempris created PurpleKnight, the free security assessment tool that scans your Active Directory for hundreds of vulnerabilities and shows you how to fix them. Join thousands of IT pros using PurpleKnight to stay ahead of threats. Download it now at sempris.com slash purple-knight. That's sempris.com slash purple dash night. That's sempris.com slash purple dash night. And now a word from our sponsor, Spy Cloud. Identity is the new battleground, and attackers are exploiting stolen identities to infiltrate your organization.
Starting point is 00:12:44 Traditional defenses can't keep up. Spy Cloud's Holistic Identity Threat Protection helps security teams uncover and automatically remediate hidden exposures across your users from breaches, malware, and phishing to neutralize identity-based threats like account takeover, fraud, and ransomware. Don't let invisible threats compromise your business. Get your free corporate dark net exposure report at spycloud.com slash cyberwire and see what attackers already know. That's spycloud.com slash cyberwire.
Starting point is 00:13:34 Our guest today comes from T-Minus Space Daily's Deep Space program. Host Maria Vermazes speaks with Ian Itz, executive director at the IoT line of business at Iridium Communications. They're talking about how Iridium allows IoT devices like sensors and trackers to communicate directly with satellites, bypassing terrestrial infrastructure. So my name is Ian Itz. I'm the executive director for the IoT line of business here at Iridium. And kind of the way that I started my journey in space was through a very small universal bus building company. And so they were building universal buses for the Navy and for the Air Force.
Starting point is 00:14:08 And so I was looking for product management jobs coming out of college, and there just happened to be a space startup in the town that I was living in. And we're not too far outside of the DC region, and so there's obviously a lot of tech here, a lot of government work. And so that was kind of my entry.
Starting point is 00:14:23 And so I was working on course sun sensors and star trackers and things that satellites need to kind of keep their navigation and their orientation. I started to look at, you know, who are the big kind of satellite carriers in what we call this MSS space. And looked at GlobalStar and looked at, you know, Iridium and I actually ended up working a little bit for GlobalStar, worked for one of their largest distributors for a bit. But I always wanted to be at Iridium. That was always kind of the seal of excellence for me in terms of what I was into,
Starting point is 00:14:57 which was very small devices, mobile devices, IoT really. That's kind of where I kind of gravitated towards that. And Iridium kind of had all the pieces, right? They had a great constellation. They did small devices. They're very reliable in terms of the product. And so I'm always aspired to be part of the Iridium team. I said, this is a great opportunity for me.
Starting point is 00:15:18 And so that was kind of how I started here at Iridium. So kind of continued on and became a product manager. And then slowly learned the business here. Did some BD work for a couple of years, and now I'm fully running the entire IoT line of business here at Iridium, which is our fastest growing business. And for me, it's probably the most exciting business unit here, but I say that very, very biased. Thank you for sharing your journey with me.
Starting point is 00:15:41 I love hearing people's stories because they're all so different and I find them just really fascinating So thank you. So yeah, we are here to talk about the IOT line of business that iridium has So maybe we can just set the scene a bit first about What it kind of looks like, you know, what IOT and satellite connectivity together are enabling. Let's start there Absolutely. So, you know the way that I kind of look at IOT is a little bit of what I described earlier Which is you know small devices that are sending small chunks of data now that So, you know, the way that I kind of look at IoT is a little bit of what I described earlier, which is, you know, small devices that are sending small chunks of data. Now that obviously has, you know, a variety of different meanings for different folks. You know, IoT could be big chunks of data and, you know, lots of information passing
Starting point is 00:16:15 back and forth. But when we kind of marry the two, IoT and satellite, what we're really looking at is smaller pieces of data because that's the most efficient way to get that across on the network. And so from our perspective, IoT is typically small devices with small antennas. In a lot of cases, they can be carried by a human, so by an individual, or they're just getting environmental data from wherever they're at. So it could be tracking an asset, it could be a sensor in a farm measuring the amount of water in the soil. It could be buoys in the ocean that are measuring ocean currents, salinity, early warning, tsunami
Starting point is 00:16:56 detection. So, really, IoT is kind of all encompassing in terms of the way that we think about it. We're really applying the fundamentals of IoT to basically any application that's out there today on the terrestrial network, we complement it on the satellite side. So we're really kind of that backup link in a lot of cases. But in many cases, for IoT specifically, we are the primary comms. We are operating in locations where terrestrial coverage just simply isn't available.
Starting point is 00:17:23 And so our customers look to us to provide, again, kind of rugged, small devices that can be deployed anywhere on the globe. And that's kind of our forte, right? That's really where Iridium shines. And so that's kind of the way that we see IoT in general, but small devices, small aperture antennas, low energy. And then typically satellite and cellular are complementary to each other, right? We're bouncing back and forth from one network to another. But that's kind of my world in terms of IoT and satellite specifically.
Starting point is 00:17:58 That's so fascinating what this all enables and the places that IoT is being used. It just blows my mind. And I know we think maybe, or I think, about IoT as usually small devices sending small amounts of data, but that's changing, right? Where a lot of these devices are sending a lot more information now, lots more data being sent out. And I guess, how do you all support that? That must be an interesting advancement for you.
Starting point is 00:18:22 Yeah, so what we strive to do is obviously continue to support customers that have kind of those low data rates, and those will always be, you know, a pertinent customer for us. You know, as I mentioned, the ground soil sensors, you know, those things don't go away. They'll be used for quite some time, and they don't send that much data. But what we do obviously look at are some of these higher applications, as you mentioned. And so we look to develop kind of new technology kind of on a cycle basis primarily, right? So primarily we developed core modules that were built for load data transmissions as we talked about, but we've got some new devices that have just
Starting point is 00:19:00 come online that are now able to do more rich data sets. So they're able to send images, for example. They're able to send voice snippets. And so these things are very part and parcel to what we do from a reliability perspective. A lot of the devices that work on the Iridium network are there for safety of life type applications. And so the ability to send kind of voice snippets and these images from remote locations kind
Starting point is 00:19:27 of aids in those potential situations where somebody is injured, they're able to not only kind of send their location and maybe some text messaging about what's going on, but they're able to then send images about their environment. They're able to potentially talk if they're unable to use their hands. And so, yeah, I mean, we try to offer a variety of services on the network to cater to different IoT applications. So yeah, we tend to focus on new modules every couple of years and expand the capabilities
Starting point is 00:19:57 with each one as we develop. That's really neat. And I have to ask the inevitable question that I think I ask in every interview nowadays is about AI AI AI in cloud How this all plays in because I know there's a lot of talk about what we're able to do at the edge now What we're not able to do at the edge, but a lot of IOT always comes up in that conversation So often I'm talking to cloud and AI folks asking them about IOT now
Starting point is 00:20:18 I'm talking about cloud and edge. So tell me about what what advances you're seeing there and what that's enabling Yeah, so cloud for us is extremely important. We integrated You first said about cloud and edge. So tell me about what advances you're seeing there and what that's enabling. Yeah, so cloud for us is extremely important. We integrated kind of AWS as our first foray, I want to say five or six years ago now. You know, they were looking for to expand their satellite connectivity options for their customers. And so we developed a partnership where we're now kind of fully hooked in from an IoT perspective. We're able to send data back and forth on all of our IoT platform devices through the AWS cloud and not just AWS, right?
Starting point is 00:20:50 I mean, we operate now with kind of any cloud infrastructure that you bring to the table. So from that perspective, cloud is of utmost importance. We just want to give customers options and so we don't charge more for it. It's really just an additional data delivery mechanism. And then obviously there's all of the other features that are built into the cloud, either IoT Core or any of the other kind of security capabilities that are involved or any of the translation mechanisms that are in there. Our customers are more and more leveraging the cloud into their own internal applications.
Starting point is 00:21:20 It's really just by virtue of us offering that as a capability. We're not doing a whole lot of application building. We're kind of really just leveraging what's already there and then providing the data through our standard interconnects. The AI thing is really interesting to me specifically because a lot of our customers have been doing this for quite some time. As you probably know, sending data over a satellite link is going to be traditionally more expensive than when you send it over a cellular link. And so a lot of our customers, especially early on when IoT was called M2M, those customers were figuring out how to optimize their data before sending it over the satellite link, right?
Starting point is 00:21:56 And so the advent of edge computing, edge technology, and then add on top of that, machine learning and AI. And it gives these users kind of a lot more benefit in terms of being able to analyze their data, make decisions on the edge, and then really only pass the data that's critical or the most relevant to what they're doing. And so from that perspective,
Starting point is 00:22:21 our customers have been early adopters of edge computing, ML and AI for some time. And so now that it's really kind of, you know, in everybody's face, it's kind of everywhere you go. It's really just kind of now being adopted by the mainstream. But I'd say that IoT and IoT and satellite specifically, we're kind of leading the front on a lot of those early technologies because it was necessary for them for a cost operation kind of environment. I find that really fascinating what Iridium does because you all are really a backbone and that you do enable all these different people and organizations to figure out how
Starting point is 00:23:00 to use what you all provide and then it just makes a whole constellation, if I can use the space cliche, of just different capabilities. It's quite amazing to watch. And something that I've been increasingly trying to learn more about is also the phrase is non-terrestrial networks. And just, again, you guys are a huge player in that. I mean, enabling all that and, you know, what that looks like and what that's enabling as part of that the ecosystem that's building a non-terrestrial network, how are these different pieces all sort of fitting together to work towards what's coming in non-terrestrial networks?
Starting point is 00:23:35 Yeah, absolutely. I think the vision for the non-terrestrial network is to offer a service that, to the consumer, doesn't look any different than what they've used today, right? So, you're outside of terrestrial coverage, and whether it be your smartwatch or your phone or your vehicle or whatever it happens to be falls outside of terrestrial coverage, the transition to satellite and the use of satellite
Starting point is 00:23:58 should be pretty deprecated from view from the customer. If I can, for lack of a better term, they shouldn't know which network is providing the service underlying. deprecated from view from the customer, right? For lack of a better term, they shouldn't know which network is providing the service underlying. Seamless? Yeah. Seamless, right? They just want to be able to close the links and the data. And so from that perspective, I think that's where we're headed, right? What you'll end up seeing over time and how all these pieces fit together is really kind of that seamless experience from a data connectivity perspective. You've got devices that primarily live on cellular and that want to jump over to satellite, and now they're doing the opposite,
Starting point is 00:24:35 which is they're living potentially their entire lives on satellite and using cellular sometimes. And so, again, I think what we drive for is the ability to have customers, again, that see this kind of seamless experience and not necessarily know which satellite carrier they're operating on or that their device is actually on a satellite, right? So I think really what we're doing from an NTN perspective is moving towards a more standardized approach where any manufacturer of a chip or a module can now integrate Iridium into that same module without any additional cost, right? And so that's really the benefit,
Starting point is 00:25:11 and that's kind of where all these things fit together, is along the standardization of the satellite networks within existing terrestrial networks. And that's really what's going to make everything kind of, as you mentioned, seamless, Maria, and ensure that satellite is a connectivity piece that's integral to pretty much any IoT solution that's out there today. Very cool.
Starting point is 00:25:33 I want to make sure if there's anything that we didn't talk about that you wanted to mention that was a high priority for you guys to make sure you get out there, I want to give you the floor if there's anything that you wanted to mention. It's over to you for that. Yeah. I mean, the only thing I'd mention anything that you wanted to mention. It's it's over to you for Yeah, I mean the only thing I'd mention is that you know, we we cater to the developer, right? That's kind of as I talked about earlier Maria We couldn't be where we are today without kind of the expertise that our partners bring and so, you know One of the things that we try to do is be very developer friendly in terms of providing developer kits and the experience
Starting point is 00:26:02 For those that are wanting to try satellite. It can seem quite daunting if you've never been part of a satellite project, but I assure you that it's extremely easy. For our latest module, which is the 9704, you can go out and buy a kit. You can receive that kit within a couple of days, and you can be transmitting and talking to a satellite within a matter of minutes of opening up the kit. That's awesome. Ian, you've been a great guest. Thank you so much for explaining so many things to me that have been confused in my mind for quite some time.
Starting point is 00:26:33 So you've been awesome. Thank you. Thank you so much. Maria, thanks for having me. I certainly appreciate the opportunity and it's been a great conversation. We'll have a link in the show notes to Ian and Maria's full conversation on Deep Space. Be sure to check out T-Minus Space Daily brought to you by N2K Cyberwire each weekday on your favorite podcast app. Did you know Active Directory is targeted in 9 out of 10 cyber attacks? Once attackers get in, they can take control of your entire network. That's why Semperis created Purple Night, the free security assessment tool that scans your Active Directory for hundreds of vulnerabilities and shows you how to fix them.
Starting point is 00:27:25 Join thousands of IT pros using PurpleKnight to stay ahead of threats. Download it now at sempris.com slash purple-knight. That's sempris.com slash purple-knight. And finally, in a plot that was just so crazy it might work, Kansas City's Nicholas Michael Kloster, age 32, has pleaded guilty to hacking multiple organizations, all to advertise his own cybersecurity services. Prosecutors say Closter's methods were bold but far from sophisticated. At one gym, he strolled in, hacked their computer to access security cameras, erased his photo
Starting point is 00:28:16 from their system, and reduced his membership fee to a bargain bin $1. Then, like any enterprising entrepreneur, he emailed the owners the next day, offering his professional services. His business development tour continued at a nonprofit where he used a boot disk to reset passwords and install VPN software for future access, presumably in preparation for his follow-up sales email.
Starting point is 00:28:45 Kloster's resume also includes using his employer's credit card to buy a hacking thumb drive, which led to his termination. He now faces up to five years in prison and a hefty fine. Talk about your failed penetration test. And that's the CyberWire. For links to all of today's stories, check out our daily briefing at the cyberwire dot com. For links to all of today's stories, check out our daily briefing at the cyberwire.com. Be sure to check out Research Saturday and my conversation with Kyle Lefton, security
Starting point is 00:29:29 researcher from Akamai. We're discussing their research, Two Botnets, One Flaw. Mirai spreads through Waza vulnerability. That's Research Saturday. Check it out. We'd love to hear from you. We're conducting our annual audience survey to learn more about our listeners. We're collecting your insights through August 31st of this year.
Starting point is 00:29:50 There's a link in the show notes. Please do check it out. N2K's senior producer is Alice Carruth. Our producer is Liz Stokes. We're mixed by Elliot Peltsman and Trey Hester with original music by Elliot Peltsman. Our executive producer is Jennifer Iben. Peter Kilpey is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here next week. Hey everybody, Dave here.
Starting point is 00:30:32 I've talked about DeleteMe before, and I'm still using it because it still works. It's been a few months now and I'm just as impressed today as I was when I signed up. DeleteMe keeps finding and removing my personal information from data broker sites, and they keep me updated with detailed reports so I know exactly what's been taken down. I'm genuinely relieved knowing my privacy isn't something I have to worry about every day. The DeleteMe team handles everything.
Starting point is 00:31:01 It's the set it and forget it piece of mind. And it's not just for individuals. DeleteMe also offers solutions for businesses, helping companies protect their employees' personal information and reduce exposure to social engineering and phishing threats. And right now, our listeners get a special deal, 20% off your DeleteMe plan. Just go to JoinDeleteMe.com slash N2K and use promo code N2K at checkout. That's JoinDeleteMe.com slash N2K, code N2K.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.