[00:00] Lauren Mitchell: From Neural Newscast, this is Prime Cyber Insights,
[00:03] Lauren Mitchell: Intelligence for Defenders, Leaders, and Decision Makers.
[00:06] Aaron Cole: I'm Aaron Cole, and this is Prime Cyber Insights.
[00:09] Aaron Cole: We're tracking a massive financial fallout from the data broker industry
[00:13] Aaron Cole: and a critical vulnerability alert for enterprise security.
[00:17] Aaron Cole: Joining me is Lauren Mitchell.
[00:19] Lauren Mitchell: I'm Lauren Mitchell.
[00:20] Lauren Mitchell: We're also welcoming Chad Thompson, a director-level AI and security leader with a systems-level
[00:26] Lauren Mitchell: perspective on automation, enterprise risk, and operational resilience.
[00:30] Lauren Mitchell: Chad, it's great to have you here.
[00:31] Announcer: Lauren, let's start with today's bombshell report from the Joint Economic Committee.
[00:36] Announcer: Congressional Democrats are identifying over $20.9 billion in consumer losses tied to identity
[00:43] Announcer: theft from just four major data broker breaches, including Equifax and national public data.
[00:49] Lauren Mitchell: The details are concerning, Erin.
[00:51] Lauren Mitchell: I mean, Senator Maggie Hassan's inquiry found that companies like Comscore and Telesign
[00:58] Lauren Mitchell: were using no-index code to hide opt-out pages from search engines.
[01:05] Lauren Mitchell: It's a classic dark pattern that makes it nearly impossible for consumers to pull their
[01:10] Lauren Mitchell: sensitive data before scammers get to it.
[01:13] Aaron Cole: It's a systemic failure.
[01:15] Aaron Cole: When these brokers prioritize data accumulation over transparency, they create massive honeypots.
[01:22] Aaron Cole: The report shows that 30% of victims in these major breaches end up facing identity theft,
[01:27] Aaron Cole: which represents a massive enterprise risk for the financial sector.
[01:31] Aaron Cole: Speaking of massive exposures, we've seen a third-party breach hit the French e-commerce
[01:36] Aaron Cole: giant Mono Mono.
[01:38] Aaron Cole: 38 million customers have had their names, emails, and phone numbers exfiltrated because
[01:43] Aaron Cole: of a compromised Zendesk account in Tunis.
[01:46] Aaron Cole: Chad, this feels like another supply chain nightmare.
[01:49] Aaron Cole: Exactly.
[01:50] Aaron Cole: The threat actor Indra didn't even have to breach Mono Mono directly.
[01:55] Aaron Cole: By targeting a subcontractor's support console, they gained access to a decade's worth
[02:00] Aaron Cole: of communication.
[02:01] Aaron Cole: It shows why operational resilience must extend to every third-party vendor in your stack.
[02:08] Lauren Mitchell: We're also seeing Trend Micro issue a critical warning for its Apex One platform.
[02:13] Lauren Mitchell: Two path traversal flaws, CVE 2025-71210 and 71211, both have a 9.8 severity score.
[02:23] Lauren Mitchell: Erin, you know this isn't something IT teams can sit on.
[02:27] Lauren Mitchell: It allows for a full system takeover.
[02:29] Announcer: It's urgent.
[02:30] Announcer: Trend Micro has already released patch build 14136 for on-prem users.
[02:36] Announcer: If you have an exposed management console IP, you are in the crosshairs.
[02:42] Announcer: On a more optimistic note, NASA just reported a successful fueling test for Artemis II,
[02:48] Announcer: clearing a major hurdle after those hydrogen leaks earlier this month.
[02:51] Lauren Mitchell: For sure, the SEALs held at 1.6% hydrogen, well below the safety limit.
[02:58] Lauren Mitchell: We're now looking at a March 6 launch window to send four astronauts around the Moon.
[03:03] Lauren Mitchell: It's a massive win for systems engineering after the delays we saw in early February.
[03:08] Aaron Cole: The Artemis success proves that rigorous testing and iterative fixes work,
[03:13] Aaron Cole: whether it's rocket SEALs or data broker opt-out tools.
[03:17] Aaron Cole: Transparency and precision are what ultimately protect the mission and the agent.
[03:25] Chad Thompson: A vital reminder as we wrap up.
[03:27] Chad Thompson: I'm Aaron Cole.
[03:28] Chad Thompson: Thanks for joining us for this deep dive into the risks and recoveries defining the digital landscape.
[03:33] Lauren Mitchell: And I'm Lauren Mitchell.
[03:35] Lauren Mitchell: We'll see you next time on Prime Cyber Insights.
[03:39] Lauren Mitchell: For the latest updates, visit pci.neuralnewscast.com.
[03:44] Lauren Mitchell: Stay secure.
[03:46] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed.
[03:50] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com.
[03:55] Lauren Mitchell: This has been Prime Cyber Insights on Neural Newscast.
[03:58] Lauren Mitchell: Intelligence for defenders, leaders, and decision makers.
[04:02] Lauren Mitchell: Neural Newscast uses artificial intelligence in content creation
[04:06] Lauren Mitchell: with human editorial review prior to publication.
[04:09] Lauren Mitchell: While we strive for factual, unbiased reporting, AI-assisted content may occasionally contain
[04:14] Lauren Mitchell: errors. Verify critical information with trusted sources. Learn more at neuralnewscast.com.
✓ Full transcript loaded from separate file: transcript.txt