{"id":51444,"date":"2024-06-06T10:00:32","date_gmt":"2024-06-06T14:00:32","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=51444"},"modified":"2024-06-10T06:34:51","modified_gmt":"2024-06-10T10:34:51","slug":"transatlantic-cable-podcast-350","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-350\/51444\/","title":{"rendered":"Transatlantic Cable podcast, episode 350"},"content":{"rendered":"<p>Episode 350 of the Kaspersky Transatlantic Cable podcast kicks off with surprising news that whilst Generative AI tools such as ChatGPT and MidJourney are marketed aggressively, they\u2019re not actually that popular with everyday folk \u2013 with just 2% of people in the UK saying they use Gen AI in their day.<\/p>\n<p>From there talk moves to news regarding two large data breaches, both of which were hit by the same group \u201cShinyHunters\u201d.\u00a0 To wrap up, the team discuss a story around Microsoft\u2019s India X account, which was recently hacked in order to spread crypto scams.<\/p>\n<p>If you liked what you heard, please consider subscribing.<\/p>\n<ul>\n<li><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c511x4g7x7jo\">AI products like ChatGPT much hyped but not much used<\/a><\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/mashable.com\/article\/ticketmaster-data-breach-shinyhunters-hack\">Ticketmaster hacked. Breach affects more than half a billion users<\/a><\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bbc.co.uk\/news\/articles\/c6ppv06e3n8o\">Santander staff and \u201930 million\u2019 customers hacked<\/a><\/li>\n<li><a target=\"_blank\" rel=\"nofollow noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-indias-x-account-hijacked-in-roaring-kitty-crypto-scam-to-push-wallet-drainers\/\">Microsoft India\u2019s X account hijacked in Roaring Kitty crypto scam<\/a><\/li>\n<\/ul>\n<p><iframe src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/31627797\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"https:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"ksc-trial-generic\">\n","protected":false},"excerpt":{"rendered":"<p>Episode 350 of the Kaspersky podcast has crypto scams, (big) data breaches, Roaring Kitty and more!<\/p>\n","protected":false},"author":437,"featured_media":47879,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[485],"class_list":{"0":"post-51444","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-podcast"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-350\/51444\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=51444"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51444\/revisions"}],"predecessor-version":[{"id":51446,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/51444\/revisions\/51446"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/47879"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=51444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=51444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=51444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}