![A wolf in admin clothing. [Research Saturday]](https://cdn-images.podbay.fm/eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1cmwiOiJodHRwczovL21lZ2FwaG9uZS5pbWdpeC5uZXQvcG9kY2FzdHMvMDJjYmY3NmEtMzUwNy0xMWYxLTg2ZGMtM2ZlMThhNmVkODIyL2ltYWdlLzk1YjcyYTkzYzJmZmFmOGZmOTAwZDY2MmE5YmQzNzM1LnBuZz9peGxpYj1yYWlscy00LjMuMSZtYXgtdz0zMDAwJm1heC1oPTMwMDAmZml0PWNyb3AmYXV0bz1mb3JtYXQsY29tcHJlc3MiLCJmYWxsYmFjayI6Imh0dHBzOi8vaXMxLXNzbC5tenN0YXRpYy5jb20vaW1hZ2UvdGh1bWIvUG9kY2FzdHMyMTEvdjQvMWQvNjYvNmUvMWQ2NjZlYTEtM2E2MC0yZjA4LTVmMzMtMjg5YTlmZDJjNjE1L216YV8xMjc3Mjk2NDI1MTgwNTgzMTA0MC5qcGVnLzYwMHg2MDBiYi5qcGcifQ.yj7r-WlnDIm5mZZGCGbLf59ruExehS5kCedhzyNqPDI.jpg?width=200&height=200)
Today we are joined by Selena Larson, Threat Researcher from Proofpoint research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month.
The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.
The research and executive brief can be found here:
(Don't) TrustConnect: It's a RAT in an RMM hat
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 11
2 min

The Treasury Secretary and Fed Chair summon bankers over AI concerns. A hacker claims more than 10 petabytes stolen from China’s National Supercomputing Center. Recalibrating the quantum timeline. Researchers demo prompt injection against Apple Intelligence. Payroll Pirates target Canadians. Gmail gets end-to-end encryption on mobile devices. A Chrome update fixes critical vulnerabilities. A Pennsylvania cop admits creating more than 3,000 AI-generated pornographic deepfakes. Our guest is Henry Comfort, Co-Founder and CEO of Geordie AI, winner of this year’s RSAC Innovation Sandbox. FCC floats firmer filters for fraudulent phone calls.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today, Dave shares coverage of the RSAC 2026 Innovation Sandbox and his conversation with Henry Comfort, Co-Founder and CEO from the winner of “Most Innovative Startup” Geordie AI. We tip our hats to this year’s finalists.
Selected Reading
Bessent and Powell’s A.I. Anxiety (The New York Times)
Court Backs Pentagon Anthropic Ban - But the Fight Continues (GovInfo Security)
A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data (CNN)
Why is the timeline to quantum-proof everything constantly shrinking? (CyberScoop)
Microsoft: Canadian employees targeted in payroll pirate attacks (Bleeping Computer)
Google rolls out Gmail end-to-end encryption on mobile devices (Bleeping Computer)
Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000 (SecurityWeek)
Police corporal created AI porn from driver's license pics (Ars Technica)
FCC proposes new rule to further crackdown on illegal robocalls (The Record)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 10
22 min

Iran-linked hackers signal cyberattacks will continue despite the cease-fire. Microsoft restores access after suspending open-source developer accounts. John Deere settles its right-to-repair fight. A suspected Adobe Reader zero-day surfaces. Palo Alto Networks and SonicWall patch high-severity flaws. New macOS malware targets crypto wallets. A threat cluster abuses live chat to bypass MFA. CISA orders urgent Ivanti patching. Researchers track a stealthy DDoS-for-hire botnet. Our guest is Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. macOS has a 49 day time limit.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On today’s Industry Voices, we are joined by Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. If you enjoyed this conversation, check out the full interview here.
Selected Reading
Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long (SecurityWeek)
Microsoft suspends dev accounts for high-profile open source projects (Bleeping Computer)
John Deere to Pay $99 Million in Monumental Right-to-Repair Settlement (The Drive)
Adobe Reader Zero-Day Exploited for Months: Researcher (SecurityWeek)
Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities (SecurityWeek)
New macOS Malware notnullOSX Targets Crypto Wallets Over $10K (Hackread)
Google Warns of New Threat Group Targeting BPOs and Helpdesks (Infosecurity Magazine)
Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion (Trellix)
CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday (Bleeping Computer)
We Found a Ticking Time Bomb in macOS TCP Networking - It Detonates After Exactly 49 Days (Photon Blog)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 9
28 min

Federal agencies warn Iranian-linked hackers are probing U.S. critical infrastructure, while the DOJ disrupts a Russian router hijacking campaign. Cyberattacks hit Minnesota government systems and force a Massachusetts hospital to divert ambulances. Anthropic limits access to its new AI bug-hunting model, hackers leak terabytes of LAPD data, and researchers warn of a rise in AI recommendation poisoning. Our guest is Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." Japan trades red tape for training data.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On today’s Industry Voices, we are joined by Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." If you enjoyed this interview, check out the full conversation here.
Selected Reading
Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure (WIRED)
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure (FBI Internet Crime Complaint Center (IC3))
Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest (Bloomberg)
US disrupts Russian military-run DNS hijacking network, Justice Department says (Reuters)
Frostarmada forest blizzard dns hijacking (Lumen Technologies Black Lotus Labs)
Minnesota governor orders emergency support for cyberattack disrupting county's 'critical systems' (StateScoop)
Massachusetts hospital turning ambulances away after cyberattack (The Record)
What Anthropic Glasswing reveals about the future of vulnerability discovery (CSO Online)
Sensitive LAPD records leaked in hack of L.A. city attorney's office (LA Times)
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning (Microsoft Security Blog)
Japan relaxes privacy laws to make AI development easy (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 8
23 min

CISA faces a $700 million budget cut. Russian and Iranian cyber cooperation raises concerns. New BPFDoor variants emerge. Cybercrime losses climb again. Researchers advance a GPU Rowhammer attack. Northern Ireland schools go offline after a breach. An alleged hacker-for-hire faces U.S. charges. And German police name the suspected REvil mastermind. Our guest is John Anthony Smith, Founder and Chief Security Officer at Fenix24, explaining why more technology hasn't made us more secure. A frustrated researcher drops the hammer.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On today’s Industry Voices segment, John Anthony Smith, Founder and Chief Security Officer at Fenix24, discusses why more technology hasn't made us more secure. Check out the full conversation here.
Selected Reading
White House Seeks to Slash CISA Funding by $707 Million (SecurityWeek)
Exclusive: Russia supplies Iran with cyber support, spy imagery to hone attacks, Ukraine says (Reuters)
New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay (Rapid7)
FBI Internet Crime Complaint Center (IC3) Report 2025 (FBI Internet Crime Complaint Center (IC3))
GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack (SecurityWeek)
Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands (The Record)
Suspect in Hacking of Climate Activists Is Extradited to New York (New York Times)
German Police Unmask REvil Ransomware Leader (SecurityWeek)
Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit (Bleeping Computer)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 7
28 min

Fortinet releases an emergency update for a critical vulnerability. A major outage disrupts Russian banking apps. A new report highlights critical skills gaps. CyberCorp scholars struggle to secure jobs. Scammers use QR codes in fake traffic violation schemes. A proposed lawsuit accuses Perplexity of oversharing users’ AI transcripts. Cambodia outlaws scam centers. Scammers impersonate Harvard IT staff. With “wrench attack” threats of violence, life imitates art. Kevin Magee from Microsoft for Startups describes emerging trends. On Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." Users find Copilot’s terms of use highly entertaining.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today on our Industry Voices segment, we are joined by Kevin Magee from Microsoft for Startups discussing how cybersecurity startups can succeed by focusing on real problems and navigating emerging trends. Tune into the full conversation here.
Afternoon Cyber Tea
On this segment of Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." You can listen to the full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.
Selected Reading
New FortiClient EMS flaw exploited in attacks, emergency patch released (Bleeping Computer)
Major outage hits Russian banking apps, metro payments across regions (The Record)
SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk (Industrial Cyber)
CyberCorps grads consider private sector as fed hiring challenges persist (Federal News Network)
Traffic violation scams switch to QR codes in new phishing texts (Bleeping Computer)
Perplexity's "Incognito Mode" is a "sham," lawsuit says (Ars Technica)
Cambodian parliament passes landmark cybercrime law after scam centre scrutiny (Reuters)
Harvard Warns of Active Cyberattack Impersonating IT Staff and Targeting Affiliates (The Crimson)
Wealthy California crypto holders targeted in violent ‘wrench attacks’ (KTLA)
Security (xkcd)
Censys raises $70 million in a Series D round. (N2K Pro Business Briefing)
Even Microsoft know Copilot can't be trusted (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 6
34 min
![Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes]](https://cdn-images.podbay.fm/eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1cmwiOiJodHRwczovL21lZ2FwaG9uZS5pbWdpeC5uZXQvcG9kY2FzdHMvNThhMmFjZmMtMmY3Zi0xMWYxLTkyYTctMWY2MTgxMDA3Nzk2L2ltYWdlLzkxMGFhZjE0OGM1ZmRmM2I5Zjg5MjA4YTkxZjE5ZGY0LnBuZz9peGxpYj1yYWlscy00LjMuMSZtYXgtdz0zMDAwJm1heC1oPTMwMDAmZml0PWNyb3AmYXV0bz1mb3JtYXQsY29tcHJlc3MiLCJmYWxsYmFjayI6Imh0dHBzOi8vaXMxLXNzbC5tenN0YXRpYy5jb20vaW1hZ2UvdGh1bWIvUG9kY2FzdHMyMTEvdjQvMWQvNjYvNmUvMWQ2NjZlYTEtM2E2MC0yZjA4LTVmMzMtMjg5YTlmZDJjNjE1L216YV8xMjc3Mjk2NDI1MTgwNTgzMTA0MC5qcGVnLzYwMHg2MDBiYi5qcGcifQ.-vTDlBRCkK5z9GEvdYJ3C1fRHJ0BWqsj4Sqo-ZC3Mdw.jpg?width=200&height=200)
Please enjoy this encore of Career Notes.
Anjali Hansen, a Senior Privacy Counselor from Noname Security shares her story as she climbed through the ranks to get to where she is today. When Anjali started, she wanted to do international law. She started working for the International Trade Commission after law school, where she was able to gain most of her experience and real world abilities. Working with online fraud and abuse, she shares, concerned her, because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cybercrime. From there, she moved to Noname Security, and in working there, she found that she is working with every group in the organization, creating a cross team collaboration, saying how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 5
1 min
![Startup surge sparks spy interest. [Research Saturday]](https://cdn-images.podbay.fm/eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJ1cmwiOiJodHRwczovL21lZ2FwaG9uZS5pbWdpeC5uZXQvcG9kY2FzdHMvNThlY2YyZDgtMmY3Ny0xMWYxLWJkMDUtM2ZhMjVhMDU0ZmRkL2ltYWdlLzk1YjcyYTkzYzJmZmFmOGZmOTAwZDY2MmE5YmQzNzM1LnBuZz9peGxpYj1yYWlscy00LjMuMSZtYXgtdz0zMDAwJm1heC1oPTMwMDAmZml0PWNyb3AmYXV0bz1mb3JtYXQsY29tcHJlc3MiLCJmYWxsYmFjayI6Imh0dHBzOi8vaXMxLXNzbC5tenN0YXRpYy5jb20vaW1hZ2UvdGh1bWIvUG9kY2FzdHMyMTEvdjQvMWQvNjYvNmUvMWQ2NjZlYTEtM2E2MC0yZjA4LTVmMzMtMjg5YTlmZDJjNjE1L216YV8xMjc3Mjk2NDI1MTgwNTgzMTA0MC5qcGVnLzYwMHg2MDBiYi5qcGcifQ.yPvPbIxr6OVl045i1tOTEdK2t5-Zb7aFitCGFqvjaIE.jpg?width=200&height=200)
This week, we are joined by Santiago Pontiroli, Threat Intelligence Research Lead from Acronis TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms.
The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.
The research and executive brief can be found here:
New year, new sector: Transparent Tribe targets India’s startup ecosystem
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 4
19 min

Cloud data centers come under fire in wartime. A massive dark web intelligence database is exposed. Chinese hackers exploit a video conferencing zero-day. The intelligence community rolls out cyber modernization plans. React2Shell attacks spread at scale. Iowa sues UnitedHealth over the Change Healthcare breach. France moves to bar kids from social media. Researchers warn about hidden risks in power regulation. An insider extortion plot locks admins out of hundreds of servers. Our guest Brandon Karpf, friend of the show, with insights on the war in Iran. Espresso exploit exposes executive emails.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we are joined by Brandon Karpf, friend of the show, discussing defending critical infrastructure against Iran.
Selected Reading
What Happens When Data Centers Become Military Targets? (GovInfo Security)
Shared EnemShared Enemy: Inside a Chinese Dark Web Monitoring Database | UpGuardy: Inside a Chinese Dark Web Monitoring Database (UpGuard)
TrueConf Zero-Day Exploited in Asian Government Attacks (SecurityWeek)
ODNI tackles AI, threat hunting, app cybersecurity in year-one tech review (CyberScoop)
React2Shell Exploited in Large-Scale Credential Harvesting Campaign (SecurityWeek)
State AG Sues Change Healthcare in 2024 Ransomware Attack (GovInfo Security)
French Senate passes bill that would ban children under 15 from social media (The Record)
The silent dependency: DC power regulation in cyber‑physical security (NCC Group)
Man admits to locking thousands of Windows devices in extortion plot (Bleeping Computer)
The company's biggest security hole lived in the breakroom (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 3
30 min

A fake WhatsApp spreads spyware. The State Department pushes embassies to counter influence ops. Cisco patches critical bugs. CrystalRAT hits Telegram. A Texas hospital breach affects 250,000. HHS reshuffles IT oversight. China-linked spies target Europe. EvilTokens hijacks Microsoft accounts. Ransomware hits a North Dakota water plant. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk. Tales of a tortoise's termination have been greatly exaggerated.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk amid rapid technological change. If you enjoyed this interview, check out the full conversation here.
Selected Reading
WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker (TechCrunch)
Trump Officials Try to Fight Foreign Disinformation They Once Dismissed (The New York Times)
Cisco Patches Critical and High-Severity Vulnerabilities (SecurityWeek)
New CrystalRAT malware adds RAT, stealer and prankware features (Bleeping Computer)
250,000 Affected by Data Breach at Nacogdoches Memorial Hospital (SecurityWeek)
HHS Shuffles Internal Cyber, AI Oversight Back to CIO Office (GovInfo Security)
European-Chinese geopolitical issues drive renewed cyberespionage campaign (CyberScoop)
New EvilTokens service fuels Microsoft device code phishing attacks (Bleeping Computer)
North Dakota water treatment plant reports March ransomware attack (The Record)
World’s oldest tortoise caught in viral crypto death scam | St Helena (The Guardian)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Apr 2
30 min
Load more
