Risky Business #501 -- Trisis: signalling, deterrence or escalation?

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week’s show we’ll be talking about a whole bunch of stuff – the FBI taking down a botnet in a very FBI way, we go deep on the Trisis malware popping up in the US following America’s withdrawal from the so-called Iran agreement. We look at the latest in the crypto debate, breaches, bugs and more!

We’ll hear from Tom Uren of Australia’s Strategic Policy Institute (ASPI) on the Trisis side of things. Tom worked in an interesting place in Australia’s defence department but these days spends his days think tanking for the Australian Strategic Policy Institute. He shares his thoughts on what it is Iran could be up to with Trisis.

This week’s show is brought to you by: Australia!

AustCYBER is a government-supported industry group here that is trying to get the Australian cybersecurity industry organised. There’s the VC-backed US model, the build a “cyber city” in the desert Israeli model, then there’s the Australia model, which is actually quite different. It’s much more about helping local startups win deals locally, then internationally, to get them on a path to profitability so they don’t have to sign the awful term sheets Australian VCs put in front of them.

Well, there’s more to it than that, but AustCYBER head honcho Michelle Price will be along in this week’s sponsor interview to walk us through what she’s trying to do for the Australian security industry and how foreign multinational companies can also benefit from that.

Risky Business #501 -- Trisis: signalling, deterrence or escalation?
0:00 / 0:00

Show notes

Exclusive: FBI Seizes Control of Russian Botnet

Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide

Robᵉʳᵗ Graham 🤔 on Twitter: "This advice from the FBI is best described as "moronic". It advised 126 million households in the U.S. to reboot their routers in order to address a botnet of 500,000 devices located mostly outside the U.S. https://t.co/qhm96HmLVZ"

FBI: Kindly Reboot Your Router Now, Please — Krebs on Security

FBI shuts down domain behind Russian 'VPNFilter' botnet

Researchers uncover sophisticated botnet aimed at possible attack inside Ukraine

Trisis masterminds have expanded operations to target U.S. industrial firms

U.S. industry experts call for vigilance after Trisis group goes global

In the dark about 'going dark'

Encryption advocates rip FBI over inflated encrypted device statistics

Apple reports spike in national security requests amid promises of more transparency

Why Is Your Location Data No Longer Private? — Krebs on Security

The U.S. military combined cyber and kinetic operations to hunt down ISIS, general says

Hacker linked to Russian intelligence sentenced to five years in prison

Cyber crooks claim to hit two big Canadian banks | Reuters

Chinese researchers warn blockchain company EOS about 'epic' vulnerability in soon-to-launch platform

No one is updating their Android devices, new data shows

Oracle Plans to Drop Java Serialization Support, the Source of Most Security Bugs

3 Charged In Fatal Kansas ‘Swatting’ Attack — Krebs on Security

Russian unit, GRU officer linked to 2014 shoot-down of airliner over Ukraine | Ars Technica

Cyber Security Growth Network - Australian Cyber Security Growth Network