<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xml:base="https://risky.biz/feeds/newsletters/" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Risky Business Newsletters</title>
    <description>Written newsletters from Risky Business Media.</description>
    <link>https://risky.biz/</link>
    <copyright>Copyright Risky Business Media 2007-2026</copyright>
    <language>en</language>
    <atom:link href="https://risky.biz/feeds/newsletters/" rel="self" type="application/rss+xml" />
    <pubDate>Mon, 13 Apr 2026 19:46:53 +1000</pubDate>
    <lastBuildDate>Mon, 13 Apr 2026 19:46:53 +1000</lastBuildDate>
    <generator>Jekyll v4.2.2</generator>

    
    

    
    
      <item>
        <title>Risky Bulletin: France takes first steps to ditch Windows for Linux</title>
        <pubDate>Mon, 13 Apr 2026 14:01:47 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-france-takes-first-steps-to-ditch-windows-for-linux/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-france-takes-first-steps-to-ditch-windows-for-linux/</guid>
        <description><![CDATA[
          
            <p>The French government is taking its first major steps to ditch Windows for Linux and reduce its dependency on US tech for local European alternatives.</p><p>The first department to bite the bullet will be the French Inter-Ministerial Directorate of Digital Affairs (DINUM). The agency is the unofficial IT department for the French government, and this is very likely a test of how a migration could happen at a larger scale.</p><p>The decision was <a href="https://www.numerique.gouv.fr/sinformer/espace-presse/souverainete-numerique-reduction-dependances-extra-europeennes/"><u>announced</u></a> last week at a seminar between several French government ministries, which also pledged to prepare plans for their own migrations and the alternatives they might need.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs</title>
        <pubDate>Fri, 10 Apr 2026 15:36:47 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-fbi-extracted-signal-chats-from-iphone-notifications-logs/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-fbi-extracted-signal-chats-from-iphone-notifications-logs/</guid>
        <description><![CDATA[
          
            <p><em>The main <strong>Risky Business</strong> podcast is now on YouTube with video versions of our recent episodes. Below is our latest weekly show with Pat, Adam, and James at the helm!</em></p><p><strong>LA CAO hack:</strong> The Los Angeles city attorney’s office has been hacked and sensitive data has been published online. Stolen data included sensitive case details and the personal information of LA police officers. Witness names, medical records, and internal affairs investigation are also part of a trove of 7.7TB published online this week. [<a href="https://ktla.com/news/local-news/lapd-records-leaked-city-attorney-hack/"><em><u>KTLA</u></em></a>]</p><p><strong>Ransomware hits key Dutch hospital provider:</strong> A ransomware attack has hit a major software provider for the Dutch healthcare sector. The incident impacted ChipSoft, the maker of an electronic patient record management platform named HiX. According to reports, the platform is used by roughly 70% of all Dutch hospitals but it's unclear if it was affected. The incident didn't impact the platform's availability. [<a href="https://nltimes.nl/2026/04/08/ransomware-attack-company-manages-dutch-hospitals-patient-files"><em><u>NLTimes</u></em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: American Diplomats to Fight Propaganda… on X</title>
        <pubDate>Thu, 09 Apr 2026 12:10:09 +1000</pubDate>
        <link>https://risky.biz/srsly-risky-biz-american-diplomats-to-fight-propaganda-on-x/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-american-diplomats-to-fight-propaganda-on-x/</guid>
        <description><![CDATA[
          
            <p>US Secretary of State Marco Rubio has called for the State Department to push back against foreign state-backed propaganda and disinformation. Unfortunately for Rubio, he also dismantled the State Department's counter-propaganda office last year. It won't be recreated easily.</p><p>When it shut down its counter-propaganda office, the US government essentially left the detection of coordinated disinformation campaigns to private companies, at least some of which either don't care or are actively taking extreme positions: X is now a <a href="https://news.risky.biz/outside-america-musks-x-is-a-foreign-influence-threat/"><u>cesspool of disinformation</u></a>. </p><p>Last week, though, Rubio sent a memo to global US diplomatic posts directing them to launch their own campaigns combatting foreign propaganda. <a href="https://www.theguardian.com/us-news/2026/mar/30/embassies-campaign-marco-rubio-elon-musk"><u>Per <em>The Guardian</em></u></a>:</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Cybercrime losses passed $20 billion last year</title>
        <pubDate>Wed, 08 Apr 2026 15:31:55 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-cybercrime-losses-passed-20-billion-last-year/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-cybercrime-losses-passed-20-billion-last-year/</guid>
        <description><![CDATA[
          
            <p>Americans have lost <strong>almost $21 billion</strong> to cybercrime last year, more than any other since the FBI began tracking cybercrime data 25 years ago, the <a href="https://www.fbi.gov/news/press-releases/cryptocurrency-and-ai-scams-bilk-americans-of-billions"><u>FBI said</u></a> in its yearly Internet Crime Report [<a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf"><em><u>PDF</u></em></a>].</p><p><strong>Investment scams</strong> were again the top category in terms of losses, with $8.6 billion reported stolen, and almost $6.2 billion of that sum being stolen as cryptocurrency.</p><p>Cyber-enabled fraud accounted for <strong>85%</strong> of last year's losses, almost $17.7 billion.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: New Cambodian law will put scam compound operators in prison for life</title>
        <pubDate>Mon, 06 Apr 2026 13:07:59 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-new-cambodian-law-will-put-scam-compound-operators-in-prison-for-life/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-new-cambodian-law-will-put-scam-compound-operators-in-prison-for-life/</guid>
        <description><![CDATA[
          
            <p>The Cambodian government passed a new law last week that introduces big fines and heavy prison sentences for the operators and workers of cyber scam compounds.</p><p>The new bill passed unanimously in the National Assembly and Senate and was sent to the country's king to be signed into law. It comes after major international pressure from both China and the US for the local government to crack down on its sprawling cyber scam ecosystem.</p><p>The law introduces tiered penalties depending on a suspect's roles in the scam operation, such as if they acted alone or part of a larger cybercrime syndicate.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Russia will revoke licenses for unruly ISPs</title>
        <pubDate>Fri, 03 Apr 2026 11:19:42 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-russia-will-revoke-licenses-for-unruly-isps/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-russia-will-revoke-licenses-for-unruly-isps/</guid>
        <description><![CDATA[
          
            <p>The Russian government will tighten operating requirements for internet service providers in an effort to kill small neighborhood providers.</p><p>The new requirements will include higher license fees, larger minimum operational capital, and mandatory deployment of the FSB's SORM traffic interception equipment.</p><p>According to reports from <a href="https://iz.ru/2070651/valerii-kodachigov/v-rf-hotyat-sokratit-kolichestvo-telekom-kompanij"><em><u>Izvestia</u></em></a> and <a href="https://www.rbc.ru/society/02/04/2026/69ce37f49a79479bcb0ecf35"><em><u>RBC</u></em></a>, the new proposed rules would give the Russian Ministry of Digital Development, Communications, and Mass Media the power to revoke licenses without a court order for those who fail to comply.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: America&apos;s Next Top (Cyber) Model</title>
        <pubDate>Thu, 02 Apr 2026 14:16:49 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-americas-next-top-cyber-model/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-americas-next-top-cyber-model/</guid>
        <description><![CDATA[
          
            <p>Computers are now <em>incredibly</em> good at finding and exploiting vulnerabilities. While we expect this will cause <a href="https://cyberscoop.com/ai-cyberattacks-two-years-insane-vulnerabilities-kevin-mandia-alex-stamos-morgan-adamski-rsac-2026/"><u>cyber chaos in industry</u></a>, from a US government perspective, cyber organisations like NSA and Cyber Command need access to models from all domestic AI companies. Anthropic may be the 0day maestro this week, but there are no guarantees which firm will be crowned the champion of cutting edge when the dust settles. </p><p>In the last week or so we've seen a stream of reports demonstrating a sudden step-change in the cyber capabilities of Anthropic's models. </p><p>In early February Anthropic <a href="https://red.anthropic.com/2026/zero-days/"><u>announced that</u></a> it had used its latest model, Opus 4.6, to find and validate more than 500 high-severity vulnerabilities in open source software. These vulnerabilities were in well-tested code and some had been present for decades. The company said Opus 4.6 reasons about code the way a human researcher would. It looks at past bug fixes to find similar issues that weren't addressed, spots risky patterns and understands logic to determine what inputs would break software. Opus 4.6 was "notably better" at finding these vulnerabilities than previous models, even "without task-specific tooling, custom scaffolding, or specialized prompting". </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Iranian password sprays came first, then came the missiles</title>
        <pubDate>Wed, 01 Apr 2026 16:53:15 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-iranian-password-sprays-came-first-then-came-the-missiles/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-iranian-password-sprays-came-first-then-came-the-missiles/</guid>
        <description><![CDATA[
          
            <p>A suspected Iranian APT group has conducted a wide-ranging password spray attack against the Microsoft 365 accounts of governments and private sector organizations across the Middle East.</p><p>While password spraying campaigns are a dime a dozen, this one stood out to Check Point researchers because it targeted Israeli and UAE municipalities that were hit by Iranian drone and missile strikes.</p><p>The campaign started in early March, just as Iran began mustering its comeback after initial US and Israeli strikes that killed Iranian leader Ali Khamenei and tens of high-ranking government, military,  and intelligence officials in late February.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Apple adds ClickFix warning to macOS terminal</title>
        <pubDate>Mon, 30 Mar 2026 14:29:12 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-apple-adds-clickfix-warning-to-macos-terminal/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-apple-adds-clickfix-warning-to-macos-terminal/</guid>
        <description><![CDATA[
          
            <p>Apple has added a secret security feature to macOS to warn users about possible ClickFix attacks.</p><p>The feature was silently added to macOS 26.4, released last week.</p><p>It works by showing a popup on the screen whenever a user tries to copy-paste commands from a browser into the Terminal window.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network</title>
        <pubDate>Fri, 27 Mar 2026 14:00:00 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-russia-to-use-custom-crypto-algorithm-for-its-5g-network/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-russia-to-use-custom-crypto-algorithm-for-its-5g-network/</guid>
        <description><![CDATA[
          
            <p>NOTE: This newsletter was (initially) sent to Seriously Risky Business subscribers instead of Risky Bulletin subscribers by accident. If you are receiving this newsletter for a second time, that's why. Sorry!</p><p>The Russian government is working on a law that would require all mobile operators to use a custom domestically-developed encryption algorithm for the country's 5G mobile network.</p><p>If the bill passes, all phones sold in Russia going forward will have to support the NEA-7 algorithm or they will not be able to connect to Russian mobile networks.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: FBI Says Why Get a Warrant When You Have Kash</title>
        <pubDate>Thu, 26 Mar 2026 13:42:45 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-fbi-says-why-get-a-warrant-when-you-have-kash/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-fbi-says-why-get-a-warrant-when-you-have-kash/</guid>
        <description><![CDATA[
          
            <p>In a Senate hearing last week <a href="https://www.politico.com/news/2026/03/18/fbi-buying-data-track-people-patel-00834080"><u>FBI director Kash Patel said</u></a> the Bureau is buying data that can be used to track Americans. The risk that the federal government could abuse purchased data was previously theoretical, but now feels more immediate. Lawmakers should act to protect Americans' civil liberties.  </p><p>When specifically asked about buying location data, Patel said the Bureau purchases information, "that's consistent with the Constitution and the laws under the Electronic Communications Privacy Act, and it has led to some valuable intelligence for us". </p><p>We have <a href="https://news.risky.biz/albania-severs-diplomatic-ties-with-65c0eb42a0e6da001a37dfee/#this-is-what-you-get-when-you-don-t-regulate-location-data"><u>seen US local law enforcement agencies</u></a> using this kind of data to track people, but this is new for the FBI. In 2023, the Bureau's Director at the time, Christopher Wray, said it had once used commercial location data in a national security pilot program but had no further plans to use it. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: The Intellexa CEO is pissed!!!</title>
        <pubDate>Wed, 25 Mar 2026 14:20:50 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-the-intellexa-ceo-is-pissed/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-the-intellexa-ceo-is-pissed/</guid>
        <description><![CDATA[
          
            <p>The CEO of a major spyware vendor says he is being scapegoated by the Greek government and is willing to testify and spill the beans on their illegal surveillance operations.</p><p>Intellexa CEO Tal Dillian is pissed out of his mind after a Greek court sentenced him, his wife, and two executives to <a href="https://www.ekathimerini.com/news/1296353/four-businesspeople-found-guilty-in-spyware-trial/"><u>more than 126 years</u></a> in prison last month on generic charges of "violating the confidentiality of telephone communications."</p><p>The sentence is related to a major Greek political scandal known in Greece as <strong>Predatorgate</strong>, which this newsletter <a href="https://news.risky.biz/risky-biz-news-greece-is-close-to-burying-its-predatorgate-scandal/"><u>first covered</u></a> back in December 2024.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: GitHub is starting to have a real malware problem</title>
        <pubDate>Mon, 23 Mar 2026 15:58:40 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-github-is-starting-to-have-a-real-malware-problem/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-github-is-starting-to-have-a-real-malware-problem/</guid>
        <description><![CDATA[
          
            <p>GitHub is slowly becoming a very dangerous website as more and more threat actors are starting to use it to host and distribute malware <strong>disguised</strong> as legitimate software repositories.</p><p>What started as an infrequent sighting in early 2024 is now at the center of an increasing number of infosec and malware reports.</p><p>The tactic is usually the same. A threat actor would take a legitimate repository, add malware to the files—typically an infostealer or a remote access trojan— and then upload the boobytrapped repo back on GitHub.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: AWS kills bucketsquatting</title>
        <pubDate>Fri, 20 Mar 2026 13:20:46 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-aws-kills-bucketsquatting/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-aws-kills-bucketsquatting/</guid>
        <description><![CDATA[
          
            <p>Amazon Web Services has <a href="https://aws.amazon.com/blogs/aws/introducing-account-regional-namespaces-for-amazon-s3-general-purpose-buckets/"><u>rolled out</u></a> a new security feature last week that will help customers prevent a type of attack known as <strong>S3 Bucket Namesquatting</strong>, or <strong>Bucketsquatting</strong>.</p><p>The attack was first described by cloud engineer Ian Mckay <a href="https://onecloudplease.com/blog/s3-bucket-namesquatting"><u>in 2019</u></a>. It happens when an attacker abuses the predictable naming conventions in AWS bucket names to register buckets that have expired or have been deleted by their original owners.</p><p>If traffic still flows to the old buckets, this allows attackers to collect data from internal networks or public-facing apps, leading to serious security incidents.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Successful War Leaves Iran With One Option, Cyber</title>
        <pubDate>Thu, 19 Mar 2026 13:02:41 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-successful-war-leaves-iran-with-one-option-cyber/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-successful-war-leaves-iran-with-one-option-cyber/</guid>
        <description><![CDATA[
          
            <p>Aside from one disruptive attack, Iran's cyber retaliation against US and Israeli strikes has been largely missing in action. But there are reasons to believe in the longer term the war will result in an enduring increase in Iran's capacity and appetite for cyber mayhem.</p><p>Last week the <a href="https://research.checkpoint.com/2026/handala-hack-unveiling-groups-modus-operandi/"><u>Iranian state-backed</u></a> group Handala <a href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/?ref=zero-day-newsletter"><u>did claim responsibility</u></a> for a wiper attack on Michigan-based medical device manufacturer Stryker, and said the attack was partly in retaliation for the US <a href="https://www.nytimes.com/2026/03/08/world/middleeast/iran-minab-school-strike.html"><u>bombing of an all-girls school</u></a> in Iran. In recent days Handala and a range of other pro-Iranian groups have <a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/"><u>also claimed</u></a> a series of hacks targeting Israeli or Middle Eastern organisations.</p><p>Although the Stryker attack looks like it is <a href="https://www.stryker.com/au/en/about/news/a-message-to-our-customers-03-2026.html"><u>causing serious disruption</u></a> at the target company itself, trouble at just a single organisation won't trouble senior US policymakers. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: EU finally imposes more cyber sanctions</title>
        <pubDate>Wed, 18 Mar 2026 12:43:27 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-eu-finally-imposes-more-cyber-sanctions/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-eu-finally-imposes-more-cyber-sanctions/</guid>
        <description><![CDATA[
          
            <p>The European Union on Monday <a href="https://www.consilium.europa.eu/en/press/press-releases/2026/03/16/cyber-attacks-against-the-eu-and-its-member-states-council-sanctions-three-entities-and-two-individuals/"><u>imposed sanctions</u></a> on three hacking groups and two individuals for cyberattacks on its member states.</p><p>Sanctions were imposed on Iranian cyber contractor <strong>Emennet Pasargad</strong> for its hack of French satirical magazine Charlie Hebdo, the 2024 Paris Olympic Games, and a Swedish SMS service.</p><p>This is the same group that also meddled in the 2020 US Presidential Election and was later sanctioned three times by the US as well, in <a href="https://home.treasury.gov/news/press-releases/jy0494"><u>2021</u></a>, and <a href="https://home.treasury.gov/news/press-releases/jy2621"><u>September</u></a> and <a href="https://home.treasury.gov/news/press-releases/jy2766"><u>December 2024</u></a>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Meta disrupts Mexican cartels</title>
        <pubDate>Mon, 16 Mar 2026 14:11:15 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-meta-disrupts-mexican-cartels/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-meta-disrupts-mexican-cartels/</guid>
        <description><![CDATA[
          
            <p>Meta's security team has suspended thousands of accounts last year that were tied to Mexican and other Latin American drug cartels.</p><p>The Facebook and Instagram accounts were used to recruit youth for drug trafficking and drug dealing, to advertise drugs, and to organize violence and extortion operations.</p><p>Meta says it used AI to detect the coded language typically used by cartels and also to identify photos of drugs posted on its platforms. Human reviewers also confirmed the findings before accounts were removed.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Another residential proxy provider falls as authorities continue crackdowns</title>
        <pubDate>Fri, 13 Mar 2026 12:38:11 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-another-residential-proxy-provider-falls-as-authorities-continue-crackdowns/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-another-residential-proxy-provider-falls-as-authorities-continue-crackdowns/</guid>
        <description><![CDATA[
          
            <p>American and European law enforcement agencies have seized the infrastructure of a residential proxy provider named <strong>SocksEscort</strong>; the latest of such a crackdown against proxy providers over the past years.</p><p>The service had been running since 2021 and rented access to more than 369,000 different IP addresses across its lifetime.</p><p>According to the <a href="https://www.justice.gov/usao-edca/pr/authorities-dismantle-global-malicious-proxy-service-deployed-malware-and-defrauded"><u>FBI</u></a>, <a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-and-international-partners-disrupt-socksescort-proxy-service"><u>Europol</u></a>, and <a href="https://www.politie.nl/nieuws/2026/maart/12/10-internationaal-succes-tegen-georganiseerde-cybercrime-criminele-proxydienst-uit-de-lucht.html"><u>Dutch Police</u></a>, SocksEscort was a front for a malware operation that infected modems and home routers. Lumen's Black Lotus Labs <a href="https://www.linkedin.com/pulse/escorted-out-blacklotuslabs-z5pre/"><u>linked</u></a> it to a botnet it discovered in 2023, named <a href="https://blog.lumen.com/routers-from-the-underground-exposing-avrecon/"><u>AVRecon</u></a>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Trump&apos;s Cyber Strategy… Great, Amazing, The Best Yet</title>
        <pubDate>Thu, 12 Mar 2026 14:55:18 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-trumps-cyber-strategy-great-amazing-the-best-yet/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-trumps-cyber-strategy-great-amazing-the-best-yet/</guid>
        <description><![CDATA[
          
            <p>President Donald Trump's Cyber Strategy contains an ambitious array of worthwhile goals. The administration's actions over the past year, however, directly undermine many of them, barring one. It raises the question: Can aggressive offensive cyber action compensate for lukewarm defensive efforts?</p><p><a href="https://www.whitehouse.gov/articles/2026/03/white-house-unveils-president-trumps-cyber-strategy-for-america/"><u>The strategy</u></a>, released last Friday, one-ups the <a href="https://bidenwhitehouse.archives.gov/oncd/national-cybersecurity-strategy/"><u>Biden era equivalent</u></a>, at least superficially. Rather than five pillars, this one has six:</p><p>The strategy's overall vibe is dominated by that first pillar: "Shape Adversary Behaviour". President Trump's foreword describes using cyber power for "disrupting and disorienting our adversaries". He concludes that "American Power will finally stand up in cyberspace". </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Gen. Joshua Rudd confirmed as next CyberCom and NSA head</title>
        <pubDate>Wed, 11 Mar 2026 09:53:51 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-gen-joshua-rudd-confirmed-as-next-cybercom-and-nsa-head/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-gen-joshua-rudd-confirmed-as-next-cybercom-and-nsa-head/</guid>
        <description><![CDATA[
          
            <p>The US Senate has confirmed Army Lt. Gen. Joshua M. Rudd as the next leader of US Cyber Command and the National Security Agency.</p><p>Gen. Rudd was confirmed in a <a href="https://www.senate.gov/legislative/LIS/roll_call_votes/vote1192/vote_119_2_00049.htm"><u>71-29 vote</u></a> on Tuesday.</p><p>He will replace Army Lt. Gen. William Hartman, who is serving as interim chief for both agencies.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime</title>
        <pubDate>Mon, 09 Mar 2026 12:17:49 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-new-white-house-eo-prioritizes-fight-against-scams-and-cybercrime/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-new-white-house-eo-prioritizes-fight-against-scams-and-cybercrime/</guid>
        <description><![CDATA[
          
            <p>US President Donald Trump signed a <a href="https://www.whitehouse.gov/fact-sheets/2026/03/fact-sheet-president-donald-j-trump-combats-cybercrime-fraud-and-predatory-schemes-against-american-citizens/"><u>new executive order</u></a> on Friday directing federal agencies to prioritize a crackdown against foreign scam operations and predatory forms of cybercrime.</p><p>Scam-related crimes, such as business email compromise and investment fraud, have been at the top of the FBI's list of most damaging forms of cybercrime for over half-a-decade.</p><p>In 2024 alone, Americans lost $12.5 billion to cyber-enabled fraud schemes, a figure that will likely be surpassed when the 2025 numbers come out in April.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes</title>
        <pubDate>Fri, 06 Mar 2026 13:36:16 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-iranian-hackers-are-scanning-for-security-cameras-to-aid-missile-strikes/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-iranian-hackers-are-scanning-for-security-cameras-to-aid-missile-strikes/</guid>
        <description><![CDATA[
          
            <p>A sudden spike in scanning activity for internet-exposed security cameras has been recorded in Israel and countries across the Middle East. The activity has been traced back to a hacking group with ties to the Iranian government.</p><p>The scans spiked on Monday, when Iran launched missile and drone strikes in response to an Israeli and US military operation that bombed and killed its political leadership over the weekend.</p><p>Security firm <a href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/"><u>Check Point says</u></a> the scans targeted Hikvision and Dahua security cameras and included attempts to exploit old vulnerabilities. Scans targeted Israel, Qatar, Bahrain, Kuwait, the UAE, and Cyprus, the exact same countries where Iran carried out kinetic strikes.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: The Four Hour Cyber War on Iran</title>
        <pubDate>Thu, 05 Mar 2026 14:08:17 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-the-four-hour-cyber-war-on-iran/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-the-four-hour-cyber-war-on-iran/</guid>
        <description><![CDATA[
          
            <p>The US-Israeli attack on Iran shows how cyber operations help achieve military goals when aggressors have cyber dominance. But it also highlights the small window of opportunity for them to have a significant impact once war kicks off.</p><p>At a <a href="https://www.nextgov.com/cybersecurity/2026/03/how-cyber-command-contributed-operation-epic-fury-against-iran/411818/"><u>press briefing on Monday</u></a>, Joint Chiefs of Staff Chairman Gen. Dan Caine said US Cyber Command was involved in "coordinated space and cyber operations [that] effectively disrupted communications and sensor networks… leaving the adversary without the ability to see, coordinate or respond effectively".</p><p>The overall goal, he said, was to "disrupt, disorient and confuse the enemy". </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes</title>
        <pubDate>Wed, 04 Mar 2026 10:02:28 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-cyber-command-conducted-cyberattacks-ahead-of-iran-strikes/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-cyber-command-conducted-cyberattacks-ahead-of-iran-strikes/</guid>
        <description><![CDATA[
          
            <p>The Pentagon says that US Cyber Command carried out cyber operations that disrupted Iranian defenses ahead of a joint US-Israeli military operation over the last weekend.</p><p>"The first movers were US CyberCom and US SpaceCom, layering non-kinetic effects, disrupting and degrading and blinding Iran's ability to see, communicate, and respond," Joint Chiefs of Staff Chairman Gen. Dan Caine said in a press conference on Monday.</p><p>"Coordinated space and cyber operations effectively disrupted communications and sensor networks across the area of responsibility, leaving the adversary without the ability to see, coordinate, or respond effectively," he added.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: LLMs can deanonymize internet users based on their past comments</title>
        <pubDate>Mon, 02 Mar 2026 12:24:03 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-llms-can-deanonymize-internet-users-based-on-their-comments/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-llms-can-deanonymize-internet-users-based-on-their-comments/</guid>
        <description><![CDATA[
          
            <p>A team of academics has developed large language models (LLMs) that can deanonymize internet users based on past comments or other digital clues they have left behind.</p><p>The <a href="https://simonlermen.substack.com/p/large-scale-online-deanonymization" rel="noreferrer">new method</a> works even if targets use different pseudonyms across multiple platforms. It can link real identities to hidden accounts and online activity, and vice versa.</p><p>The LLMs basically work by analyzing past activity and creating user profiles. Once enough data points are available, connections can be made between similar profiles based on shared vocabulary and other clues revealed online, such as locations, hobbies, age, and so on.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Russian man investigated for extorting Conti ransomware group</title>
        <pubDate>Fri, 27 Feb 2026 13:45:31 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-russian-man-investigated-for-extorting-conti-ransomware-group/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-russian-man-investigated-for-extorting-conti-ransomware-group/</guid>
        <description><![CDATA[
          
            <p>Russian authorities have arrested a Moscow resident for posing as an FSB intelligence officer to extort and demand payments from members of the <strong>Conti</strong> ransomware group.</p><p><strong>Ruslan Satuchin</strong> was detained in October of last year and has remained in custody after authorities extended his arrest warrant in December.</p><p>According to Russian news outlet <a href="https://www.rbc.ru/society/25/02/2026/699d8a1b9a794762555ca146"><em><u>RBC</u></em></a>, the suspect contacted a Conti member in September of 2022, claiming he could prevent the FSB from investigating them for a bribe.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Is Claude Too Woke For War?</title>
        <pubDate>Thu, 26 Feb 2026 12:09:07 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-is-claude-too-woke-for-war/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-is-claude-too-woke-for-war/</guid>
        <description><![CDATA[
          
            <p>This week, US Defense Secretary Pete Hegseth <a href="https://www.axios.com/2026/02/24/anthropic-pentagon-claude-hegseth-dario"><u>delivered an ultimatum</u></a> to Anthropic that it allow unrestricted military use of its AI models by Friday or face harsh punishments. This begs the question: When it comes to military use of AI, who exactly should be setting the rules?</p><p>At issue for the Department of Defense are safeguards intended to prevent accidental or malicious use of AI. The Pentagon argues that AI is no different from any other technology and decisions about how it is used should be left to the military. </p><p>In mid-January, <a href="https://www.war.gov/News/News-Stories/Article/Article/4376486/war-department-swat-team-removes-barriers-to-efficient-ai-development/"><u>Hegseth spoke about</u></a> accelerating AI deployment within the War Department and eliminating barriers that prevent deploying the technology to the battlefield. Hegseth railed against "equitable AI, and other DEI and social justice infusions that constrain and confuse our employment of this technology… We will not employ AI models that won't allow you to fight wars."</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov</title>
        <pubDate>Wed, 25 Feb 2026 12:34:24 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-russia-starts-criminal-probe-of-telegram-founder-pavel-durov/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-russia-starts-criminal-probe-of-telegram-founder-pavel-durov/</guid>
        <description><![CDATA[
          
            <p>Russian authorities have launched a criminal investigation of Telegram founder and CEO Pavel Durov. He is allegedly charged with promoting and facilitating terrorist activity on the Telegram platform by failing to respond to law enforcement takedown requests.</p><p>The criminal probe was revealed in a long piece published on Tuesday by the official newspaper of the Russian government, the <a href="https://rg.ru/2026/02/24/telegram-ot-simvolov-cifrovoj-svobody-k-instrumentu-gibridnyh-ugroz-1.html"><em><u>Rossiyskaya Gazeta</u></em></a>.</p><p>Russian officials have accused Durov of choosing a "<em>path of violence and permissiveness</em>" by not cooperating with its law enforcement agencies.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices</title>
        <pubDate>Mon, 23 Feb 2026 11:51:20 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-ai-driven-hacking-campaign-breaches-600-fortinet-devices/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-ai-driven-hacking-campaign-breaches-600-fortinet-devices/</guid>
        <description><![CDATA[
          
            <p>A Russian-speaking financially motivated threat actor has used commercial AI toolkits to hack more than 600 Fortinet firewalls.</p><p>The campaign began at the start of the year, around January 11, according to the <a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/"><em><u>AWS security team</u></em></a>.</p><p>The attacker didn't exploit zero-days or older vulnerabilities. Instead, they targeted FortiGate devices that had their management ports exposed online, used weak passwords, and didn't have MFA enabled.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: RPKI infrastructure sits on shaky ground</title>
        <pubDate>Fri, 20 Feb 2026 13:07:51 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-rpki-infrastructure-sits-on-shaky-ground/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-rpki-infrastructure-sits-on-shaky-ground/</guid>
        <description><![CDATA[
          
            <p>The infrastructure that supports the Resource Public Key Infrastructure (RPKI) security standard is not as secure as one would believe and is prone to multiple attacks that could hinder or crash global internet routing.</p><p>A new <a href="https://www.ndss-symposium.org/ndss-paper/crack-in-the-armor-underlying-infrastructure-threats-to-rpki-publication-point-reachability/"><u>research paper</u></a> that will be presented next week at the Network and Distributed System Security (NDSS) Symposium looks at a type of server that is part of the RPKI infrastructure known as PP, standing for <strong>Publishing Point</strong>, and how attacking these servers can prevent routers from validating routing information.</p><p>The topic of internet routing and its security protocols is a complex one, so here are the main acronyms and terms that we'll be using and what they mean:</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Europe&apos;s Cyber Bullets Can&apos;t Replace Political Will</title>
        <pubDate>Thu, 19 Feb 2026 13:15:05 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-europes-cyber-bullets-cant-replace-political-will/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-europes-cyber-bullets-cant-replace-political-will/</guid>
        <description><![CDATA[
          
            <p>A groundswell of officials are calling for European countries to build cyber capabilities to  strike back against adversaries. It's a fine sentiment, but if Europe had the cojones to strike back it could have done so already with the options it currently has. </p><p>Last week, speaking on the sidelines of the Munich Security Conference, the European Commission's Executive Vice President for Tech Sovereignty, Security and Democracy, Henna Virkkunen, <a href="https://www.politico.eu/article/europe-needs-offensive-cyber-power-says-eu-tech-chief/"><u>told <em>Politico</em></u></a> that "it's not enough that we are just defending ... We also have to have offensive capacity". </p><p>At the same conference, <a href="https://therecord.media/sweden-cyber-threats-europe-permanent"><u>other European officials</u></a>, including <a href="https://therecord.media/estonia-spy-chief-calls-on-europe-to-invest-in-own-offense"><u>intelligence chiefs</u></a> expressed similar sentiments. NATO Deputy Secretary General Radmila Shekerinska <a href="https://therecord.media/nato-must-impost-costs-russia-china-cyber-hybrid-deputy-secretary"><u>said that</u></a> collectively, the alliance's objective should be, "to take action and to be able to strike back" against cyber threats. Shekerinska called out Russia and China as significant threats. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Supply chain attack plants backdoor on Android tablets</title>
        <pubDate>Wed, 18 Feb 2026 14:57:45 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-supply-chain-attack-plants-backdoor-on-android-tablets/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-supply-chain-attack-plants-backdoor-on-android-tablets/</guid>
        <description><![CDATA[
          
            <p>A supply chain attack has planted backdoors inside the firmware of multiple Android tablet makers. Incidents of tainted firmware updates have been traced back to as far as August 2023.</p><p>The firmware images were infected with a new backdoor named <strong>Keenadu</strong>.</p><p>Spotted and analyzed by Kaspersky in a <a href="https://securelist.com/keenadu-android-backdoor/118913/"><u>report</u></a> released on Tuesday, the backdoor is injected in <a href="https://source.android.com/docs/core/runtime/zygote"><u>Zygote</u></a>, the central core process of the Android operating system from where it cannot be removed without a full device flash and reinstall.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Cambodia promises to dismantle scam networks by April</title>
        <pubDate>Mon, 16 Feb 2026 14:18:15 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-cambodia-promises-to-dismantle-scam-networks-by-april/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-cambodia-promises-to-dismantle-scam-networks-by-april/</guid>
        <description><![CDATA[
          
            <p>Following growing international pressure, the Cambodian government has promised to crack down and dismantle cyber scam networks operating within its borders by April this year.</p><p>The government says it raided 190 locations in January alone, and arrested more than 2,500 suspects.</p><p>More than 110,000 foreigners who used to work in the scam compounds, by force or voluntary, have also been freed and left the country already, according to the country's<a href="https://www.information.gov.kh/articles/183676"><u> Commission for Combating Online Scams</u></a> (CCOS).</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI</title>
        <pubDate>Fri, 13 Feb 2026 13:15:07 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-icedid-malware-developer-fakes-his-own-death-to-escape-the-fbi/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-icedid-malware-developer-fakes-his-own-death-to-escape-the-fbi/</guid>
        <description><![CDATA[
          
            <p>A Ukrainian man who developed and managed the IcedID malware botnet faked his own death in an attempt to escape the FBI and jail time in the US.</p><p>The unnamed suspect bribed Ukrainian cops to falsify a dead man's documents and issue a death certificate in his name.</p><p>This happened in April 2024, a month before Europol and the FBI seized IcedID servers during <a href="https://risky.biz/risky-biz-news-law-enforcement-disrupts-six-malware-botnets/"><u>Operation Endgame</u></a>—suggesting there was either a leak in the investigation or that the suspect saw law enforcement agencies probing his servers.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Microsoft&apos;s Forgoes Its Secure Future</title>
        <pubDate>Thu, 12 Feb 2026 11:57:32 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-microsofts-forgoes-its-secure-future/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-microsofts-forgoes-its-secure-future/</guid>
        <description><![CDATA[
          
            <p>For a brief time, Microsoft appeared to be making security a priority. As with all good things, though, it appears that period has come to an end with personnel changes at the organisation signaling a shift in priorities. We fear Microsoft's goal now is not to <em>make </em>secure products, so much as to <em>sell</em> security products. </p><p>Last week, CEO Satya Nadella <a href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/"><u>announced that</u></a> Microsoft's Executive Vice President of Security Charlie Bell had been replaced by Hayete Gallot, who was most recently President of customer experience at Google Cloud. Bell is stepping back from leading Microsoft's security organisation to become an individual contributor engineer. </p><p>Now that Bell has gone, it appears the guise of "security first" has been tossed aside, and we fear the company may slip back into being a security disaster.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Chinese cyber-spies breached all of Singapore&apos;s telcos</title>
        <pubDate>Wed, 11 Feb 2026 14:07:15 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-chinese-cyber-spies-breached-all-of-singapores-telcos/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-chinese-cyber-spies-breached-all-of-singapores-telcos/</guid>
        <description><![CDATA[
          
            <p>Singapore's cybersecurity agency says that a Chinese cyber-espionage group has breached all of the country's four major telecom providers—M1, SIMBA Telecom, Singtel, and StarHub.</p><p>The Cyber Security Agency of Singapore (CSA) <a href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/"><u>attributed</u></a> the attacks to a group tracked as <strong>UNC3886</strong>.</p><p>The breaches took place last year and the agency spent 11 months with industry groups investigating and evicting the hackers from the compromised networks.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: SmarterTools hacked via its own product</title>
        <pubDate>Mon, 09 Feb 2026 13:48:36 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-smartertools-hacked-via-its-own-product/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-smartertools-hacked-via-its-own-product/</guid>
        <description><![CDATA[
          
            <p>SmarterTools, the company behind the SmarterMail email server, was hacked via a vulnerability in its own product.</p><p>The incident took place at the end of last month, on January 29.</p><p>The Warlock ransomware group breached 30 email servers running on the company's office network and inside a data center used for quality control testing.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Denmark recruits hackers for offensive cyber operations</title>
        <pubDate>Fri, 06 Feb 2026 11:30:07 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations/</guid>
        <description><![CDATA[
          
            <p>Denmark's military intelligence service has launched a campaign to recruit cybersecurity specialists for offensive cyber operations.</p><p>The recruits will work "<em>to compromise the opponents’ networks and obtain information for the benefit of Denmark’s security</em>," the Forsvarets Efterretningstjeneste (Danish Defence Intelligence Service, or DDIS) said in a <a href="https://www.fe-ddis.dk/da/nyheder/2026/fe-soger-landets-skarpeste-hoveder-til-hackerakademi/"><u>press release</u></a> last week.</p><p>The new recruits will go through a five-month training course at the agency's <a href="https://hackerakademi.dk/"><u>hacker academy</u></a>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Google&apos;s Cyber Disruption Unit Kicks Its First Goal</title>
        <pubDate>Thu, 05 Feb 2026 14:06:26 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-googles-cyber-disruption-unit-kicks-its-first-goal/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-googles-cyber-disruption-unit-kicks-its-first-goal/</guid>
        <description><![CDATA[
          
            <p>Google's <a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network"><u>announcement last week</u></a> that it had disrupted the world's largest residential proxy network, IPIDEA, was welcome news. These networks are <a href="https://www.trendmicro.com/vinfo/gb/security/news/cybercrime-and-digital-threats/the-rise-of-residential-proxies-and-its-impact-on-cyber-risk-exposure-management#:~:text=This%20research%20discusses%20how%20residential,devices%20are%20shipped%20pre%2Dinfected.&amp;text=Key%20takeaways:,them%20to%20perform%20specific%20tasks."><u>key enablers</u></a> of cybercrime, and Google's action will make a significant dent in the residential proxy ecosystem. </p><p>Residential proxy networks sell the ability to route traffic through home and business IP addresses so attackers can evade IP blocklists. Traffic in these networks is routed through everything from compromised smart devices to home users' computers. Sometimes the home users actually opt in to joining these networks, willingly installing the enabling software to earn "<a href="https://www.trendmicro.com/en_us/research/23/b/hijacking-your-bandwidth-how-proxyware-apps-open-you-up-to-risk.html"><u>passive income" from their spare bandwidth</u></a>. Most of the time, however, device owners are unaware. The proxy functionality is pre-loaded on devices or inadvertently installed via malware or trojanised software.</p><p>When it comes to IPIDEA, one way it acquired proxies was to pay developers to embed its software into applications via malicious SDKs. These applications would then proxy traffic for IPIDEA in addition to carrying out their main function, typically without the knowledge or consent of end users. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Plone CMS stops supply-chain attack</title>
        <pubDate>Wed, 04 Feb 2026 12:46:28 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-plone-cms-stops-supply-chain-attack/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-plone-cms-stops-supply-chain-attack/</guid>
        <description><![CDATA[
          
            <p><strong>Plone</strong>, a Python-based content management system, has avoided a supply chain attack at the start of this year.</p><p>A threat actor inserted malicious code in five of the organization's repositories but the modifications were spotted before they made it to any official release.</p><p>The incident was traced back to a single developer's account.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: StopICE blames hack on &quot;a CBP agent here in SoCal&quot;</title>
        <pubDate>Mon, 02 Feb 2026 13:33:46 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-stopice-blames-hack-on-a-cbp-agent-here-in-socal/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-stopice-blames-hack-on-a-cbp-agent-here-in-socal/</guid>
        <description><![CDATA[
          
            <p><strong>StopICE</strong>, an app that lets Americans track the location of US Immigration and Customs Enforcement (ICE) raids, has played down a recent security breach and claims to have <a href="https://www.stopice.net/news/server_attack_against_stopicenet_traced_to_local_cbp_agents_personal_server"><u>linked the hack</u></a> to "<em>a personal server associated with a CBP agent here in SoCal</em>."</p><p>Administrators said this wasn't the first time the same agent tried to hack or disrupt their systems.</p><p>The latest incident took place <a href="https://old.reddit.com/r/ICE_Watch/comments/1qr6vxs/help_i_just_received_this_text_from_the_phone/"><u>on Friday</u></a> when users started receiving SMS alerts warning them to uninstall the app.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack</title>
        <pubDate>Fri, 30 Jan 2026 10:13:28 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-escan-antivirus-distributes-backdoor-in-latest-supply-chain-attack/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-escan-antivirus-distributes-backdoor-in-latest-supply-chain-attack/</guid>
        <description><![CDATA[
          
            <p>Cybersecurity firm MicroWorld Technologies, the maker of the <strong>eScan antivirus</strong>, has fallen victim to a cyberattack after an unidentified threat actor breached its software update infrastructure and deployed malware to customer environments.</p><p>The incident took place last week, on January 20, and only lasted for about an hour, according to reports from rival security firms <a href="https://www.morphisec.com/blog/critical-escan-threat-bulletin/"><u>Morphisec</u></a> and <a href="https://securelist.com/escan-supply-chain-attack/118688/"><u>Kaspersky</u></a>, both of which spotted the malware being delivered to customer systems.</p><p>The final payload in the attack was a new backdoor hidden in the <em>Reload.exe</em> file that modified the eScan configuration to disable future updates and established a scheduled task for persistence on the infected host.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Punish the Wicked, Reward the Righteous</title>
        <pubDate>Thu, 29 Jan 2026 13:16:30 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-punish-the-wicked-reward-the-righteous/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-punish-the-wicked-reward-the-righteous/</guid>
        <description><![CDATA[
          
            <p>The <a href="https://www.gov.uk/government/publications/the-pall-mall-process-declaration-tackling-proliferation-and-irresponsible-use-of-commercial-cyber-intrusion-capabilities/the-pall-mall-process-tackling-the-proliferation-and-irresponsible-use-of-commercial-cyber-intrusion-capabilities"><u>Pall Mall Process</u></a>, an international effort to reign in abusive commercial spyware, is turning its efforts toward developing opt-in industry standards. </p><p>These kinds of voluntary, non-binding standards are all well and good, but relatively useless without strong government action.</p><p><em>CyberScoop</em> has a <a href="https://cyberscoop.com/industry-government-nonprofits-weigh-voluntary-rules-for-commercial-hacking-tools/"><u>good wrap</u></a> of issues raised at a Chatham House discussion about the process in Washington DC last weekend. The topics included who the rules would apply to, plus "how to incentivize and measure compliance and what to do with companies with a chequered past". </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Cyberattack cripples cars across Russia</title>
        <pubDate>Wed, 28 Jan 2026 08:16:27 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-cyberattack-cripples-cars-across-russia/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-cyberattack-cripples-cars-across-russia/</guid>
        <description><![CDATA[
          
            <p>A cyberattack has wreaked havoc across Russia on Monday after the servers of the Delta smart alarm system went down.</p><p>Per reports in <a href="https://www.kommersant.ru/doc/8378156"><u>local</u></a> <a href="https://t.me/bazabazon/43672?embed=1&amp;mode=tme"><u>media</u></a>, car owners using Delta's alarm system couldn't unlock cars or stop active alarms. In some cases, owners couldn't start engines or their engines <a href="https://www.kommersant.ru/doc/8378961"><u>jammed while driving</u></a>.</p><p>The company <a href="https://t.me/go_delta/82?embed=1&amp;mode=tme"><u>confirmed</u></a> the incident but did not provide other details besides calling it a "<em>large-scale external attack</em>."</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: EU readies new anti-spyware group, but with even less powers than PEGA</title>
        <pubDate>Mon, 26 Jan 2026 10:24:54 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-eu-readies-new-anti-spyware-group-but-with-even-less-powers-than-pega/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-eu-readies-new-anti-spyware-group-but-with-even-less-powers-than-pega/</guid>
        <description><![CDATA[
          
            <p>The European Parliament has set up a new internal group tasked with investigating the use of spyware across the EU member bloc.</p><p>The new intergroup was set up last week in the aftermath of the Paragon spying scandal in Italy by Sandro Ruotolo, an Italian journalist and current member of the European Parliament for the Group of the Progressive Alliance of Socialists and Democrats.</p><p>According to <a href="https://www.wired.it/article/spyware-in-europa-caso-paragon/"><em><u>WIRED Italy</u></em></a>, Ruotolo will be joined by three other MEPs.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls</title>
        <pubDate>Fri, 23 Jan 2026 09:44:13 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-improperly-patched-bug-exploited-again-in-fortinet-firewalls/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-improperly-patched-bug-exploited-again-in-fortinet-firewalls/</guid>
        <description><![CDATA[
          
            <p>Threat actors have mounted a new wave of attacks against Fortinet's FortiGate firewalls using a vulnerability that was improperly patched last month.</p><p>Security firm <a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/"><u>Arctic Wolf says</u></a> hackers are bypassing Single Sign-On (SSO) authentication using generic usernames, creating their own admin account for future access, and stealing the device's current configuration file.</p><p>Since the attacks were first being reported online, Fortinet has <a href="https://old.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/"><u>confirmed</u></a> in private emails to some customers that the attackers have found a new way to exploit <a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-647"><u>CVE-2025-59718</u></a>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: You Can&apos;t Block Space Internet</title>
        <pubDate>Thu, 22 Jan 2026 12:48:58 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-you-cant-block-space-internet/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-you-cant-block-space-internet/</guid>
        <description><![CDATA[
          
            <p>Amid ongoing domestic unrest and a <a href="https://www.bbc.com/news/articles/cj9rengvnp9o"><u>violent government crackdown</u></a> in Iran, the country’s government imposed an internet blackout. This shutdown, which began on Thursday January 8 is <a href="https://mastodon.social/@netblocks/115932001577902382"><u>still</u></a> in effect at time of writing.</p><p>During the shutdown some Iranians have been using SpaceX's <a href="https://starlink.com/"><u>Starlink satellite service</u></a> to <a href="https://www.nbcnews.com/tech/tech-news/iran-internet-blackout-spacex-starlink-lifeline-rcna254030"><u>connect with</u></a> the outside world. <a href="https://www.nytimes.com/2026/01/15/technology/iran-online-starlink.html"><u>According to</u></a> the <em>New York Times</em>, this didn't happen by chance. It was the result of deliberate planning:</p><p>Compared to domestic ISPs that the Iranian government can force to stop internet access, blocking Starlink is much more difficult. So far the government’s measures have included warnings to the public that possessing Starlink systems is a crime, using drones to find and confiscate terminals, and electronic jamming, <a href="https://www.euronews.com/next/2026/01/14/iran-could-be-blocking-starlink-during-internet-blackout-with-methods-similar-to-russia"><u>possibly using</u></a> Russian-provided equipment. In addition to jamming the frequencies Starlink operates on, GPS spoofers degrade the service, as terminals rely on accurate location information to direct their antennas correctly. The efforts have proven partly effective.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Domain resurrection attacks come to Canonical&apos;s Snap Store</title>
        <pubDate>Wed, 21 Jan 2026 12:50:26 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-domain-resurrection-attacks-come-to-canonicals-snap-store/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-domain-resurrection-attacks-come-to-canonicals-snap-store/</guid>
        <description><![CDATA[
          
            <p>A threat actor is registering expired web domains in order to take over email servers, reset passwords on abandoned developer accounts, and publish malware on the Canonical Snap Store for Linux packages.</p><p>At least two developer accounts have been hijacked using this technique, also known as a <strong>domain resurrection attack</strong>, namely for Snap packages published using email addresses from <em>storewise.tech</em> and <em>vagueentertainment.com</em>.</p><p>According to Linux expert and former Canonical dev <a href="https://blog.popey.com/2026/01/malware-purveyors-taking-over-published-snap-email-domains/"><u>Alan Pope</u></a>, the threat actor behind this campaign is a group he believes are located in Croatia.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Germany seeks more hacking and surveillance powers for its intel service</title>
        <pubDate>Mon, 19 Jan 2026 09:54:09 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-germany-seeks-more-hacking-and-surveillance-powers-for-its-intel-service/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-germany-seeks-more-hacking-and-surveillance-powers-for-its-intel-service/</guid>
        <description><![CDATA[
          
            <p>German lawmakers are working on a new law that will grant the country's intelligence agency new and extensive hacking and surveillance powers.</p><p>The primary intent of the new law is to free up the Bundesnachrichtendienst (BND) from relying on the US National Security Agency (NSA) for threat information and bring its interception capabilities on par with other European countries, such as France, Italy, the Netherlands, and the UK.</p><p>According to a draft of the new law obtained by <a href="https://www.sueddeutsche.de/politik/innere-sicherheit-hacking-bnd-geheimdienst-bnd-gesetz-vorratsdatenspeicherung-li.3364665"><u>German media</u></a>, the BND will have the power to intercept full internet communications and not just metadata as it is allowed today.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: DRAM price hikes set to impact firewalls too</title>
        <pubDate>Fri, 16 Jan 2026 10:10:26 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-dram-price-hikes-set-to-impact-firewalls-too/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-dram-price-hikes-set-to-impact-firewalls-too/</guid>
        <description><![CDATA[
          
            <p>The current price hikes and supply shortage of DRAM memory chips are expected to also impact firewall makers and the cybersecurity market.</p><p>Powerful DRAM is a crucial component for the manufacturing of modern next-gen firewalls, a staple in the cybersecurity defense of any major enterprise.</p><p>Investment advisory firm <a href="https://seekingalpha.com/news/4538354-fortinet-check-point-could-face-headwinds-as-dram-prices-impact-buildouts-of-firewalls-wedbush"><u>Wedbush says</u></a> firewall companies will see thinner margins this year due to the rising DRAM costs. This will impact their bills of materials, with the extra costs being passed down to customers as product price increases. This will likely lead to lower sales, smaller profit margins, and weaker investor yields.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>China Fights Scam Compounds … For China</title>
        <pubDate>Thu, 15 Jan 2026 13:11:53 +1100</pubDate>
        <link>https://risky.biz/china-fights-scam-compounds-for-china/</link>
        <guid isPermaLink="true">https://risky.biz/china-fights-scam-compounds-for-china/</guid>
        <description><![CDATA[
          
            <p>China's recent crack down on Southeast Asian scam compounds is clearly good news. But its efforts to tackle the scourge are domestically driven and may even cause scammers to shift their focus to Americans. </p><p>Last week <a href="https://edition.cnn.com/2026/01/07/asia/chen-zhi-arrest-extradition-cambodia-china-intl-hnk"><u>authorities announced</u></a> that an alleged scam kingpin, Chen Zhi, had been arrested by Cambodian authorities and extradited to China. Chen is the founder of the Prince Group, which is ostensibly a Cambodian corporate conglomerate, but which <a href="https://www.justice.gov/usao-edny/media/1416266/dl"><u>US authorities allege</u></a> was a transnational criminal organisation that operated forced-labour scam compounds engaging in various fraud schemes. </p><p>US authorities had taken action against Chen Zhi. Back in October of last year, he was <a href="https://www.nbcnewyork.com/news/local/crime-and-courts/cambodian-exec-charged-crypto-scam-14-billion-bitcoin/6404673/"><u>sanctioned and indicted</u></a> and had a whopping USD$15 billion worth of cryptocurrency seized by the US. But China had the regional clout to actually get him in handcuffs. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Voice cloning defenses still weak, can be bypassed</title>
        <pubDate>Wed, 14 Jan 2026 14:31:37 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-voice-cloning-defenses-still-weak-can-be-bypassed/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-voice-cloning-defenses-still-weak-can-be-bypassed/</guid>
        <description><![CDATA[
          
            <p>Modern security systems designed to protect user voices from getting cloned are still weak and can be bypassed with the proper tools.</p><p>These systems work by injecting random noise in voice audio recordings in order to prevent AI-based cloning technology from copying a user's voice. Voice cloning attacks are still possible, but they produce low quality output that can be easily detected and flagged by both manual reviewers and automated systems.</p><p>But three researchers from the University of Texas, in San Antonio, say that these systems are not complex enough and can be easily bypassed if attackers account for the added noise.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Apex Legends streamers hacked again</title>
        <pubDate>Mon, 12 Jan 2026 09:40:27 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-apex-legends-streamers-hacked-again/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-apex-legends-streamers-hacked-again/</guid>
        <description><![CDATA[
          
            <p>Respawn Entertainment has patched an exploit in the Apex Legends game that allowed third-parties to take remote control over a player's in-game character.</p><p>The exploit was used against several Apex streamers over the past week.</p><p>Hackers emptied their inventory (backpack) and moved their in-game avatar off the map, ending their games.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Major scam kingpin arrested in Cambodia, extradited to China</title>
        <pubDate>Fri, 09 Jan 2026 05:40:02 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-major-scam-kingpin-arrested-in-cambodia-extradited-to-china/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-major-scam-kingpin-arrested-in-cambodia-extradited-to-china/</guid>
        <description><![CDATA[
          
            <p><strong>China hacks US House committees:</strong> Chinese hacking group Salt Typhoon has hacked the email systems used by congressional staff on multiple committees in the US House of Representatives. [<a href="https://www.ft.com/content/44f730c4-7de3-4a09-88dd-41ea9c373dcb"><em><u>Financial Times</u></em></a>]</p><p><strong>Jaguar sales slump after cyberattack:</strong> Jaguar Land Rover <a href="https://media.jaguarlandrover.com/news/2026/01/jlr-q3-sales-impacted-cyber-incident-previously-indicated"><u>says</u></a> its sales fell by 43% in Q3 following a ransomware attack that stopped production at its factories last fall for almost a month.</p><p><strong>Sedgwick ransomware incident:</strong> IT company Sedgwick has confirmed that a ransomware attack has impacted its government contracting subsidiary over the New Year's Eve. The incident was claimed by the TridentLocker ransomware gang. [<a href="https://therecord.media/sedgwick-cyber-incident-ransomware"><em><u>The Record</u></em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: US lifts sanctions on three Intellexa execs</title>
        <pubDate>Fri, 02 Jan 2026 04:48:35 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-us-lifts-sanctions-on-three-intellexa-execs/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-us-lifts-sanctions-on-three-intellexa-execs/</guid>
        <description><![CDATA[
          
            <p><strong>R6S hacked:</strong> A threat actor hacked the backend servers of Ubisoft's Rainbow Six Siege FPS game and assigned billions in in-game currency to user accounts. Ubisoft confirmed the breach, took down servers, and rolled back the bans for users who received the currency and were automatically flagged and banned by the backend. The hack was linked to a MongoDB vulnerability known as MongoBleed, CVE-2025-14847, disclosed two days before Christmas and which very few companies had a chance to patch. [<a href="https://www.dexerto.com/rainbow-six/rainbow-six-siege-hacked-as-attackers-give-players-billions-of-in-game-currency-ubisoft-responds-3298216/"><em><u>Dexerto</u></em></a>]</p><p><strong>Conde Nast gets hacked: </strong>A hacker breached news powerhouse Conde Nast and leaked the data of 2.3 million WIRED subscribers. The newest data points are from September 2024, the date of the presumed breach. Conde Nast has yet to confirm due to the winter holiday break. [<a href="https://databreaches.net/2025/12/25/conde-nast-gets-hacked-and-databreaches-gets-played-christmas-lump-of-coal-edition/"><em><u>DataBreaches.net</u></em></a>]</p><p><strong>ESA breach:</strong> Hackers breached the JIRA and Bitbucket servers of the European Space Agency (<a href="https://x.com/esa/status/2005938460448715055"><u>ESA</u></a>). [<a href="https://www.bleepingcomputer.com/news/security/european-space-agency-confirms-breach-of-external-servers/"><em><u>BleepingComputer</u></em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Georgia arrests ex-security chief over bribes from scam call centers</title>
        <pubDate>Fri, 26 Dec 2025 02:29:57 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-georgia-arrests-ex-security-chief-over-bribes-from-scam-call-centers/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-georgia-arrests-ex-security-chief-over-bribes-from-scam-call-centers/</guid>
        <description><![CDATA[
          
            <p><strong>Docker Hardened Images are now free:</strong> Docker has made Hardened Images <a href="https://www.docker.com/blog/docker-hardened-images-for-every-developer/"><u>free for every developer</u></a>. These are server images managed by Docker that are constantly updated and patched for the most recent security flaws. Devs previously needed some sort of subscription to use Hardened Images.</p><p><strong>Piracy group leaks Spotify song database:</strong> A piracy and open-source group named Anna's Archive has <a href="https://annas-archive.org/blog/backing-up-spotify.html"><u>leaked</u></a> 256 million Spotify tracks. <a href="https://therecord.media/spotify-disables-scraping-annas"><u>Spotify said</u></a> it found and suspended the accounts that scraped its site.</p><p><strong>TikTok signs divest deal:</strong> Chinese social media network TikTok has signed a deal to divest and sell its US division to a group of Trump allies.	More than half the company is now owned by tech company Oracle, private equity firm Silver Lake, and Emirati-backed investment firm MGX. ByteDance and existing shareholders hold the rest. [<a href="https://edition.cnn.com/2025/12/18/tech/tiktok-signs-us-sale-deal"><em><u>CNN</u></em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Belarus deploys spyware on journalists&apos; phones</title>
        <pubDate>Fri, 19 Dec 2025 13:22:59 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-belarus-deploys-spyware-on-journalists-phones/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-belarus-deploys-spyware-on-journalists-phones/</guid>
        <description><![CDATA[
          
            <p>Belarusian authorities are deploying spyware on the smartphones of local journalists during police interrogations.</p><p>The <strong>ResidentBat</strong> spyware was spotted this year after a reporter who was interrogated by the Belarusian KGB intelligence service started receiving malware alerts on his device, days after being questioned by authorities.</p><p>The spyware can collect call logs, record through the microphone, take screen captures, collect SMS messages and messages from encrypted messaging apps, and exfiltrate local files.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: Dumb and Dumber, Russia&apos;s State-Backed &quot;Hacktivists&quot;</title>
        <pubDate>Thu, 18 Dec 2025 11:16:08 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-dumb-and-dumber-russias-state-backed-hacktivists/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-dumb-and-dumber-russias-state-backed-hacktivists/</guid>
        <description><![CDATA[
          
            <p>Last week, the US revealed the Russian government had used two state-backed hacktivist groups to carry out disruptive attacks against critical infrastructure worldwide.</p><p>The history and activities of the CyberArmyofRussia_Reborn (CARR) and NoName057(16) (NoName), were described in indictments and sanctions announced by the <a href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal"><u>US Department of Justice</u></a> and <a href="https://home.treasury.gov/news/press-releases/jy2473"><u>Treasury</u></a> respectively, and in a <a href="https://www.cisa.gov/sites/default/files/2025-12/aa25-343a-pro-russia-hacktivists-conduct-attacks.pdf"><u>joint advisory published by CISA</u></a>. </p><p>The US says that the CARR was "founded, funded and directed" by Russian military intelligence (<a href="https://en.wikipedia.org/wiki/GRU_(Russian_Federation)"><u>the GRU</u></a>) as an unattributable way of deterring anti-Russia rhetoric. The group was founded in early 2022 shortly after Russia's invasion of Ukraine, started out with DDoS attacks and over time has escalated to attacks on <a href="https://www.ncsc.gov.uk/collection/operational-technology"><u>operational technology</u></a> (OT) systems. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Most smart devices run outdated web browsers</title>
        <pubDate>Wed, 17 Dec 2025 11:46:56 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-most-devices-run-outdated-web-browsers/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-most-devices-run-outdated-web-browsers/</guid>
        <description><![CDATA[
          
            <p>An academic study by a team of Belgian researchers has found that most of today's smart devices come with an embedded web browser that runs extremely out of date versions, sometimes as much as three years.</p><p>The study, from the Catholic University in Leuven, Belgium (<a href="https://nieuws.kuleuven.be/nl/2025/veroudering-ingebouwde-webbrowsers-leidt-tot-veiligheidsrisicos"><u>KU Leuven</u></a>), looked at browsers that ship with smart TVs, e-readers, gaming consoles, and other modern hardware.</p><p>All five e-readers that were tested, and 24 of 35 smart TV models, used embedded browsers that were at least three years behind current versions.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: African freelancers behind anti-US and anti-French disinfo campaigns</title>
        <pubDate>Mon, 15 Dec 2025 13:05:34 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-african-freelancers-behind-anti-us-and-anti-french-disinfo-campaigns/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-african-freelancers-behind-anti-us-and-anti-french-disinfo-campaigns/</guid>
        <description><![CDATA[
          
            <p>Meta's security team has shut down a disinformation network spreading Russian propaganda across Africa.</p><p>The network has been active for more than six months and was run by Russia-based entities, the company said in its <a href="https://transparency.meta.com/metasecurity/threat-reporting"><u>quarterly security report</u></a> [<a href="https://scontent-lhr8-2.xx.fbcdn.net/v/t39.8562-6/596429529_1345798573940735_2519516052002087887_n.pdf?_nc_cat=106&amp;ccb=1-7&amp;_nc_sid=b8d81d&amp;_nc_ohc=Tx74NB4UWvsQ7kNvwGqiHIk&amp;_nc_oc=Admvk0_FIn0VCVZqTGRl-GdS-4RumhlqMklJI9TENmFvGeudbuB2mDEjvdZkOohGaJQ&amp;_nc_zt=14&amp;_nc_ht=scontent-lhr8-2.xx&amp;_nc_gid=uEF4exU35I7NhcHWPMuPkw&amp;oh=00_AflBeOWQtolBszFOIbdAmxmAk6rHEKq436wwLLHNps9UNA&amp;oe=6942ECB1"><em><u>PDF</u></em></a>].</p><p>The network ran over 65 accounts and 70 pages that mimicked legitimate news outlets and published content critical of France and the US and promoted Russian geopolitical narratives.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: EU has a problem attracting and retaining cyber talent</title>
        <pubDate>Fri, 12 Dec 2025 14:13:16 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-eu-has-a-problem-attracting-and-retaining-cyber-talent/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-eu-has-a-problem-attracting-and-retaining-cyber-talent/</guid>
        <description><![CDATA[
          
            <p>Public and private critical sector organizations across the EU are having issues attracting and retaining cybersecurity talent.</p><p>According to a <a href="https://www.enisa.europa.eu/publications/nis-investments-2025"><u>survey</u></a> by the EU's cybersecurity agency, candidates don't have the necessary skills or the employers don't have the proper training programs.</p><p>Cyber experts who leave companies cite excessive workloads, burnout, and the lack of competitive salaries and bonuses.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers</title>
        <pubDate>Wed, 10 Dec 2025 11:20:54 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-linux-adds-pcie-encryption-to-help-secure-cloud-servers/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-linux-adds-pcie-encryption-to-help-secure-cloud-servers/</guid>
        <description><![CDATA[
          
            <p>The Linux kernel is adding support for a new security feature designed to help secure cloud server infrastructure.</p><p>Support for <a href="https://lore.kernel.org/lkml/69339e215b09f_1e0210057@dwillia2-mobl4.notmuch/"><u>PCI Express Link Encryption</u></a> will roll out with the upcoming release of the Linux kernel, version 6.19.</p><p>The new feature was developed together by representatives from chipmakers Intel, AMD, and Arm.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: APTs go after the React2Shell vulnerability within hours</title>
        <pubDate>Mon, 08 Dec 2025 10:44:13 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-apts-go-after-the-react2shell-vulnerability-within-hours/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-apts-go-after-the-react2shell-vulnerability-within-hours/</guid>
        <description><![CDATA[
          
            <p>At least two Chinese APT groups are exploiting a recently disclosed vulnerability in the React framework's server components.</p><p>Attacks began within hours after the vulnerability, tracked as <a href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components"><u>CVE-2025-55182</u></a> and named <strong>React2Shell</strong>, was disclosed last Wednesday.</p><p>The <a href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/"><u>AWS security team</u></a> has linked the attacks to two groups tracked as <strong>Earth Lamia</strong> and <strong>Jackpot Panda</strong>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Srsly Risky Biz: When Do Cyber Campaigns Cross a Line?</title>
        <pubDate>Thu, 04 Dec 2025 11:24:04 +1100</pubDate>
        <link>https://risky.biz/srsly-risky-biz-when-do-cyber-campaigns-cross-a-line/</link>
        <guid isPermaLink="true">https://risky.biz/srsly-risky-biz-when-do-cyber-campaigns-cross-a-line/</guid>
        <description><![CDATA[
          
            <p>A <a href="https://www.interface-eu.org/publications/cyber-red-flags#red-flag-3-intervening-in-domestic-political-processes"><u>new paper</u></a> from the Germany-based think tank Interface has attempted to define the threshold at which peacetime state cyber operations become irresponsible. </p><p>The author thinks that more concrete definitions of responsible behaviour would help guide states and prevent dangerous conduct.  </p><p>It's a commendable effort, but we don't think the architects of cyber operations really care about norms, and a German think tank writing down its preferred rules on a piece of paper won't make any difference to state behaviour. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: India orders IM apps to link user accounts to a SIM card</title>
        <pubDate>Wed, 03 Dec 2025 03:01:12 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-india-orders-im-apps-to-link-user-accounts-to-a-sim-card/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-india-orders-im-apps-to-link-user-accounts-to-a-sim-card/</guid>
        <description><![CDATA[
          
            <p><strong>OpenAI security incident:</strong> <a href="https://openai.com/index/mixpanel-incident/"><u>OpenAI says</u></a> some customer data was exposed during a breach at Mixpanel, a third-party analytics provider.</p><p><strong>French Football Federation breach:</strong> The <a href="https://www.fff.fr/article/15831-communique-du-26-novembre-relatif-au-vol-de-donnees.html"><u>French Football Federation says</u></a> hackers gained access to a software panel used by French football clubs to manage their licenses.</p><p><strong>West London ransomware attack:</strong> A <a href="https://cyberplace.social/@GossiTheDog/115612026740391366"><u>ransomware attack</u></a> on a shared IT provider has brought down the networks of three city councils in West London—Royal Borough of Kensington and Chelsea, London Borough of Hammersmith and Fulham, and Westminster City Council. [<a href="https://www.mylondon.news/news/east-london-news/london-councils-cyber-attack-live-32940473"><em><u>MyLondon</u></em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>DeepSeek and Musk&apos;s Grok Both Toe the Party Line</title>
        <pubDate>Thu, 27 Nov 2025 13:21:45 +1100</pubDate>
        <link>https://risky.biz/deepseek-and-musks-grok-both-toe-the-party-line/</link>
        <guid isPermaLink="true">https://risky.biz/deepseek-and-musks-grok-both-toe-the-party-line/</guid>
        <description><![CDATA[
          
            <p>The Chinese-made DeepSeek-R1 AI model <a href="https://www.crowdstrike.com/en-us/blog/crowdstrike-researchers-identify-hidden-vulnerabilities-ai-coded-software/"><u>produces more insecure code</u></a> when prompts mention subjects considered sensitive to the Chinese Communist Party (CCP), according to recent research from Crowdstrike. </p><p>CrowdStrike's testing compared the security of code produced by DeepSeek with that of other state-of-the-art Large Language Models (LLMs). In the baseline test, the models were given straightforward prompts to produce code to carry out a particular task. </p><p>They were then given the same base prompt with additional information that CrowdStrike described as a "contextual modifier" and/or a "geopolitical trigger".</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Sha1-Hulud npm worm returns, with destructive behavior</title>
        <pubDate>Wed, 26 Nov 2025 03:15:02 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-sha1-hulud-npm-worm-returns-with-destructive-behavior/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-sha1-hulud-npm-worm-returns-with-destructive-behavior/</guid>
        <description><![CDATA[
          
            <p><strong>Another Salesforce breach:</strong> Hackers are pilfering data from Salesforce customers again, this time after they've breached Gainsight, the maker of a Salesforce app. More than 200 customers were affected. The Scattered Lapsus$ Hunters group took credit for the hack, the same group that breached Salesforce earlier this year as well. [<a href="https://status.salesforce.com/generalmessages/20000233"><em>Salesforce</em></a>//<a href="https://techcrunch.com/2025/11/21/google-says-hackers-stole-data-from-200-companies-following-gainsight-breach/"><em>TechCrunch</em></a>]</p><p><strong>CrowdStrike fires malicious insider:</strong> Security firm CrowdStrike has fired an employee who was feeding information to the Scattered Lapsus$ Hunters hacking group. The company discovered the insider after screenshots of its internal systems were posted on the group's Telegram channel. [<a href="https://www.bleepingcomputer.com/news/security/crowdstrike-catches-insider-feeding-information-to-hackers/"><em>BleepingComputer</em></a>]</p><p><strong>SitusAMC hack impacts Wall Street:</strong> Hackers have stolen sensitive data from fintech company <a href="https://www.situsamc.com/databreach">SitusAMC</a>. Its main customers include banks and real estate loan platforms. [<a href="https://edition.cnn.com/2025/11/23/business/situsamc-hack-wall-street-banks"><em>CNN</em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>AI-Powered Espionage Will Favor China</title>
        <pubDate>Thu, 20 Nov 2025 12:59:45 +1100</pubDate>
        <link>https://risky.biz/ai-powered-espionage-will-favor-china/</link>
        <guid isPermaLink="true">https://risky.biz/ai-powered-espionage-will-favor-china/</guid>
        <description><![CDATA[
          
            <p>Last week, Anthropic revealed a real-world, AI-orchestrated cyber espionage campaign. There's a real speed and scale benefit here for malicious actors that care more about hacking everything than flying under the radar. Western governments, however, will likely stick to the tried and tested method of "slowly, slowly, catchy monkey".</p><p>In the report, Anthropic <a href="https://www.anthropic.com/news/disrupting-AI-espionage"><u>detailed its discovery of</u></a> the campaign that used AI "not just as an advisor, but to execute the cyberattacks themselves". </p><p>Anthropic believes the threat actor was a Chinese state-sponsored group whose goals align with those of the Chinese <a href="https://en.wikipedia.org/wiki/Ministry_of_State_Security_(China)"><u>Ministry of State Security</u></a>. The group attempted to infiltrate "roughly thirty" typical victims: large tech companies, financial institutions, chemical manufacturing companies and government agencies. It succeeded in a small number of cases. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Microsoft will integrate Sysmon into Windows</title>
        <pubDate>Wed, 19 Nov 2025 13:09:46 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-microsoft-will-integrate-sysmon-into-windows/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-microsoft-will-integrate-sysmon-into-windows/</guid>
        <description><![CDATA[
          
            <p><strong>Russian surveillance vendor got hacked:</strong> An unidentified threat actor has hacked and leaked sensitive data from Protei, a Russian company that makes telecom-grade surveillance gear, including equipment for Russia's SORM system. [<a href="https://techcrunch.com/2025/11/17/surveillance-tech-provider-protei-was-hacked-its-data-stolen-and-its-website-defaced/"><em>TechCrunch</em></a>]</p><p><strong>Cyberattack disrupts Russian port operator:</strong> A cyberattack has crippled the operations of Port Alliance, a Russian company that manages cargo terminals at six Russian ports. The incident lasted days and disrupted Russian coal and fertilizer shipments. [<a href="https://therecord.media/cyberattack-on-russian-port-operator"><em>The Record</em></a>]</p><p><strong>NHS impacted by Oracle zero-days:</strong> The UK National Health Service (NHS) has joined a long list of companies that were hacked using an Oracle EBS zero-day this summer. [<a href="https://www.securityweek.com/nhs-investigating-oracle-ebs-hack-claims-as-hackers-name-over-40-alleged-victims/"><em>SecurityWeek</em></a>]</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys infrastructure</title>
        <pubDate>Fri, 14 Nov 2025 13:58:30 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-europol-takes-down-elysium-venomrat-and-rhadamanthys-infrastructure/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-europol-takes-down-elysium-venomrat-and-rhadamanthys-infrastructure/</guid>
        <description><![CDATA[
          
            <p><a href="https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down">Europol</a> and <a href="https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-011/">law</a> <a href="https://www.eurojust.europa.eu/news/authorities-continue-protect-citizens-cybercriminals-during-major-malware-operation">enforcement</a> <a href="https://www.politie.nl/nieuws/2025/november/12/11-opnieuw-criminele-infrastructuur-ontmanteld-in-internationale-ransomware-operatie.html">agencies</a> from more than 30 countries have seized servers, domains, and Telegram channels for three malware services—the <strong>Rhadamanthys</strong> infolstealer, the <strong>VenomRAT</strong>, and the <strong>Elysium</strong> botnet.</p><p>Authorities say the three malware strains infected <strong>hundreds of thousands of users</strong> and stole <strong>millions of credentials</strong>. The stolen credentials were later used to deploy ransomware or steal cryptocurrency.</p><p>The takedown was part of <a href="https://operation-endgame.com/">Operation Endgame</a>, an Europol-led project that began in 2023 and targets criminal infrastructure that is used to enable ransomware attacks.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Reuters Blows Lid on Meta&apos;s Fraud Profit Scandal</title>
        <pubDate>Thu, 13 Nov 2025 12:44:25 +1100</pubDate>
        <link>https://risky.biz/reuters-blows-lid-on-metas-fraud-profit-scandal/</link>
        <guid isPermaLink="true">https://risky.biz/reuters-blows-lid-on-metas-fraud-profit-scandal/</guid>
        <description><![CDATA[
          
            <p>In an <a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/"><u>eye-popping investigation</u></a>, <em>Reuters </em>has revealed that Meta had projected its 2024 advertisements for scams and banned goods would bring in about USD$16 billion or 10% of its total revenue. </p><p>The report is based on a cache of documents reviewed by <em>Reuters</em>.</p><p>In one of those documents, Meta's safety staff estimated that the company's platforms were "involved" in a third of all successful scams in the US. That's a stunning figure. But we do wonder how much of that involvement is simply WhatApp being used to talk to victims. If advertisements weren't the bait that lured victims, it hardly seems fair to blame Meta for running an end-to-end encrypted messaging app. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Another Chinese security firm has its data leaked</title>
        <pubDate>Wed, 12 Nov 2025 10:23:53 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-another-chinese-security-firm-has-its-data-leaked/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-another-chinese-security-firm-has-its-data-leaked/</guid>
        <description><![CDATA[
          
            <p>More than <strong>12,000 internal documents</strong> were leaked online from Chinese security firm <strong>KnownSec</strong>.</p><p>The files were uploaded last week on GitHub by an unknown individual and later removed before the repo got any widespread circulation.</p><p>According to analyses from <a href="https://mrxn.net/news/Knownsec-data-leak.html">Mrxn</a> and <a href="https://substack.com/inbox/post/178189244">NetAskari</a>, who got their hands on the leak, the most recent documents are from 2023. This suggests this was likely when the files were stolen/exfiltrated from the company's network, or at least someone intentionally truncated the leak to keep the most recent files for themselves.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Yanluowang ransomware IAB pleads guilty</title>
        <pubDate>Mon, 10 Nov 2025 13:50:17 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-yanluowang-ransomware-iab-pleads-guilty/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-yanluowang-ransomware-iab-pleads-guilty/</guid>
        <description><![CDATA[
          
            <p>A Russian man has pleaded guilty to hacking US companies and selling access to ransomware groups.</p><p><strong>Aleksei Olegovich Volkov</strong> went online under the hacker name of <strong><em>chubaka.kor</em></strong>, and worked as an initial access broker (IAB) for the Yanluowang ransomware.</p><p>Volkov used various techniques to breach a corporate employee's account, escalate access to the employer's network, and then sold that access to other cyber criminals.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Europol arrests payment service executives for role in credit card fraud ring</title>
        <pubDate>Fri, 07 Nov 2025 12:58:57 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-europol-arrests-payment-service-executives-for-role-in-credit-card-fraud-ring/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-europol-arrests-payment-service-executives-for-role-in-credit-card-fraud-ring/</guid>
        <description><![CDATA[
          
            <p>Law enforcement agencies from Europe, Asia, and North America have dismantled a massive credit card fraud network that stole money from users using unwanted online subscriptions.</p><p>Eighteen suspects were arrested for defrauding users of more than <strong>€300 million</strong> since <strong>2016</strong>.</p><p>According to <a href="https://www.europol.europa.eu/media-press/newsroom/news/operation-chargeback-43-million-cardholders-affected-eur-300-million-in-damages"><em>Europol</em></a><em> </em>and <a href="https://www.eurojust.europa.eu/news/eurojust-coordinates-major-operation-against-eur-300-million-global-credit-card-fraud-18"><em>Eurojust</em></a>, the group stole credit card data, created accounts on online websites with the stolen information, and subscribed users to premium services.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>The Cyber Regime Change Pipe Dream</title>
        <pubDate>Thu, 06 Nov 2025 13:07:05 +1100</pubDate>
        <link>https://risky.biz/the-cyber-regime-change-pipe-dream/</link>
        <guid isPermaLink="true">https://risky.biz/the-cyber-regime-change-pipe-dream/</guid>
        <description><![CDATA[
          
            <p>Disruptive US cyber operations against Venezuela during President Trump's first term achieved their operational goals, according to <a href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia"><u>new reporting</u></a> from <em>CNN</em>. But they failed to meet the president's broader goal of ousting Venezuelan leader Nicolás Maduro</p><p>Sources told <em>CNN </em>that during Trump's first term a CIA operation to disable the computer network of Maduro's intelligence service was perfectly successful. A separate Cyber Command operation interrupted the satellite communications of Wagner Group mercenaries who <a href="https://www.businessinsider.com/russia-linked-military-contractors-in-venezuela-to-protect-maduro-2019-1?r=US&amp;IR=T"><u>were sent to Venezuela</u></a> to protect Maduro.   </p><p>This adds to <a href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/"><u>previous reporting</u></a> from <em>Wired</em> late last year that revealed the CIA had temporarily disrupted the Venezuelan military's payroll system in the same campaign. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks</title>
        <pubDate>Wed, 05 Nov 2025 14:10:48 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-us-indicts-two-rogue-cybersecurity-employees-for-deploying-ransomware/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-us-indicts-two-rogue-cybersecurity-employees-for-deploying-ransomware/</guid>
        <description><![CDATA[
          
            <p>The US Department of Justice has charged employees at two cybersecurity firms with hacking US companies and deploying ransomware.</p><p>According to <a href="https://www.courtlistener.com/docket/71539566/united-states-v-goldberg/">court documents</a>, charges have been levied against <strong>Kevin Tyler Martin</strong>, a former ransomware negotiator at DigitalMint, and Ryan Clifford Goldberg, a former incident response manager at cybersecurity company Sygnia.</p><p>The two worked with a third suspect to hack into US companies, steal their data, encrypt computers, and then ask for huge ransoms in the realm of millions of US dollars.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Norway skittish of its Chinese electric buses</title>
        <pubDate>Mon, 03 Nov 2025 12:35:42 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-norway-skittish-of-its-chinese-electric-buses/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-norway-skittish-of-its-chinese-electric-buses/</guid>
        <description><![CDATA[
          
            <p>Oslo's public transportation agency conducted a security audit of its electric buses and, to nobody's surprise, found that its Chinese models could be remotely disabled by their manufacturer.</p><p>According to a report from local newspaper <a href="https://www.aftenposten.no/oslo/i/PpWLwJ/ruter-har-testet-egne-elbusser-de-kinesiske-kan-stoppes"><em>Aftenposten</em></a>, the agency, Ruter, tested and took two electric bus models inside a Faraday cage room.</p><p>Ruter found that electric buses from Chinese company Yutong could be remotely disabled via remote control capabilities found in the bus software, diagnostics module, and battery and power control systems.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Russia arrests Meduza Stealer group</title>
        <pubDate>Fri, 31 Oct 2025 10:32:24 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-russia-arrests-meduza-stealer-group/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-russia-arrests-meduza-stealer-group/</guid>
        <description><![CDATA[
          
            <p>Russian authorities have arrested three individuals believed to have created and sold the Meduza infostealer.</p><p>The suspects were arrested this week in the Moscow metropolitan area, according to Russia's Interior Ministry. A video from the raids is available on the <a href="https://mvdmedia.ru/news/ofitsialnyy-predstavitel/irina-volk-sotrudniki-mvd-rossii-zaderzhali-gruppu-khakerov-razrabotavshikh-i-rasprostranyavshikh-vi/">Ministry's media portal</a>.</p><p>The Ministry's spokesperson, Irina Volk, said the malware was used in attacks against at least one government network in the Astrakhan region.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Peter Williams, Ex-ASD, Pleads Guilty to Selling Eight Exploits to Russia</title>
        <pubDate>Thu, 30 Oct 2025 13:44:50 +1100</pubDate>
        <link>https://risky.biz/peter-williams-ex-asd-pleads-guilty-to-selling-eight-exploits-to-russia/</link>
        <guid isPermaLink="true">https://risky.biz/peter-williams-ex-asd-pleads-guilty-to-selling-eight-exploits-to-russia/</guid>
        <description><![CDATA[
          
            <p>The former general manager of a US defence contractor, <a href="https://www.documentcloud.org/documents/26194391-peter-williams-criminal-information-doj/"><u>Peter Williams</u></a>, has <a href="https://www.justice.gov/usao-dc/pr/former-general-manager-us-defense-contractor-pleads-guilty-selling-stolen-trade-secrets"><u>pleaded guilty</u></a> to selling "eight sensitive and protected cyber-exploit components" to Russian 0day broker <a href="https://cyberscoop.com/peter-williams-guilty-selling-zero-day-exploits-russian-broker-operation-zero/"><u>Operation Zero</u></a>*.</p><p>The broker claims to buy exploits from developers and resell them to non-NATO buyers, including the Russian government.</p><p>Williams, an Australian national, <a href="https://risky.biz/RB812/"><u>was previously employed by</u></a> Australia's signals intelligence agency ASD, from around 2007 to the mid-2010s. He later joined Linchpin Labs, which was acquired alongside Azimuth Security to form what eventually became L3Harris Trenchant, the vulnerability and exploit development subsidiary of L3Harris. By the time of his arrest, Williams had become the general manager there.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days</title>
        <pubDate>Wed, 29 Oct 2025 10:45:22 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-hackingteam-successor-linked-to-recent-chrome-zero-days/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-hackingteam-successor-linked-to-recent-chrome-zero-days/</guid>
        <description><![CDATA[
          
            <p>The company that formed from the remnants of Italian spyware vendor HackingTeam is now allegedly involved in hacking all sorts of private and public sector targets in Belarus and Russia.</p><p><strong>Memento Labs</strong> has targeted media outlets, universities, research centers, government organizations, financial institutions, and other organizations.</p><p>The company operates a spyware platform named <strong>Dante</strong>, through which it deploys infrastructure, exploits, and its final payload—the <strong>LeetAgent</strong> implant/agent.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Russian bill would require researchers to report bugs to the FSB</title>
        <pubDate>Mon, 27 Oct 2025 12:41:26 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-russian-bill-would-require-researchers-to-report-bugs-to-the-fsb/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-russian-bill-would-require-researchers-to-report-bugs-to-the-fsb/</guid>
        <description><![CDATA[
          
            <p>Russian lawmakers are working on a new bill that would require security researchers, security firms, and other white-hat hackers to report all vulnerabilities to the state, in a law that's similar in spirit to a law already in effect in China since 2021.</p><p>The bill is currently being discussed among lawmakers, and no official draft is available. It is part of Russia's efforts to regulate its white-hat ecosystem, a process officials began back in 2022.</p><p>All previous efforts failed, with the most recent one being knocked down in the Duma <a href="https://www.rbc.ru/technology_and_media/08/07/2025/686c0ec09a7947502eec0b8d">in July</a> on the grounds that it did not take into account the special circumstances and needs of reporting bugs in government and critical infrastructure networks.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: iOS 26 change deletes clues of old spyware infections</title>
        <pubDate>Fri, 24 Oct 2025 12:43:45 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-ios-26-change-deletes-clues-of-old-spyware-infections/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-ios-26-change-deletes-clues-of-old-spyware-infections/</guid>
        <description><![CDATA[
          
            <p>Apple's latest mobile operating system update, iOS 26, has made a change to a crucial log file that stores evidence of past spyware infections.</p><p>According to iPhone forensics and investigations firm <a href="https://iverify.io/blog/key-iocs-for-pegasus-and-predator-spyware-cleaned-with-ios-26-update">iVerify</a>, Apple is now rewriting the shutdown.log file after every device reboot, instead of appending new data at the end.</p><p>This is removing older log entries that contain indicators of compromise with spyware families such as NSO's Pegasus and Intellexa's Predator.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>America&apos;s Private Sector Is Hacking for Godot</title>
        <pubDate>Thu, 23 Oct 2025 13:29:58 +1100</pubDate>
        <link>https://risky.biz/americas-private-sector-is-hacking-for-godot/</link>
        <guid isPermaLink="true">https://risky.biz/americas-private-sector-is-hacking-for-godot/</guid>
        <description><![CDATA[
          
            <p>The US government must develop a strategy to more effectively use its private sector to scale up offensive cyber activities, according to <a href="https://sergeybratus.gitlab.io/papers/DartmouthCyberRoundtable2025.pdf"><u>a new report</u></a> from Dartmouth's Institute for Security, Technology and Society.</p><p>The authors convened 30 experts from government, industry and academia to analyse the current state of play in "offensive cyber" and make recommendations. "Offensive cyber" was defined very broadly as pretty much anything including tool development, acquiring access, espionage and even disruptive or destructive operations. </p><p>The report assumes that US policymakers want both a higher operational tempo of cyber operations and to more effectively take advantage of the country's private sector.  </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Clever worm hits the DevOps scene</title>
        <pubDate>Wed, 22 Oct 2025 10:40:35 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-clever-worm-hits-the-devops-scene/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-clever-worm-hits-the-devops-scene/</guid>
        <description><![CDATA[
          
            <p>Security researchers have spotted a second self-propagating worm that hit the DevOps space within the span of a month. The new threat is named GlassWorm and primarily targets the VS Code extensions space.</p><p>It is the second such threat after the <a href="https://unit42.paloaltonetworks.com/npm-supply-chain-attack/">Shai-Hulud worm</a> that hit the npm JavaScript package repo in mid-September.</p><p>GlassWorm was spotted by <a href="https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace">Koi Security</a>. It was first seen on the unofficial OpenVSX marketplace for VS Code extensions, but later spread to the official Microsoft VS Code store as well.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Prisoner hacks prison IT system, goes wild!</title>
        <pubDate>Mon, 20 Oct 2025 13:44:40 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-prisoner-hacks-prison-it-system-goes-wild/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-prisoner-hacks-prison-it-system-goes-wild/</guid>
        <description><![CDATA[
          
            <p>A convict at a Romanian prison has hacked the country's prisoner management platform in a security breach that has rocked Romania's penitentiary agency.</p><p>The incident took place in August and continued through October.</p><p>From <a href="https://stirileprotv.ro/stiri/actualitate/bresa-de-securitate-majora-in-penitenciare-detinutii-hackeri-au-modificat-sisteme-reducand-pedepse-drept-de-camera-intima.html">various</a> <a href="https://hotnews.ro/un-detinut-de-la-penitenciarul-din-targu-jiu-a-intrat-in-baza-de-date-a-inchisorii-si-a-redus-din-pedepse-reactia-anp-2086916">reports</a> in <a href="https://romania.europalibera.org/a/cum-a-spart-un-detinut-sistemul-informatic-al-penitenciarelor-folosind-contul-unui-fost-director-/33560637.html">Romanian</a> <a href="https://www.digi24.ro/stiri/actualitate/bresa-la-penitenciarul-targu-jiu-cum-a-actionat-hackerul-seful-anp-a-adaugat-cate-un-zero-la-sumele-de-bani-primite-de-detinuti-3459065">media</a> and a <a href="https://snpp.ro/bresa-uriasa-de-securitate-in-penitenciare-director-general-anp-ocupat-cu-hartuirile/">statement</a> released by the national penitentiary police union, the incident appears to have originated in the city of Dej, in Romania's Transilvania region, at a prison hospital complex, where prisoners are sent to treat illnesses and then return to finish their sentence at their normal jails.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: F5 says an APT stole source code, vulnerability reports</title>
        <pubDate>Fri, 17 Oct 2025 10:39:50 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-f5-says-an-apt-stole-source-code-vulnerability-reports/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-f5-says-an-apt-stole-source-code-vulnerability-reports/</guid>
        <description><![CDATA[
          
            <p><strong>F5</strong> (formerly <em>F5 Networks</em>), one of the largest US tech companies and a member of the S&amp;P 500, has disclosed a security breach this week, in an incident that is in contention for the year's biggest hack award.</p><p>Details about the breach have been in flux since it was disclosed, so we put together a list with all we know happened so far.</p><p><em>The main <strong>Risky Business</strong> podcast is now on YouTube with video versions of our recent episodes. Below is our latest weekly show with Pat and Adam at the helm!</em></p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Small Beer Surveillance Firms Escape Crackdown, For Now</title>
        <pubDate>Thu, 16 Oct 2025 14:00:18 +1100</pubDate>
        <link>https://risky.biz/small-beer-surveillance-firms-escape-crackdown-for-now/</link>
        <guid isPermaLink="true">https://risky.biz/small-beer-surveillance-firms-escape-crackdown-for-now/</guid>
        <description><![CDATA[
          
            <p>A recent investigation into a Jakarta-based company shows there are still companies willing to offer unethical surveillance-as-a-service, even as crackdowns on high-profile spyware have really hurt big players.</p><p>A <a href="https://www.lighthousereports.com/investigation/surveillance-secrets/"><u>collaborative media investigation</u></a> kicked off by <em>Lighthouse Reports</em> looked at First Wap, a company that began as a mobile phone messaging service in 1999. The company soon pivoted to phone tracking after being asked by an unnamed law enforcement agency to support its counterterrorism efforts. </p><p>First Wap's surveillance product Altamides, short for Advanced Location Tracking and Deception System, exploits vulnerabilities in <a href="https://en.wikipedia.org/wiki/Signalling_System_No._7"><u>Signalling System 7</u></a> (SS7) to locate phones and even redirect text messages or phone calls. Because it exploits vulnerabilities in phone network protocols, Altamides does not require the deployment of malware to target devices. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Windows 10 reaches End-of-Life</title>
        <pubDate>Wed, 15 Oct 2025 15:18:38 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-windows-10-reaches-end-of-life/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-windows-10-reaches-end-of-life/</guid>
        <description><![CDATA[
          
            <p>The Windows 10 operating system <a href="https://support.microsoft.com/en-us/windows/windows-10-support-has-ended-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281">reached End-of-Life</a> (EOL) on Tuesday, October 14, after more than 10 years since its official release back in July 2015.</p><p>The OS won't receive any new security updates unless users or companies enroll in the <a href="https://learn.microsoft.com/en-us/windows/whats-new/extended-security-updates">Extended Security Updates</a> (ESU) program.</p><p>Because Windows 10 is still installed on around 40% of all Windows systems, Microsoft has made this ESU the first one available to home consumers—ESUs were initially introduced to provide extended <strong>paid</strong> support for larger enterprises.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Microsoft revamps Edge&apos;s &quot;IE Mode&quot; after zero-day attacks</title>
        <pubDate>Mon, 13 Oct 2025 13:29:46 +1100</pubDate>
        <link>https://risky.biz/microsoft-revamps-edges-ie-mode-after-zero-day-attacks/</link>
        <guid isPermaLink="true">https://risky.biz/microsoft-revamps-edges-ie-mode-after-zero-day-attacks/</guid>
        <description><![CDATA[
          
            <p>A mysterious threat actor is abusing the legacy <a href="https://support.microsoft.com/en-us/microsoft-edge/internet-explorer-mode-in-microsoft-edge-6604162f-e38a-48b2-acd2-682dbac6f0de"><em>Internet Explorer mode</em></a> in Microsoft Edge to run malicious code in a user's browser and take over their device.</p><p>The attacks have been going on since at least August, according to the <a href="https://microsoftedge.github.io/edgevr/posts/Changes-to-Internet-Explorer-Mode-in-Microsoft-Edge/">Microsoft Edge security team</a>.</p><p>The Internet Explorer legacy mode, or IE Mode, is a separate website execution environment in Edge. It works by reloading a web page but running its code inside the old Internet Explorer engines.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: EU scraps Chat Control vote</title>
        <pubDate>Fri, 10 Oct 2025 14:07:18 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-eu-scraps-chat-control-vote/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-eu-scraps-chat-control-vote/</guid>
        <description><![CDATA[
          
            <p>The European Union has scrapped next week's vote on Chat Control, proposed legislation that would have mandated tech companies to break their encryption to scan content for child abuse materials.</p><p>The project was supposed to be put to a vote on Tuesday, October 14, during a meeting of interior ministers of EU member states.</p><p>Denmark, which currently holds the EU presidency and was backing the legislation, scrapped the vote, according to reports on <a href="https://orf.at/stories/3407810/">Austrian</a> and <a href="https://www.deutschlandfunk.de/eu-staaten-erzielen-keine-einigung-102.html">German</a> media.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Clop is a Big Fish, But Not Worth Hunting</title>
        <pubDate>Thu, 09 Oct 2025 12:56:44 +1100</pubDate>
        <link>https://risky.biz/clop-is-a-big-fish-but-not-worth-hunting/</link>
        <guid isPermaLink="true">https://risky.biz/clop-is-a-big-fish-but-not-worth-hunting/</guid>
        <description><![CDATA[
          
            <p>The <a href="https://en.wikipedia.org/wiki/Clop_(cyber_gang)"><u>Clop ransomware gang</u></a> is once again in the news after a <a href="https://www.linkedin.com/posts/charlescarmakal_oracle-security-alert-advisory-cve-2025-activity-7380595612443893760-JNd_/"><u>mass exploitation campaign</u></a> targeting users of Oracle's E-business Suite. This month Clop <a href="https://cyberscoop.com/extortion-email-clop-oracle-customers/"><u>emailed executives at victim companies</u></a> threatening to leak stolen files if it does not receive payment. </p><p>Stealing data to extort companies is not good, but it is a hell of a lot better than systems getting locked up with encrypting ransomware, leading to weeks of factory shutdowns. Right now, from a government perspective, it would be a win if every campaign looked like Clop's.  </p><p>The group has been active since 2019, making it one of the longer-lasting ransomware gangs. It initially deployed standard encrypting ransomware, but in 2020 it was one of the first groups to experiment with '<a href="https://www.cisa.gov/stopransomware/ransomware-guide"><u>double extortion</u></a>'. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Redis vulnerability impacts all versions released in the last 13 years</title>
        <pubDate>Wed, 08 Oct 2025 10:50:05 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-redis-vulnerability-impacts-all-versions-released-in-the-last-13-years/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-redis-vulnerability-impacts-all-versions-released-in-the-last-13-years/</guid>
        <description><![CDATA[
          
            <p>The Redis database project released a <a href="https://redis.io/blog/security-advisory-cve-2025-49844/">security update</a> last week to patch a critical vulnerability that can allow remote attackers to run malicious code and take over systems.</p><p>The vulnerability is as bad as it gets and impacts all Redis versions released over the past <strong>13 years</strong>.</p><p>The vulnerability is tracked as <em>CVE-2025-49844</em>, but the Google Wiz team that discovered it calls it <a href="https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844"><strong>RediShell</strong></a>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Microsoft tells users to uninstall games affected by major Unity bug</title>
        <pubDate>Mon, 06 Oct 2025 11:42:24 +1100</pubDate>
        <link>https://risky.biz/risky-bulletin-microsoft-tells-users-to-uninstall-games-affected-by-major-unity-bug/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-microsoft-tells-users-to-uninstall-games-affected-by-major-unity-bug/</guid>
        <description><![CDATA[
          
            <p>Microsoft and the Steam gaming platform have reacted over the weekend to a new security flaw discovered in Unity, one of today's most widely used game engines.</p><p>The vulnerability was discovered by <strong>RyotaK</strong>, a researcher for GMA Flatt Security, who has quite a few of these high-impact bugs to his name.</p><p>The bug is tracked as <strong>CVE-2025-59489</strong>, and it allows malicious apps on the same device to add command-line arguments to Unity-based games that load malicious code together with a game.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Scam compound operators sentenced to death in China</title>
        <pubDate>Fri, 03 Oct 2025 13:33:30 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-scam-compound-operators-sentenced-to-death-in-china/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-scam-compound-operators-sentenced-to-death-in-china/</guid>
        <description><![CDATA[
          
            <p>China has <a href="https://www.spp.gov.cn/spp/zdgz/202509/t20250929_707820.shtml">sentenced</a> 11 individuals to death for their role in running cyber scam compounds in Myanmar.</p><p>Five other individuals received suspended death sentences for two years, 11 others received life sentences, and 12 more got prison terms ranging from five to 24 years.</p><p>The suspects were members of the infamous Ming crime family. They were <a href="https://mp.weixin.qq.com/s/B_YuVVx13vBDkD84ZglhIw">arrested</a> in November of 2023, when the Chinese government first started seriously cracking down on scam compounds targeting its citizens.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>The Cyberespionage Gig Economy</title>
        <pubDate>Thu, 02 Oct 2025 13:05:36 +1000</pubDate>
        <link>https://risky.biz/the-cyberespionage-gig-economy/</link>
        <guid isPermaLink="true">https://risky.biz/the-cyberespionage-gig-economy/</guid>
        <description><![CDATA[
          
            <p></p><p>Foreign intelligence services are experimenting with new ways of using domestic proxies to facilitate overseas operations. </p><p>In the Netherlands, two teenagers have been arrested <a href="https://therecord.media/teens-arrested-netherlands-reportedly-suspected-cyber-espionage-russia"><u>after reportedly</u></a> being recruited by pro-Russian hackers on Telegram to assist with cyber espionage operations. <a href="https://nltimes.nl/2025/09/26/two-dutch-teens-arrested-rare-russian-espionage-case"><u>Dutch authorities allege</u></a> that the pair were tasked with Wi-Fi collection along a route in The Hague that went past Europol, Eurojust and the Canadian embassy.  </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: Router APIs abused to send SMS spam waves</title>
        <pubDate>Wed, 01 Oct 2025 11:54:16 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-router-apis-abused-to-send-sms-spam-waves/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-router-apis-abused-to-send-sms-spam-waves/</guid>
        <description><![CDATA[
          
            <p>A mysterious threat actor is abusing <strong>Milesight industrial cellular routers</strong> to send SMS spam, also known as <em>smishing</em>, to users in several European countries.</p><p>According to French security firm <a href="https://blog.sekoia.io/silent-smishing-the-hidden-abuse-of-cellular-router-apis/"><em>Sekoia</em></a>, the campaign has been silently going on without detection since at least February 2022.</p><p>The attackers are targeting a feature of Milesight routers that lets admins configure to receive SMS alerts. Such a feature is common in industrial routers that connect remote equipment to a larger network via a cellular modem, with admins receiving alerts when the equipment connection goes offline and may not be in a state where it can be managed.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: UK to bail out Jaguar Land Rover</title>
        <pubDate>Mon, 29 Sep 2025 11:04:45 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-uk-to-bail-out-jaguar-land-rover/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-uk-to-bail-out-jaguar-land-rover/</guid>
        <description><![CDATA[
          
            <p>The UK government has agreed to underwrite a £1.5 billion loan to Jaguar Land Rover to help the carmaker deal with the increasingly costly aftermath of a recent cyberattack that has crippled its production and shut down factories for almost a month.</p><p>The underwrite was <a href="https://www.gov.uk/government/news/government-backs-jaguar-land-rover-with-15-billion-loan-guarantee">approved</a> on Sunday after a visit from UK Business Secretary Peter Kyle to the headquarters of JLR and its main supply chain firm Webasto this week.</p><p>JLR fell victim to a ransomware attack—supposedly from the <a href="https://www.cyfirma.com/research/investigation-report-on-jaguar-land-rover-cyberattack/">HellCat group</a>—on August 31. Production lines at all JLE factories have been shut down ever since, and are expected to last <a href="https://web.archive.org/web/20250923081253/https://www.jlr.com/">into October</a>.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: EU users to get free Windows 10 extended security updates</title>
        <pubDate>Fri, 26 Sep 2025 14:12:01 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-eu-users-to-get-free-windows-10-extended-security-updates/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-eu-users-to-get-free-windows-10-extended-security-updates/</guid>
        <description><![CDATA[
          
            <p>Most European users will receive Windows 10 Extended Security Updates (ESU) for free.</p><p>These are security updates that Microsoft will provide to users after the Windows 10 operating system reaches end-of-life on October 14, less than three weeks away.</p><p>Normally, ESUs are available to enterprise customers, but last year, Microsoft took the novel step of providing the first-ever ESUs to home consumers. <a href="https://blogs.windows.com/windowsexperience/2024/10/31/how-to-prepare-for-windows-10-end-of-support-by-moving-to-windows-11-today/">For $30</a>, half the sum a company would pay, Windows 10 home users could have received security updates for an extra year.</p>
          
        ]]></description>
      </item>
    
      <item>
        <title>The Kids Aren&apos;t Alright</title>
        <pubDate>Thu, 25 Sep 2025 13:31:34 +1000</pubDate>
        <link>https://risky.biz/the-kids-arent-alright/</link>
        <guid isPermaLink="true">https://risky.biz/the-kids-arent-alright/</guid>
        <description><![CDATA[
          
            <p>In recent years we've seen an evolution of the online funnel that turns kids into cybercriminals. </p><p>Over the last decade, cybercrime's reach has broadened, it's become more lucrative and more violent. Governments need to attack and disrupt this funnel at all levels, instead of solely focussing on prosecuting these kids after the damage is done.</p><p><em>Bloomberg</em> <a href="https://www.bloomberg.com/news/features/2025-09-19/multimillion-dollar-hacking-spree-scattered-spider-teen-s-jailhouse-confessions?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1ODI4MTkwMSwiZXhwIjoxNzU4ODg2NzAxLCJhcnRpY2xlSWQiOiJUMlUyTVNHUTFZWVUwMCIsImJjb25uZWN0SWQiOiIwNUVDNUJDRTNFOTA0ODQ0OThBOTc5MkM0MDIwNkUzNyJ9.hZarEq-EdSn6zXTfZnJEI870hLN66BhFQhLN7kqmKds&amp;leadSource=uverify%20wall"><u>has described</u></a> the path that turned one key individual associated with Scattered Spider from a self-described "weird kid" into an inmate, having <a href="https://www.justice.gov/usao-mdfl/pr/palm-coast-hacker-sentenced-10-years-prison"><u>been sentenced</u></a> to ten years in prison. Noah Urban, now 20 years old, stole more than USD$13 million in cryptocurrency after becoming involved in SIM swapping when he was 15. </p>
          
        ]]></description>
      </item>
    
      <item>
        <title>Risky Bulletin: US raids SIM farm in New York</title>
        <pubDate>Wed, 24 Sep 2025 11:34:19 +1000</pubDate>
        <link>https://risky.biz/risky-bulletin-us-raids-sim-farm-in-new-york/</link>
        <guid isPermaLink="true">https://risky.biz/risky-bulletin-us-raids-sim-farm-in-new-york/</guid>
        <description><![CDATA[
          
            <p>The US Secret Service has raided and dismantled a SIM farm operating at five locations across the New York tri-state area.</p><p>Officials seized 300 SIM servers running more than 100,000 SIM cards.</p><p>Officials began investigating the SIM farms after they were used earlier this year to make anonymous threats against senior US officials. According to the <a href="https://www.nytimes.com/2025/09/23/us/politics/secret-service-sim-cards-servers-un.html"><em>NYT</em></a>, two White House and one Secret Service official were on the receiving end of some of those threats.</p>
          
        ]]></description>
      </item>
    
  </channel>
</rss>
