<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xml:base="https://risky.biz/feeds/risky-business" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"  xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Risky Business</title>
        <description>Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.</description>
        <link>https://risky.biz/</link>
        <copyright>Copyright Risky Business Media 2007-2026</copyright>
        <language>en</language>
        <atom:link href="https://risky.biz/feeds/risky-business" rel="self" type="application/rss+xml" />
        <pubDate>Fri, 10 Apr 2026 15:47:01 +1000</pubDate>
        <lastBuildDate>Fri, 10 Apr 2026 15:47:01 +1000</lastBuildDate>
        <itunes:image href="https://risky.biz/static/img/rb-feed-main.png" />
        <itunes:author>Risky Business Media</itunes:author>
	<itunes:category text="News"> <itunes:category text="Tech News" /> </itunes:category> <itunes:category text="Technology"/>
        <itunes:owner>
            <itunes:name>Risky.biz</itunes:name>
            <itunes:email>editorial@risky.biz</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
        <generator>Jekyll v4.2.2</generator>
        
        
        
            
        
        <item>
            <title>Snake Oilers: Burp AI, Sondera and Truffle Security</title>
            <pubDate>Fri, 10 Apr 2026 07:33:35 +1000</pubDate>
            <link>https://risky.biz/SNAKEOILERS23PT1/</link>
            <guid isPermaLink="true">https://risky.biz/SNAKEOILERS23PT1/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SNAKEOILERS23PT1.mp3" length="69145825" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2880</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products:


  
    Burp AI and DAST: The founder of PortSwigger and creator of legendary security software Burp Suite, Dafydd Stuttard, drops by to pitch listeners on Burp AI and Burp Suite DAST.
  
  
    Sondera: Josh Devon talks about Sondera, a technology designed to intervene when AI models start doing the wrong thing by statefully tracking their trajectories. This isn’t a permissions suite for AI agents, it’s a way to stick agents in a harness and make sure they adhere to hard policy boundaries.
  
  
    Truffle Security: Dylan Ayrey, the founder of Truffle Security, joins Risky Business again to talk through the latest bells and whistles in Trufflehog, a security tool that searches for exposed secrets and validates them. The Truffle team has done a lot of work on the remediation part of their product over the last few years, and Dylan tells us all about it!
  


This episode is also available on YouTube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products:</p>

<ul>
  <li>
    <p>Burp AI and DAST: The founder of <a href="https://portswigger.net/">PortSwigger</a> and creator of legendary security software Burp Suite, Dafydd Stuttard, drops by to pitch listeners on Burp AI and Burp Suite DAST.</p>
  </li>
  <li>
    <p>Sondera: Josh Devon talks about <a href="https://www.sondera.ai/">Sondera</a>, a technology designed to intervene when AI models start doing the wrong thing by statefully tracking their trajectories. This isn’t a permissions suite for AI agents, it’s a way to stick agents in a harness and make sure they adhere to hard policy boundaries.</p>
  </li>
  <li>
    <p>Truffle Security: Dylan Ayrey, the founder of <a href="https://trufflesecurity.com/">Truffle Security</a>, joins Risky Business again to talk through the latest bells and whistles in Trufflehog, a security tool that searches for exposed secrets and validates them. The Truffle team has done a lot of work on the remediation part of their product over the last few years, and Dylan tells us all about it!</p>
  </li>
</ul>

<p>This episode is also available on <a href="https://youtu.be/uGrru0FP85I">YouTube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #832 -- Anthropic unveils magical 0day computer God</title>
            <pubDate>Wed, 08 Apr 2026 14:59:38 +1000</pubDate>
            <link>https://risky.biz/RB832/</link>
            <guid isPermaLink="true">https://risky.biz/RB832/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB832.mp3" length="51385757" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3210</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:


  Anthropic’s new Mythos model hunts bugs and chains exploits together so well that… you cant have it…
  …Unless you’re one of their Project Glasswing partners
  The world isn’t short on bugs, though. F5, Fortinet, Progress ShareFile, and TrueConf are all getting rekt by humans
  GPU Rowhammering goes in the GPU, past the IOMMU and back into the host-side Nvidia driver
  North Korea is spending serious time and money on its crypto hacking
  Just when the US needs CISA most, they slash its budget some more!


This week’s episode is sponsored by identity verification firm, Persona. Tying digital actions to actual human identities isn’t just for banking know-your-customer any more. Persona’s Benjamin Chait says know-your-staff checks belong in high-value flows inside your organisation, too.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:</p>

<ul>
  <li>Anthropic’s new Mythos model hunts bugs and chains exploits together so well that… you cant have it…</li>
  <li>…Unless you’re one of their Project Glasswing partners</li>
  <li>The world isn’t short on bugs, though. F5, Fortinet, Progress ShareFile, and TrueConf are all getting rekt by humans</li>
  <li>GPU Rowhammering goes in the GPU, past the IOMMU and back into the host-side Nvidia driver</li>
  <li>North Korea is spending serious time and money on its crypto hacking</li>
  <li>Just when the US needs CISA most, they slash its budget some more!</li>
</ul>

<p>This week’s episode is sponsored by identity verification firm, Persona. Tying digital actions to actual human identities isn’t just for banking know-your-customer any more. Persona’s Benjamin Chait says know-your-staff checks belong in high-value flows inside your organisation, too.</p>

<p>This episode is also available on <a href="https://youtu.be/wXMrST1GjUk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview \ red.anthropic.com</a></li>
										
                    	<li><a href="https://www.nytimes.com/2026/04/07/technology/anthropic-claims-its-new-ai-model-mythos-is-a-cybersecurity-reckoning.html">Anthropic Claims Its New A.I. Model, Mythos, Is a Cybersecurity ‘Reckoning’ - The New York Times</a></li>
										
                    	<li><a href="https://www.wired.com/story/anthropic-mythos-preview-project-glasswing/">Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything | WIRED</a></li>
										
                    	<li><a href="https://x.com/ffmpeg /status/2041595801483264002">FFmpeg on X: &quot;Thank you to @AnthropicAI for sending FFmpeg patches&quot; / X</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-flaw-in-f5-big-ip-faces-wide-exploitation-risk/816475/">Critical flaw in F5 BIG-IP faces wide exploitation risk | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/credential-harvesting-campaign-react2shell-cisco/816726/">React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-flaw-forticlient-ems-exploitation/816699/">Critical flaw in FortiClient EMS under exploitation | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/researchers-critical-flaws-progress-sharefile/816599/">Researchers warn of critical flaws in Progress ShareFile | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/trueconf-cyberattack-cisa-hackers">CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/04/new-rowhammer-attacks-give-complete-control-of-machines-running-nvidia-gpus/">New Rowhammer attacks give complete control of machines running Nvidia GPUs - Ars Technica</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/04/06/north-koreas-hijack-of-one-of-the-webs-most-used-open-source-projects-was-likely-weeks-in-the-making/">North Korea&#39;s hijack of one of the web&#39;s most used open source projects was likely weeks in the making | TechCrunch</a></li>
										
                    	<li><a href="https://therecord.media/drift-crypto-confirms-280-million-stolen-north-korea">Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/DriftProtocol/status/2040611161121370409">Drift on X: &quot;Drift Protocol — Incident Background Update &quot; / X</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-white-house-budget-fy27/816615/">Trump’s FY2027 budget again targets CISA | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-trump-budget-fy2027-details/816855/">CISA’s vulnerability scans, field support on chopping block in Trump budget | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/iran-hack-break-us-industrial-systems-agencies-trump-target-rcna267162">Iranian hackers break into U.S. industrial systems, agencies warn</a></li>
										
                    	<li><a href="https://www.nbcnews.com/news/us-news/fbi-labels-suspected-china-hack-law-enforcement-data-major-cyber-incid-rcna266495">FBI labels suspected China hack of law enforcement data &#39;a major cyber incident&#39;</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2026/04/russia-hacked-routers-to-steal-microsoft-office-tokens/">Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack">Massachusetts hospital turning ambulances away after cyberattack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://nypost.com/2026/04/07/us-news/ghost-murmur-a-never-used-secret-tool-deployed-to-find-lost-airman-in-iran-in-daring-mission/">Exclusive | &#39;Ghost Murmur,&#39; a never-used secret tool, deployed to find lost airman in Iran in daring mission</a></li>
										
                    	<li><a href="https://www.404media.co/a-secure-chat-apps-encryption-is-so-bad-it-is-meaningless/">A Secure Chat App’s Encryption Is So Bad It Is ‘Meaningless’</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>How the World Got Owned Episode 2: The 1990s, Part One</title>
            <pubDate>Fri, 03 Apr 2026 11:35:55 +1100</pubDate>
            <link>https://risky.biz/HTWGO2/</link>
            <guid isPermaLink="true">https://risky.biz/HTWGO2/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/HTWGO2.mp3" length="44942000" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2806</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this special documentary episode, Patrick Gray and Amberleigh Jack take a look back at hacking throughout the 1990s, from the feel-good vibes of the early hacking communities to the antics of young hackers who wound up on the run from the FBI.

Part one features recollections from:


  Jeff Moss (The Dark Tangent), DefCon and Black Hat founder
  Chris Wysopal (Weld Pond), L0pht member, co-founder, @Stake
  Kevin Poulsen (Dark Dante), 1990s hacker turned journalist
  Elias Levy (Aleph One), author of Smashing the Stack for Fun and Profit, Phrack, 1996


How the World Got Owned is produced in partnership with SentinelOne.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this special documentary episode, Patrick Gray and Amberleigh Jack take a look back at hacking throughout the 1990s, from the feel-good vibes of the early hacking communities to the antics of young hackers who wound up on the run from the FBI.</p>

<p>Part one features recollections from:</p>

<ul>
  <li>Jeff Moss (The Dark Tangent), DefCon and Black Hat founder</li>
  <li>Chris Wysopal (Weld Pond), L0pht member, co-founder, @Stake</li>
  <li>Kevin Poulsen (Dark Dante), 1990s hacker turned journalist</li>
  <li>Elias Levy (Aleph One), author of Smashing the Stack for Fun and Profit, Phrack, 1996</li>
</ul>

<p>How the World Got Owned is produced in partnership with SentinelOne.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.linkedin.com/in/aleph1/">Elias Levy (Aleph1), Former Principle Engineer, Google</a></li>
										
                    	<li><a href="https://www.linkedin.com/in/kevin-poulsen/">Kevin Poulsen, Journalist</a></li>
										
                    	<li><a href="https://www.linkedin.com/in/jeffmoss/">Jeff Moss, DefCon founder</a></li>
										
                    	<li><a href="https://www.linkedin.com/in/wysopal/">Chris Wysopal, @Stake founder, L0pht member</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=VVJldn_MmMY">Hackers testifying at the United States Senate, May 19, 1998</a></li>
										
                    	<li><a href="https://www.latimes.com/archives/la-xpm-1995-08-12-fi-34262-story.html">Hackers May ‘Net’ Good PR for Studio</a></li>
										
                    	<li><a href="https://defcon.org/html/defcon-1/defcon-1.html">DefCon Archives | DefCon 1</a></li>
										
                    	<li><a href="https://www.eff.org/pages/not-terribly-brief-history-electronic-frontier-foundation">A Not So Terribly Brief History of the Electronic Frontier Foundation</a></li>
										
                    	<li><a href="https://www.newscientist.com/article/mg13418201-400-innocent-hackers-want-their-computers-back/">Innocent Hackers Want Their Computers Back</a></li>
										
                    	<li><a href="https://www.sciencedirect.com/science/chapter/edited-volume/abs/pii/B9781483106076500235?via%3Dihub">Breakdowns in Computer Security</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=MAFFjZn8f70">Unsolved Mysteries, Season 3, Episode 4</a></li>
										
                    	<li><a href="https://www.latimes.com/archives/la-xpm-1993-09-12-tm-34163-story.html">The Last Hacker: He Called Himself Dark Dante. His Compulsion Led Him to Secret Files and, Eventually, The Bar of Justice</a></li>
										
                    	<li><a href="https://law.justia.com/cases/federal/appellate-courts/F3/41/1330/564477/">Justia appeal summary, Kevin Poulsen, 1994</a></li>
										
                    	<li><a href="https://phrack.org/issues/49/14">Smashing the Stack for Fun and Profit, Phrack Magazine, November 1996</a></li>
										
                    	<li><a href="https://readme.synack.com/from-subversives-to-ceos-how-radical-hackers-built-todays-cybersecurity-industry">From subversives to CEOs: How radical hackers built today’s cybersecurity industry</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #831 -- The AI bugpocalypse begins</title>
            <pubDate>Wed, 01 Apr 2026 14:50:51 +1100</pubDate>
            <link>https://risky.biz/RB831/</link>
            <guid isPermaLink="true">https://risky.biz/RB831/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB831.mp3" length="57301690" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3580</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:


  Those pesky North Koreans shim a backdoor into a 100M-downloads-a-week npm package
  TeamPCP appear to have ransacked Cisco’s source and cloud environments
  AI is getting legitimately good at being told to “just go find some 0day in this”
  Kaspersky says Coruna and Triangulation do share code lineage
  Iranian hackers dump Kash Patel’s gmail spool
  Oh, and of course there’s a Citrix Netscaler memory leak being exploited in the wild


This week’s episode is sponsored by Dropzone AI, who make automated AI SOC analysts. Head honcho Ed Wu explains how they’ve built pre-canned ‘hunt packs’ to lead the AI off into your environment to find weird, interesting and security relevant things.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:</p>

<ul>
  <li>Those pesky North Koreans shim a backdoor into a 100M-downloads-a-week npm package</li>
  <li>TeamPCP appear to have ransacked Cisco’s source and cloud environments</li>
  <li>AI is getting legitimately good at being told to “just go find some 0day in this”</li>
  <li>Kaspersky says Coruna and Triangulation do share code lineage</li>
  <li>Iranian hackers dump Kash Patel’s gmail spool</li>
  <li>Oh, and of course there’s a Citrix Netscaler memory leak being exploited in the wild</li>
</ul>

<p>This week’s episode is sponsored by Dropzone AI, who make automated AI SOC analysts. Head honcho Ed Wu explains how they’ve built pre-canned ‘hunt packs’ to lead the AI off into your environment to find weird, interesting and security relevant things.</p>

<p>This episode is also available on <a href="https://youtu.be/PGmcgt8vMH8">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/google-links-axios-supply-chain-attack-north-korea">Google links axios supply chain attack to North Korean group | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/cisco-source-code-stolen-in-trivy-linked-dev-environment-breach/">Cisco source code stolen in Trivy-linked dev environment breach</a></li>
										
                    	<li><a href="https://x.com/chiefofautism/status/2037951563931500669">chiefofautism on X: &quot;someone at ANTHROPIC just showed CLAUDE finding ZERO DAY vulnerabilities in a live conference demo&quot;</a></li>
										
                    	<li><a href="https://x.com/h0mbre_/status/2037901957499658575">h0mbre on X: &quot;Claude is somehow better at kernel exploitation than creating meal plans.&quot;</a></li>
										
                    	<li><a href="https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/">Vulnerability Research Is Cooked — Quarrelsome</a></li>
										
                    	<li><a href="https://blog.calif.io/p/mad-bugs-vim-vs-emacs-vs-claude">MAD Bugs: vim vs emacs vs Claude - Calif</a></li>
										
                    	<li><a href="https://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd">MAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)</a></li>
										
                    	<li><a href="https://risky.biz/RBFEATURES10/">A Risky Biz Experiment: Hunting for iOS 0day with AI - Risky Business Media</a></li>
										
                    	<li><a href="https://cyberscoop.com/ai-cyberattacks-two-years-insane-vulnerabilities-kevin-mandia-alex-stamos-morgan-adamski-rsac-2026/">Security leaders say the next two years are going to be &#39;insane&#39; | CyberScoop</a></li>
										
                    	<li><a href="https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/">Coruna framework: an exploit kit and ties to Operation Triangulation | Securelist</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/27/apple-says-no-one-using-lockdown-mode-has-been-hacked-with-spyware/">Apple says no one using Lockdown Mode has been hacked with spyware | TechCrunch</a></li>
										
                    	<li><a href="https://blog.calif.io/p/reverse-engineering-apples-silent">Reverse engineering Apple’s silent security fixes - Calif</a></li>
										
                    	<li><a href="https://www.pbs.org/newshour/nation/jury-finds-metas-platforms-are-harmful-to-children-in-1st-wave-of-social-media-addiction-lawsuits">Jury finds Meta&#39;s platforms are harmful to children in 1st wave of social media addiction lawsuits | PBS News</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/c747x7gz249o">Meta and YouTube found liable in social media addiction trial</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/iranian-hackers-publish-emails-allegedly-stolen-kash-patel-rcna265490">Iranian hackers publish emails allegedly stolen from Kash Patel</a></li>
										
                    	<li><a href="https://timesofindia.indiatimes.com/world/middle-east/legitimate-targets-iran-issues-warning-to-us-tech-firms-including-google-amazon-microsoft-nvidia/articleshow/129450749.cms">Iran Us War: &#39;Legitimate targets&#39;: Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia - The Times of India</a></li>
										
                    	<li><a href="https://x.com/DropSiteNews/status/2039011864944771339">Drop Site on X: &quot;IRGC: From now on, for every assassination, an American company will be destroyed&quot;</a></li>
										
                    	<li><a href="https://x.com/osinttechnical/status/2022357574826578060">OSINTtechnical on X: &quot;Starlink shutdowns are forcing Russian troops even deeper into Ubiquiti’s ecosystem. &quot;</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/citrix-netscaler-exploitation-vulnerabilities/816097/">Citrix NetScaler products confirmed to be under exploitation | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug">CISA tells federal agencies to patch Citrix NetScaler bug by Thursday | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/using-a-vpn-may-subject-you-to-nsa-spying/">Using a VPN May Subject You to NSA Spying | WIRED</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/style/power/2026/03/27/white-house-google-database-epstein">Post reporters called the White House. Their phones showed ‘Epstein Island.’ - The Washington Post</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Soap Box: Red teaming AI systems with SpecterOps</title>
            <pubDate>Fri, 27 Mar 2026 12:07:14 +1100</pubDate>
            <link>https://risky.biz/SOAPBOX106/</link>
            <guid isPermaLink="true">https://risky.biz/SOAPBOX106/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SOAPBOX106.mp3" length="43499101" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1811</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the show, Patrick Gray and James Wilson talk about red teaming AI systems with Russel Van Tuyl, Vice President of Services at elite penetration testing firm SpecterOps.

SpecterOps is the company behind attack path enumeration tool Bloodhound and Bloodhound Enterprise, but they’re also a pentest and red teaming shop with world class expertise in popping shells on all sorts of interesting systems in all sorts of interesting places.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the show, Patrick Gray and James Wilson talk about red teaming AI systems with Russel Van Tuyl, Vice President of Services at elite penetration testing firm SpecterOps.</p>

<p>SpecterOps is the company behind attack path enumeration tool Bloodhound and Bloodhound Enterprise, but they’re also a pentest and red teaming shop with world class expertise in popping shells on all sorts of interesting systems in all sorts of interesting places.</p>

<p>This episode is also available on <a href="https://youtu.be/jTiJpV9W1D8">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #830 -- LiteLLM and security scanner supply chains compromised</title>
            <pubDate>Wed, 25 Mar 2026 15:13:36 +1100</pubDate>
            <link>https://risky.biz/RB830/</link>
            <guid isPermaLink="true">https://risky.biz/RB830/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB830.mp3" length="61354016" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3833</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They talk through:


  TeamPCP’s supply chain attack on Github, and they threw in an anti-Iran wiper, because why not?!
  Anthropic hooks up its models to just… use your whole computer
  After Stryker’s Very Bad Day, CISA says maybe add some more controls around your Intune?
  Another iOS exploit kit shows up in the cyber bargain-bin
  The FTC decides to ban… all new home routers?! U wot m8?!
  Supermicro founder was personally sanction-busting Nvidia GPUs into China?!


This week’s episode is sponsored by enterprise browser maker, Island. Chief Customer Officer Bradon Rogers joins Pat to explain how its customers are using Island to control the use of personal AI services in regulated industries.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They talk through:</p>

<ul>
  <li>TeamPCP’s supply chain attack on Github, and they threw in an anti-Iran wiper, because why not?!</li>
  <li>Anthropic hooks up its models to just… use your whole computer</li>
  <li>After Stryker’s Very Bad Day, CISA says maybe add some more controls around your Intune?</li>
  <li>Another iOS exploit kit shows up in the cyber bargain-bin</li>
  <li>The FTC decides to ban… all new home routers?! U wot m8?!</li>
  <li>Supermicro founder was personally sanction-busting Nvidia GPUs into China?!</li>
</ul>

<p>This week’s episode is sponsored by enterprise browser maker, Island. Chief Customer Officer Bradon Rogers joins Pat to explain how its customers are using Island to control the use of personal AI services in regulated industries.</p>

<p>This episode is also available on <a href="https://youtu.be/LpYU77tXnQU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://krebsonsecurity.com/2026/03/canisterworm-springs-wiper-attack-targeting-iran/">‘CanisterWorm’ Springs Wiper Attack Targeting Iran</a></li>
										
                    	<li><a href="https://www.aikido.dev/blog/teampcp-deploys-worm-npm-trivy-compromise">TeamPCP deploys CanisterWorm on NPM following Trivy compromise</a></li>
										
                    	<li><a href="https://x.com/karpathy/status/2036487306585268612">Andrej Karpathy on X: &quot;Software horror: litellm PyPI supply chain&quot; attack</a></li>
										
                    	<li><a href="https://www.stepsecurity.io/blog/checkmarx-kics-github-action-compromised-malware-injected-in-all-git-tags">Checkmarx KICS GitHub Action Compromised: Malware Injected in All Git Tags</a></li>
										
                    	<li><a href="https://x.com/felixrieseberg/status/2036193240509235452">Felix Rieseberg on X: &quot;Today, we’re releasing a feature that allows Claude to control your computer&quot;</a></li>
										
                    	<li><a href="https://www.404media.co/a-top-google-search-result-for-claude-plugins-was-planted-by-hackers/">A Top Google Search Result for Claude Plugins Was Planted by Hackers</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/lockheed-martin-breach-pro-iran-hacktivist/815430/">Lockheed Martin targeted in alleged breach by pro-Iran hacktivist</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/19/cisa-urges-companies-to-secure-microsoft-intune-systems-after-hackers-mass-wipe-stryker-devices/">CISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devices</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/iran-cyber-attack-stryker-us-company-risk-war-fbi-handala-rcna264332">FBI seems to seize website tied to Iranian cyberattack on Stryker</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/stryker-confirms-cyberattack-is-contained-and-restoration-underway/815427/">Stryker confirms cyberattack is contained and restoration underway</a></li>
										
                    	<li><a href="https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/">Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/">Someone has publicly leaked an exploit kit that can hack millions of iPhones</a></li>
										
                    	<li><a href="https://therecord.media/russia-linked-hackers-use-iphone-exploit-ukraine">Russia-linked hackers use advanced iPhone exploit to target Ukrainians</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/17/apple-rolls-out-first-background-security-update-for-iphones-ipads-and-macs-to-fix-safari-bug/">Apple rolls out first &#39;background security&#39; update for iPhones, iPads, and Macs to fix Safari bug</a></li>
										
                    	<li><a href="https://bsky.app/profile/wartranslated.bsky.social/post/3mhnj7y42ys2o">Post by @wartranslated.bsky.social — Bluesky</a></li>
										
                    	<li><a href="https://www.wired.com/story/signals-creator-is-helping-encrypt-meta-ai/">Signal’s Creator Is Helping Encrypt Meta AI</a></li>
										
                    	<li><a href="https://www.reuters.com/legal/government/hacker-says-they-compromised-millions-confidential-police-tips-held-by-us-2026-03-18/">Hacker says they compromised millions of confidential police tips held by US company </a></li>
										
                    	<li><a href="https://san.com/cc/millions-of-anonymous-crime-tips-exposed-in-massive-crime-stoppers-hack-exclusive/">Millions of &#39;anonymous&#39; crime tips exposed in massive Crime Stoppers hack</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/">Feds Disrupt IoT Botnets Behind Huge DDoS Attacks </a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/fcc-bans-import-consumer-grade-routers-national-security/815528/">FCC bans import of consumer-grade routers amid national security concerns</a></li>
										
                    	<li><a href="https://therecord.media/offensive-cyber-white-house-hacking">White House pours cold water on cyber ‘letters of marque’ speculation</a></li>
										
                    	<li><a href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/">Google launches threat disruption unit, stops short of calling it ‘offensive&#39;</a></li>
										
                    	<li><a href="https://www.msn.com/en-us/money/companies/supermicro-s-cofounder-was-just-arrested-for-allegedly-smuggling-25-billion-in-gpus-to-china/ar-AA1Z1PFT">Supermicro’s cofounder was just arrested for allegedly smuggling $2.5 billion in GPUs to China</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/20/cyberattack-on-vehicle-breathalyzer-company-leaves-drivers-stranded-across-the-us/">Cyberattack on vehicle breathalyzer company leaves drivers stranded across the US</a></li>
										
                    	<li><a href="https://therecord.media/man-pleads-guilty-8-million-ai-music-scheme">Man pleads guilty to $8 million AI-generated music scheme</a></li>
										
                    	<li><a href="https://ynet-pic1.yit.co.il/picserver6/wcm_upload_files/2026/03/24/SJv400a1iZg/____________.pdf">Two Israelis AI generated &quot;intelligence&quot; and sold it to Iran</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #829 -- Sneaky lobsters: Why AI is the new insider threat</title>
            <pubDate>Wed, 18 Mar 2026 14:39:30 +1100</pubDate>
            <link>https://risky.biz/RB829/</link>
            <guid isPermaLink="true">https://risky.biz/RB829/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB829.mp3" length="61224674" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3825</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They discuss:


  Iran’s Intune-based wiper attack on medical device maker Stryker
  Qihoo 360’s AI publishes its own wildcard TLS cert private key
  Instagram is canning its end-to-end encrypted messaging
  What’s going on with mobile internet access in Moscow?
  The Xbox One’s bootloader gets voltage glitched into submission
  Oh Qualys! We love you! (At least, whoever is in the basement writing these beautiful .txt files…)


This week’s episode is sponsored by browser-based detection and response company,  Push Security. Researcher Dan Green and Field CTO Mark Orlando join Pat to talk through the InstallFix variant of the *Fix attack technique.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They discuss:</p>

<ul>
  <li>Iran’s Intune-based wiper attack on medical device maker Stryker</li>
  <li>Qihoo 360’s AI publishes its own wildcard TLS cert private key</li>
  <li>Instagram is canning its end-to-end encrypted messaging</li>
  <li>What’s going on with mobile internet access in Moscow?</li>
  <li>The Xbox One’s bootloader gets voltage glitched into submission</li>
  <li>Oh Qualys! We love you! (At least, whoever is in the basement writing these beautiful .txt files…)</li>
</ul>

<p>This week’s episode is sponsored by browser-based detection and response company,  Push Security. Researcher Dan Green and Field CTO Mark Orlando join Pat to talk through the InstallFix variant of the *Fix attack technique.</p>

<p>This episode is also available on <a href="https://youtu.be/09jsoTMdOPw">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/">Iranian Hacktivists Strike Medical Device Maker Stryker in &quot;Severe&quot; Attack that Wiped Systems</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/17/stryker-says-its-restoring-systems-after-pro-iran-hackers-wiped-thousands-of-employee-devices/">Stryker says it&#39;s restoring systems after pro-Iran hackers wiped thousands of employee devices | TechCrunch</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/stryker-attack-device-management-microsoft-iran/814816/">Stryker attack raises concerns about role of device management tool | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/stryker-tells-sec-unknown-timeline-recovery">Stryker tells SEC that timeline for recovery from cyberattack unknown | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/handala-hacker-group-iran-us-israel-war/">How ‘Handala’ Became the Face of Iran’s Hacker Counterattacks | WIRED</a></li>
										
                    	<li><a href="https://www.forbes.com/sites/the-wiretap/2026/03/17/us-strikes-killed-iranian-cyber-chiefs-but-the-hacks-continued/">U.S Strikes Killed Iranian Cyber Chiefs, But The Hacks Continued</a></li>
										
                    	<li><a href="https://risky.biz/RBFEATURES4/">Risky Business Features: Being a Wartime CISO</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/03/supply-chain-attack-using-invisible-code-hits-github-and-other-repositories/">Supply-chain attack using invisible code hits GitHub and other repositories - Ars Technica</a></li>
										
                    	<li><a href="https://x.com/intcyberdigest/status/2033547961976639890">China&#39;s biggest cybersecurity company, Qihoo 360 just leaked their own wildcard SSL private key</a></li>
										
                    	<li><a href="https://www.irregular.com/publications/emergent-offensive-cyber-behavior-in-ai-agents">Emergent Cyber Behavior: When AI Agents Become Offensive Threat Actors - Irregular</a></li>
										
                    	<li><a href="https://risky.biz/RBFEATURES7">Risky Business Features: MCP is Dead</a></li>
										
                    	<li><a href="https://www.aisi.gov.uk/research/measuring-ai-agents-progress-on-multi-step-cyber-attack-scenarios">Measuring AI Agents’ Progress on Multi-Step Cyber Attack Scenarios</a></li>
										
                    	<li><a href="https://arxiv.org/pdf/2603.11214">Measuring AI Agents&#39; Progress on Multi-Step Cyber Attack Scenarios</a></li>
										
                    	<li><a href="https://help.instagram.com/491565145294150">What is end-to-end encryption on Instagram | Instagram Help Center</a></li>
										
                    	<li><a href="https://www.wired.com/story/us-lawmakers-move-to-kill-the-fbis-warrantless-wiretap-access/">US Lawmakers Move to Kill the FBI’s Warrantless Wiretap Access | WIRED</a></li>
										
                    	<li><a href="https://www.forbes.ru/tekhnologii/557184-v-moskve-zarabotali-belye-spiski-sajtov">Website &quot;whitelists&quot; launched in Moscow | Forbes.ru</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/foreign-hacker-2023-compromised-epstein-files-held-by-fbi-source-documents-show-2026-03-11/">Exclusive: Foreign hacker in 2023 compromised Epstein files held by FBI, source and documents show | Reuters</a></li>
										
                    	<li><a href="https://cyberscoop.com/digitalmint-ransomware-negotiator-arrest-angelo-martino-extortion/">Feds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million | CyberScoop</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/03/researchers-disclose-vulnerabilities-in-ip-kvms-from-4-manufacturers/">Researchers disclose vulnerabilities in IP KVMs from four manufacturers - Ars Technica</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=FTFn4UZsA5U">RE//verse 2026: Hacking the Xbox One by Markus &#39;doom&#39; Gaasedelen - YouTube</a></li>
										
                    	<li><a href="https://cdn2.qualys.com/advisory/2026/03/10/crack-armor.txt">CrackArmor: Multiple vulnerabilities in AppArmor</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: It took a decade, but allowlisting is cool again</title>
            <pubDate>Fri, 13 Mar 2026 10:12:14 +1100</pubDate>
            <link>https://risky.biz/SOAPBOX105/</link>
            <guid isPermaLink="true">https://risky.biz/SOAPBOX105/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SOAPBOX105.mp3" length="39510089" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1645</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Soap Box edition of the Risky Business podcast Patrick Gray sits down with Airlock Digital co-founders Daniel Schell and David Cottingham to talk about the role AI models could play in managing enterprise allowlists.

They also talk about the durability of allowlisting as a control. After 12 years in business, the Airlock product hasn’t really changed all that much. That’s a good thing! It also means the Airlock team have been able to spend some time doing deep engineering instead of chasing the latest attacker TTPs and writing detection rules for them.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Soap Box edition of the Risky Business podcast Patrick Gray sits down with Airlock Digital co-founders Daniel Schell and David Cottingham to talk about the role AI models could play in managing enterprise allowlists.</p>

<p>They also talk about the durability of allowlisting as a control. After 12 years in business, the Airlock product hasn’t really changed all that much. That’s a good thing! It also means the Airlock team have been able to spend some time doing deep engineering instead of chasing the latest attacker TTPs and writing detection rules for them.</p>

<p>This episode is also available on <a href="https://youtu.be/1ztwRRcJDl8">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #828 -- The Coruna exploits are truly exquisite</title>
            <pubDate>Wed, 11 Mar 2026 15:31:39 +1100</pubDate>
            <link>https://risky.biz/RB828/</link>
            <guid isPermaLink="true">https://risky.biz/RB828/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB828.mp3" length="59998344" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3748</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:


  The Coruna exploits were L3 Harris, but it seems Triangulation… was not!
  Iran’s cyber HQ hit by Israeli (kinetic) strikes
  Trump’s cyber “strategy” is … well, all we’ve got is jokes cause there’s no serious content
  NSA and CyberCom finally get a leader after Lt Gen Joshua Rudd gets Senate nod
  DOGE (remember them?!) employee walked a social security database out on a USB stick


This episode is sponsored by open source cloud security scanner Prowler. Creator and CEO Toni de la Fuente talks to Pat about some of the enterprise features Prowler is growing, while remaining true to its open source roots.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:</p>

<ul>
  <li>The Coruna exploits were L3 Harris, but it seems Triangulation… was not!</li>
  <li>Iran’s cyber HQ hit by Israeli (kinetic) strikes</li>
  <li>Trump’s cyber “strategy” is … well, all we’ve got is jokes cause there’s no serious content</li>
  <li>NSA and CyberCom finally get a leader after Lt Gen Joshua Rudd gets Senate nod</li>
  <li>DOGE (remember them?!) employee walked a social security database out on a USB stick</li>
</ul>

<p>This episode is sponsored by open source cloud security scanner Prowler. Creator and CEO Toni de la Fuente talks to Pat about some of the enterprise features Prowler is growing, while remaining true to its open source roots.</p>

<p>This episode is also available on <a href="https://youtu.be/dhhYvPGu74U">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.nadsec.online/blog/coruna">Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript</a></li>
										
                    	<li><a href="https://github.com/matteyeux/coruna">GitHub - matteyeux/coruna: deobfuscated JS and blobs</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/10/us-military-contractor-likely-built-iphone-hacking-tools-used-by-russian-spies-in-ukraine/">US military contractor likely built iPhone hacking tools used by Russian spies in Ukraine</a></li>
										
                    	<li><a href="https://businessinsights.bitdefender.com/apt36-nightmare-vibeware">APT36: A Nightmare of Vibeware</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/state-linked-actors-targeted-us-networks-in-lead-up-to-iran-war/814190/">State-linked actors targeted US networks in lead-up to Iran war</a></li>
										
                    	<li><a href="https://www.scworld.com/brief/iranian-cyber-warfare-hq-allegedly-hit-by-israel">Iranian cyber warfare HQ allegedly hit by Israel</a></li>
										
                    	<li><a href="https://apnews.com/article/iran-us-military-deaths-0a3f1532ec1953d51898e5b5e2b625d6">Last 2 names of 6 US soldiers who died in Kuwait attack identified by the Pentagon</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/signal-whatsapp-users-face-russian-phishing-push-dutch-warn-rcna262533">Signal, WhatsApp users face Russian phishing push, Dutch warn</a></li>
										
                    	<li><a href="https://x.com/sambendett/status/2031468780560265571?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Samuel Bendett on X: &quot;Russian military told it couldn&#39;t use Telegram messaging app&quot;</a></li>
										
                    	<li><a href="https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network">FBI investigating ‘suspicious’ cyber activities on critical surveillance network </a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-new-white-house-eo-prioritizes-fight-against-scams-and-cybercrime/">Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime</a></li>
										
                    	<li><a href="https://www.whitehouse.gov/wp-content/uploads/2026/03/President-Trumps-Cyber-Strategy-for-America.pdf">President Trump’s CYBER STRATEGY for America</a></li>
										
                    	<li><a href="https://www.whitehouse.gov/fact-sheets/2026/03/fact-sheet-president-donald-j-trump-combats-cybercrime-fraud-and-predatory-schemes-against-american-citizens/">Fact Sheet: President Donald J. Trump Combats Cybercrime, Fraud, and Predatory Schemes Against American Citizens</a></li>
										
                    	<li><a href="https://therecord.media/uk-plans-to-shift-fraud-fight-to-telecoms-tech">UK plans to shift fraud fight onto telecoms, tech companies</a></li>
										
                    	<li><a href="https://www.axios.com/2026/03/09/trump-white-house-anthropic-executive-order?utm_source=x&amp;utm_campaign=editorial&amp;utm_medium=owned_social">Trump to hit Anthropic with executive order to remove &quot;woke&quot; AI Claude</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/09/anthropic-launches-code-review-tool-to-check-flood-of-ai-generated-code/">Anthropic launches code review tool to check flood of AI-generated code</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/crowdstrike-record-quarter-investor-concerns-ai/813791/">CrowdStrike reports record quarter amid investor concerns about AI impact</a></li>
										
                    	<li><a href="https://cyberscoop.com/pac4j-open-source-library-vulnerability-max-severity-risk/">Critical defect in Java security engine poses serious downstream security risks </a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2026/03/10/joshua-rudd-nsa-cyber-command-confirmed/">Gen. Joshua Rudd confirmed as NSA, Cyber Command head</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/sean-plankey-cisa-dhs-controversy/813898/">Plankey’s nomination as CISA director now in jeopardy</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/10/doge-employee-stole-social-security-data-and-put-it-on-a-thumb-drive-report-says/">DOGE employee stole Social Security data and put it on a thumb drive, report says</a></li>
										
                    	<li><a href="https://unit42.paloaltonetworks.com/gemini-live-in-chrome-hijacking/">Taming Agentic Browsers: Vulnerability in Chrome Allowed Extensions to Hijack New Gemini Panel</a></li>
										
                    	<li><a href="https://startupcafe.ro/cel-mai-mare-exportator-roman-carne-cocorico-restructurari-alaturi-casa-insolventa-transilvania- 94953">Cel mai mare exportator român de carne, deținătorul brandului Cocorico, a intrat în restructurări, alături de Casa de Insolvență Transilvania</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #827 -- Iranian cyber threat actors are down but not out</title>
            <pubDate>Wed, 04 Mar 2026 15:29:15 +1100</pubDate>
            <link>https://risky.biz/RB827/</link>
            <guid isPermaLink="true">https://risky.biz/RB827/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB827.mp3" length="58974310" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3684</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:


  The US-Israeli attack on Iran had a whole lot of cyber. It’s clearly in the playbook now!
  The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used by Chinese crypto scammers
  So long Maddhu Gottumukkala, but CISA’s annus horribilis continues
  Adam “humbug” Boileau complains about the Airsnitch wifi attack just being three ethernets in a trenchcoat
  ASD’s Cisco SD-WAN threat hunting guide is clearly borne of … experience


This week’s episode is sponsored by AI threat hunting platform Nebulock. Sydney Marrone joins to talk about how useful AI models are on the hunt, and her work building out an open source framework and maturity model. It’s methodology agnostic, so you can adapt it for your environment, and the github link is in the show notes!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:</p>

<ul>
  <li>The US-Israeli attack on Iran had a whole lot of cyber. It’s clearly in the playbook now!</li>
  <li>The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used by Chinese crypto scammers</li>
  <li>So long Maddhu Gottumukkala, but CISA’s annus horribilis continues</li>
  <li>Adam “humbug” Boileau complains about the Airsnitch wifi attack just being three ethernets in a trenchcoat</li>
  <li>ASD’s Cisco SD-WAN threat hunting guide is clearly borne of … experience</li>
</ul>

<p>This week’s episode is sponsored by AI threat hunting platform Nebulock. Sydney Marrone joins to talk about how useful AI models are on the hunt, and her work building out an open source framework and maturity model. It’s methodology agnostic, so you can adapt it for your environment, and the github link is in the show notes!</p>

<p>This episode is also available on <a href="https://youtu.be/4MwR6dRixJo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.ft.com/content/bf998c69-ab46-4fa3-aae4-8f18f7387836">Inside the plan to kill Ali Khamenei</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/03/03/hacked-traffic-cams-and-hijacked-tvs-how-cyber-operations-supported-the-war-against-iran/">Hacked traffic cams and hijacked TVs: How cyber operations supported the war against Iran | TechCrunch</a></li>
										
                    	<li><a href="https://x.com/eastdakota/status/2028185851965170047?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Matthew Prince 🌥 on X: &quot;Counter to what some cyber vendors are saying, there’s been a dramatic drop in Iranian cyber operations. Likely as the operators are sheltering. They may pick back up, but right now there’s a noticeable lull.&quot; / X</a></li>
										
                    	<li><a href="https://therecord.media/iran-cyber-us-command-attack">Cyber Command disrupted Iranian comms, sensors, top general says | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.forbes.com/sites/thomasbrewster/2026/03/02/iran-hackers-use-elon-musk-starlink-to-stay-online/">Iranian Hackers Use Elon Musk’s Starlink To Stay Online</a></li>
										
                    	<li><a href="https://www.wsj.com/world/middle-east/u-s-smuggled-thousands-of-starlink-terminals-into-iran-after-protest-crackdown-69a8c74f">Exclusive | U.S. Smuggled Thousands of Starlink Terminals Into Iran After Protest Crackdown - WSJ</a></li>
										
                    	<li><a href="https://www.wired.com/story/gps-attacks-on-ships-spike-amid-the-us-and-israeli-war-on-iran/">Attacks on GPS Spike Amid US and Israeli War on Iran | WIRED</a></li>
										
                    	<li><a href="https://www.404media.co/amazon-data-centers-on-fire-after-iranian-missile-strikes-on-dubai/">Amazon Data Centers on Fire After Iranian Missile Strikes on Dubai</a></li>
										
                    	<li><a href="https://www.wired.com/story/coruna-iphone-hacking-toolkit-us-government/">A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals | WIRED</a></li>
										
                    	<li><a href="https://www.politico.com/news/2026/02/28/cisa-cyber-leadership-madhu-gottumukkala-00804515">Canceled contracts, a failed polygraph and personal disputes: Inside the turbulent tenure of Noem’s former cyber czar - POLITICO</a></li>
										
                    	<li><a href="https://cyberscoop.com/cisa-cio-robert-costello-exits-agency/">CISA CIO Robert Costello exits agency | CyberScoop</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/tech-news/openai-alters-deal-pentagon-critics-sound-alarm-surveillance-rcna261357">OpenAI alters deal with Pentagon as critics sound alarm over surveillance</a></li>
										
                    	<li><a href="https://www.theatlantic.com/technology/2026/03/inside-anthropics-killer-robot-dispute-with-the-pentagon/686200/?gift=2iIN4YrefPjuvZ5d2Kh30zpPxOtZj8TuGGLnTN11Z-s">Inside Anthropic’s Killer-Robot Dispute With the Pentagon - The Atlantic</a></li>
										
                    	<li><a href="https://www.cbsnews.com/news/anthropic-ceo-dario-amodei-full-transcript/">Read the full transcript of our interview with Anthropic CEO Dario Amodei - CBS News</a></li>
										
                    	<li><a href="https://www.404media.co/cbp-tapped-into-the-online-advertising-ecosystem-to-track-peoples-movements/">CBP Tapped Into the Online Advertising Ecosystem To Track Peoples’ Movements</a></li>
										
                    	<li><a href="https://simonlermen.substack.com/p/large-scale-online-deanonymization">Large-Scale Online Deanonymization with LLMs</a></li>
										
                    	<li><a href="https://www.securityweek.com/hackers-weaponize-claude-code-in-mexican-government-cyberattack/">Hackers Weaponize Claude Code in Mexican Government Cyberattack - SecurityWeek</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/">New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises - Ars Technica</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-emergency-directive-cisco-sd-wan-devices/813110/">CISA orders agencies to patch Cisco devices now under attack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">CISCO SD-WAN THREAT HUNT GUIDE</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/clawjacked-attack-let-malicious-websites-hijack-openclaw-to-steal-data/">ClawJacked attack let malicious websites hijack OpenClaw to steal data</a></li>
										
                    	<li><a href="https://www.wired.com/story/security-news-this-week-area-man-accidentally-hacks-6700-camera-enabled-robot-vacuums/">Area Man Accidentally Hacks 6,700 Camera-Enabled Robot Vacuums | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/spyware-intellexa-greece-sentenced">Intellexa founder, three others sentenced to 8 years in prison over Greek spyware scandal | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/moscow-man-accused-of-extorting-conti-gang">Moscow man accused of posing as FSB officer to extort Conti ransomware gang | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://blog.recurity-labs.com/2026-03-02/Farewell_Felix">Farewell, Felix · The Recurity Lablog</a></li>
										
                    	<li><a href="https://www.atmosgroup.com.au/atmos-sphere-2026">Atmos Sphere 2026 | Atmos</a></li>
										
                    	<li><a href="https://nebulock.io/blog/agentic-threat-hunting-framework">The Agentic Threat Hunting Framework | Nebulock blog</a></li>
										
                    	<li><a href="https://github.com/Nebulock-Inc/agentic-threat-hunting-framework">GitHub - Nebulock-Inc/agentic-threat-hunting-framework: ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy. · GitHub</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #826 -- A week of AI mishaps and skulduggery</title>
            <pubDate>Wed, 25 Feb 2026 14:49:29 +1100</pubDate>
            <link>https://risky.biz/RB826/</link>
            <guid isPermaLink="true">https://risky.biz/RB826/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB826.mp3" length="63564254" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3971</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:


  Low skill actors compromise 600 Fortinets with AI-generated playbooks
  Anthropic calls out Chinese AI firms over model distillation
  Meta’s director of AI safety tells her ClawdBot not to delete her mail… so of course it does
  Peter Williams cops 7 years in jail for selling L3 Harris Trenchant’s  exploits to Russia
  Ivanti got hacked in 2021 via… bugs in Ivanti


This episode is sponsored by line-rate network capture system Corelight. CEO Brian Dye joins to discuss what AI can do for defenders, and what it can’t.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:</p>

<ul>
  <li>Low skill actors compromise 600 Fortinets with AI-generated playbooks</li>
  <li>Anthropic calls out Chinese AI firms over model distillation</li>
  <li>Meta’s director of AI safety tells her ClawdBot not to delete her mail… so of course it does</li>
  <li>Peter Williams cops 7 years in jail for selling L3 Harris Trenchant’s  exploits to Russia</li>
  <li>Ivanti got hacked in 2021 via… bugs in Ivanti</li>
</ul>

<p>This episode is sponsored by line-rate network capture system Corelight. CEO Brian Dye joins to discuss what AI can do for defenders, and what it can’t.</p>

<p>This episode is also available on <a href="https://youtu.be/yy5H2eE5h98">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AI-augmented threat actor accesses FortiGate devices at scale</a></li>
										
                    	<li><a href="https://x.com/uk_daniel_card/status/2025158197019849126?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">&quot;this reads to me like: they ran existing tools.... but with a cool dashboard :D&quot;</a></li>
										
                    	<li><a href="https://cyberscoop.com/anthropic-accuses-chinese-labs-ai-distillation-cyber-risk/">Anthropic accuses Chinese labs of trying to illicitly take Claude’s capabilities | CyberScoop</a></li>
										
                    	<li><a href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Detecting and preventing distillation attacks</a></li>
										
                    	<li><a href="https://apnews.com/article/anthropic-hegseth-ai-pentagon-military-3d86c9296fe953ec0591fcde6a613aba">Hegseth warns Anthropic to let the military use the company’s AI tech as it sees fit, AP sources say</a></li>
										
                    	<li><a href="https://cyberscoop.com/anthropic-claude-code-security-automated-security-review/">Anthropic Rolls Out Embedded Security Scanning for Claude</a></li>
										
                    	<li><a href="https://arstechnica.com/ai/2026/02/an-ai-coding-bot-took-down-amazon-web-services/">AWS&#39;s AI Coding Bot Kiro Caused a 13-Hour Outage</a></li>
										
                    	<li><a href="https://www.microsoft.com/en-us/security/blog/2026/02/19/running-openclaw-safely-identity-isolation-runtime-risk/">Running OpenClaw safely: identity, isolation, and runtime risk</a></li>
										
                    	<li><a href="https://risky.biz/RBFEATURES2/">Former Adobe, Cisco and Salesforce CISO talks AI pentesting</a></li>
										
                    	<li><a href="https://risky.biz/RBFEATURES1/">History Repeats: Security in the AI Agent Era</a></li>
										
                    	<li><a href="https://www.404media.co/meta-director-of-ai-safety-allows-ai-agent-to-accidentally-delete-her-inbox/">Meta Director of AI Safety Allows AI Agent to Accidentally Delete Her Inbox</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/02/18/microsoft-says-office-bug-exposed-customers-confidential-emails-to-copilot-ai/">Microsoft says Office bug exposed customers&#39; confidential emails to Copilot AI | TechCrunch</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-adds-copilot-data-controls-to-all-storage-locations/">The (tangential) fix: Microsoft adds Copilot data controls to all storage locations</a></li>
										
                    	<li><a href="https://cyberscoop.com/l3harris-executive-peter-williams-sentenced-zero-day-exploits-russia/">Ex-L3Harris executive sentenced to 87 months in prison for selling zero-day exploits to Russian broker</a></li>
										
                    	<li><a href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-russia-starts-criminal-probe-of-telegram-founder-pavel-durov/">Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov</a></li>
										
                    	<li><a href="https://therecord.media/ukraine-telegram-regulation-russia-sabotage-recruitment">Ukraine pushes tighter Telegram regulation, citing Russian recruitment of locals</a></li>
										
                    	<li><a href="https://vmfunc.re/blog/persona">The watchers: how openai, the US government, and persona built an identity surveillance machine that files reports on you to the feds</a></li>
										
                    	<li><a href="https://piunikaweb.com/2026/02/20/persona-denies-ice-dhs-ties-customer-email/">Persona emails customers saying they don’t work with ICE or DHS amid ‘surveillance’ claims</a></li>
										
                    	<li><a href="https://www.akamai.com/blog/security-research/2026/feb/inside-the-fix-cve-2026-21513-mshtml-exploit-analysis">Inside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513</a></li>
										
                    	<li><a href="https://www.bloomberg.com/news/features/2026-02-19/vpn-used-by-us-government-failed-to-stop-china-state-sponsored-hackers">Ivanti hacked in 2021 via its own product</a></li>
										
                    	<li><a href="https://therecord.media/fed-agencies-ordered-to-patch-dell-bug-after-exploitation-warning">Fed agencies ordered to patch Dell bug by Saturday after exploitation warning | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day">From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: The lethal trifecta of AI risks</title>
            <pubDate>Fri, 20 Feb 2026 10:33:55 +1100</pubDate>
            <link>https://risky.biz/soapbox104/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox104/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox104.mp3" length="54096822" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2253</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                There’s a lethal trifecta of AI risks: access to private data, exposure to untrusted content, and external communication. In this conversation, Risky Business host Patrick Gray chats with Josh Devon, the co-founder of Sondera, about how to best address these risks.

There is no magic solution to this problem. AI models mix code and data, are non-deterministic, and are crawling around all over your enterprise data and APIs as you read this.

But in this sponsored interview, Josh outlines how we can start to wrap our hands around the problem.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>There’s a lethal trifecta of AI risks: access to private data, exposure to untrusted content, and external communication. In this conversation, Risky Business host Patrick Gray chats with Josh Devon, the co-founder of Sondera, about how to best address these risks.</p>

<p>There is no magic solution to this problem. AI models mix code and data, are non-deterministic, and are crawling around all over your enterprise data and APIs as you read this.</p>

<p>But in this sponsored interview, Josh outlines how we can start to wrap our hands around the problem.</p>

<p>This episode is also available on <a href="https://youtu.be/BB9evsAp8mI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #825 -- Palo Alto Networks blames it on the boogie</title>
            <pubDate>Wed, 18 Feb 2026 14:49:36 +1100</pubDate>
            <link>https://risky.biz/RB825/</link>
            <guid isPermaLink="true">https://risky.biz/RB825/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB825.mp3" length="91048702" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3793</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:


  Palo Alto threat researchers want to attribute to China, but management says shush
  An increasing proportion of ransomware is data extortion. Is this good?
  Cambodia says it’s going to dismantle scam compounds
  CISA sufferers through yet another shutdown
  Google Gemini’s training secrets are being systematically harvested to improve other LLMs
  Academics assess SaaS password managers’ resilience against a malicious server


This episode is sponsored by SSO-firewall integration vendor Knocknoc. Chief exec Adam Pointon joins to talk about the latest in defences… which is to say Knocknoc for Solaris/Sparc and HPUX on PA-RISC?! Okay also that other little known OS… Windows.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:</p>

<ul>
  <li>Palo Alto threat researchers want to attribute to China, but management says shush</li>
  <li>An increasing proportion of ransomware is data extortion. Is this good?</li>
  <li>Cambodia says it’s going to dismantle scam compounds</li>
  <li>CISA sufferers through yet another shutdown</li>
  <li>Google Gemini’s training secrets are being systematically harvested to improve other LLMs</li>
  <li>Academics assess SaaS password managers’ resilience against a malicious server</li>
</ul>

<p>This episode is sponsored by SSO-firewall integration vendor Knocknoc. Chief exec Adam Pointon joins to talk about the latest in defences… which is to say Knocknoc for Solaris/Sparc and HPUX on PA-RISC?! Okay also that other little known OS… Windows.</p>

<p>This episode is also available on <a href="https://youtu.be/kNVm-iRCxo4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.cybersecuritydive.com/news/ransomware-extortion-bec-arctic-wolf/812321/">Data-only extortion grows as ransomware gangs seek better profits | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arcticwolf.com/resource/_pfcdn/assets/preprocessed/10926/33669238-9331-4464-918c-c77e18337e92/33669238-9331-4464-918c-c77e18337e92.pdf">Arctic Wolf Threat Report 2026</a></li>
										
                    	<li><a href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources say</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-cambodia-promises-to-dismantle-scam-networks-by-april/">Risky Bulletin: Cambodia promises to dismantle scam networks by April - Risky Business Media</a></li>
										
                    	<li><a href="https://www.theguardian.com/technology/2025/dec/02/scam-state-multi-billion-dollar-industry-south-east-asia">Age of the ‘scam state’: how an illicit, multibillion-dollar industry has taken root in south-east Asia | Cybercrime | The Guardian</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-flaw-beyondtrust-remote-support-early-exploitation/812215/">Critical flaw in BeyondTrust Remote Support sees early signs of exploitation | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/">CISA Navigates DHS Shutdown With Reduced Staff - SecurityWeek</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/">Kimwolf Botnet Swamps Anonymity Network I2P – Krebs on Security</a></li>
										
                    	<li><a href="https://www.elastic.co/security-labs/badiis-to-the-bone-new-insights-to-global-seo-poisoning-campaign">BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign — Elastic Security Labs</a></li>
										
                    	<li><a href="https://therecord.media/500000-vkontakte-accounts-hijacked-chrome-extensions">Over 500,000 VKontakte accounts hijacked through malicious Chrome extensions | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/02/password-managers-promise-that-they-cant-see-your-vaults-isnt-always-true/">Password managers&#39; promise that they can&#39;t see your vaults isn&#39;t always true - Ars Technica</a></li>
										
                    	<li><a href="https://eprint.iacr.org/2026/058.pdf">Zero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers</a></li>
										
                    	<li><a href="https://cyberscoop.com/state-hackers-using-gemini-google-ai/">Google finds state-sponsored hackers use AI at &#39;all stages&#39; of attack cycle  | CyberScoop</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/google-gemini-hit-100000-prompts-cloning-attempt-rcna258657">Google: Gemini hit with 100,000+ prompts in cloning attempt</a></li>
										
                    	<li><a href="https://cyberscoop.com/proofpoint-acuvity-deal-agentic-ai-security/">Proofpoint acquires Acuvity to tackle the security risks of agentic AI | CyberScoop</a></li>
										
                    	<li><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2026/m02/cisco-redefines-security-for-the-agentic-era.html">Cisco Redefines Security for the Agentic Era with AI Defense Expansion and AI-Aware SASE</a></li>
										
                    	<li><a href="https://www.sophos.com/en-us/press/press-releases/2026/02/sophos-acquires-arco-cyber">Sophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every Organization</a></li>
										
                    	<li><a href="https://x.com/hackingdave/status/2023079529569214868?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Dave Kennedy on X: &quot;Regarding this, there was a couple questions on does the pacemaker continue to advertise - most BLE implantable devices go into a sleep type mode. In this case, we are lucky - it does not. We know based on law enforcement answers that she is using a more modern pacemaker with&quot; / X</a></li>
										
                    	<li><a href="https://x.com/clashreport/status/2023077430840172571?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Clash Report on X: &quot;BIG: Dutch Defence Minister Gijs Tuinman hints that software independence is possible for F-35 jets. He literally said you can “jailbreak” an F-35. When asked if Europe can modify it without US approval: “That’s not the point… we’ll see whether the Americans will show https://t.co/f11cGvtYsO&quot; / X</a></li>
										
                    	<li><a href="https://therecord.media/netherlands-arrest-confidential-files-police">Dutch police arrest man who refused to delete confidential files shared by mistake | The Record from Recorded Future News</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #824 -- Microsoft&apos;s Secure Future is looking a bit wobbly</title>
            <pubDate>Wed, 11 Feb 2026 14:50:13 +1100</pubDate>
            <link>https://risky.biz/RB824/</link>
            <guid isPermaLink="true">https://risky.biz/RB824/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB824.mp3" length="53984738" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3373</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Microsoft reshuffles security leadership. It doesn’t spark joy.
  Russia is hacking the Winter Olympics. Again. But y tho?
  China-linked groups are keeping busy, hacking telcos in Norway, Singapore and dozens of others
  Campaigns underway targeting Ivanti, BeyondTrust and SolarWinds products
  An unknown hero blocks 23/tcp on the US internet backbone
  And James Wilson pops into talk about Claude’s go at a C compiler


This week’s episode is sponsored by Ent.AI, an AI startup that isn’t quite ready to tell us all what they’re doing. But nevertheless, founder Brandon Dixon joins to discuss AI’s role in security. Where does language-based understanding take us that previous methods couldn’t?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Microsoft reshuffles security leadership. It doesn’t spark joy.</li>
  <li>Russia is hacking the Winter Olympics. Again. But y tho?</li>
  <li>China-linked groups are keeping busy, hacking telcos in Norway, Singapore and dozens of others</li>
  <li>Campaigns underway targeting Ivanti, BeyondTrust and SolarWinds products</li>
  <li>An unknown hero blocks 23/tcp on the US internet backbone</li>
  <li>And James Wilson pops into talk about Claude’s go at a C compiler</li>
</ul>

<p>This week’s episode is sponsored by Ent.AI, an AI startup that isn’t quite ready to tell us all what they’re doing. But nevertheless, founder Brandon Dixon joins to discuss AI’s role in security. Where does language-based understanding take us that previous methods couldn’t?</p>

<p>This episode is also available on <a href="https://youtu.be/GdO-16hDnIE">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://blogs.microsoft.com/ blog/2026/02/04/updates-in-two-of-our-core-priorities/">Updates in two of our core priorities - The Official Microsoft Blog</a></li>
										
                    	<li><a href="https://blogs.windows.com/windowsexperience/2026/02/09/strengthening-windows-trust-and-security-through-user-transparency-and-consent/">Strengthening Windows trust and security through User Transparency and Consent | Windows Experience Blog</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-secure-boot-certificate-update/811846/">Microsoft prepares to refresh Secure Boot’s digital certificate | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://cyberscoop.com/microsoft-patch-tuesday-february-2026/">Microsoft Patch Tuesday matches last year’s zero-day high with six actively exploited vulnerabilities | CyberScoop</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/02/russian-state-hackers-exploit-office-vulnerability-to-infect-computers/">Microsoft releases urgent Office patch. Russian-state hackers pounce. - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/italy-blames-russia-linked-hackers-winter-games-cyberattack">Italy blames Russia-linked hackers for cyberattacks ahead of Winter Olympics | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/research-cyber-espionage-targeting-dozens-worldwide">Researchers uncover vast cyberespionage operation targeting dozens of governments worldwide | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/germany-warns-phishing-campaign-signal-gov-officials-journalists">Germany warns of state-linked phishing campaign targeting journalists, government officials | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/norawy-intelligence-discloses-salt-typhoon-attacks">Norwegian intelligence discloses country hit by Salt Typhoon campaign | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/singapore-attributes-telecoms-hacks-unc3886">Singapore says China-linked hackers targeted telecom providers in major spying campaign | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Largest Multi-Agency Cyber Operation Mounted to Counter Threat Posed by Advanced Persistent Threat (APT) Actor UNC3886 to Singapore’s Telecommunications Sector | Cyber Security Agency of Singapore</a></li>
										
                    	<li><a href="https://www.intel.com/content/www/us/en/security/security-practices/blogs/google-collaboration-strengthen-intel-tdx.html">How Intel and Google Collaborate to Strengthen Intel® TDX</a></li>
										
                    	<li><a href="https://bughunters.google.com/blog/a-joint-security-review-of-intel-tdx-15">Strengthening the Foundation: A Joint Security Review of Intel TDX 1.5 - Google Bug Hunters</a></li>
										
                    	<li><a href="https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399">Active Exploitation of SolarWinds Web Help Desk (CVE-2025-26399) | Huntress</a></li>
										
                    	<li><a href="https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days">EU, Dutch government announce hacks following Ivanti zero-days | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/north-korean-hackers-targeted-crypto-exec-clickfix">North Korean hackers targeted crypto exec with fake Zoom meeting, ClickFix scam | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/">BeyondTrust warns of critical RCE flaw in remote support software</a></li>
										
                    	<li><a href="https://attackerkb.com/topics/jNMBccstay/cve-2026-1731/rapid7-analysis">Rapid7 Analysis of CVE-2026-1731</a></li>
										
                    	<li><a href="https://www.anthropic.com/engineering/building-c-compiler">Building a C compiler with a team of parallel Claudes \ Anthropic</a></li>
										
                    	<li><a href="https://bsky.app/profile/ryiron.bsky.social/post/3me6gr5p3ik25">(1) Post by @ryiron.bsky.social — Bluesky</a></li>
										
                    	<li><a href="https://aisle.com/blog/what-ai-security-research-looks-like-when-it-works">What AI Security Research Looks Like When It Works | AISLE</a></li>
										
                    	<li><a href="https://www.theguardian.com/world/2026/feb/10/bithumb-korean-crypto-exchange-sent-bitcoin-mistake">South Korean crypto exchange races to recover $40bn of bitcoin sent to customers by mistake | South Korea | The Guardian</a></li>
										
                    	<li><a href="https://therecord.media/white-house-to-meet-gop-lawmakers-702-renewal-path">White House to meet with GOP lawmakers on FISA Section 702 renewal | The Record from Recorded Future News</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #823 -- Humans impersonate clawdbots impersonating humans</title>
            <pubDate>Wed, 04 Feb 2026 14:13:54 +1100</pubDate>
            <link>https://risky.biz/RB823/</link>
            <guid isPermaLink="true">https://risky.biz/RB823/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB823.mp3" length="53922914" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3369</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Patrick Gray and Adam Boileau are joined by the newest guy on the Risky Business Media team, James WIlson. They discuss the week’s cybersecurity news, including:


  Notepad++ update supply chain attack has been attributed to China
  The AI agent future is even more stupid than expected; behold the OpenClaw/Clawdbot/Moltbook mess
  The Epstein files claim he had a personal hacker?
  Microsoft is finally getting ready to (think about starting to begin to) disable NTLM by default
  The usual bugs in the usual things! Ivanti, Fortinet, and Solarwinds. Again.
  Telco hides a free trip in its privacy policy, someone actually reads it and wins!


This weeks’s episode is sponsored by opensource IDP platform Authentik. CEO Fletcher Heisler talks to Pat about their new endpoint agent that can enforce device posture policies during login.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Patrick Gray and Adam Boileau are joined by the newest guy on the Risky Business Media team, James WIlson. They discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Notepad++ update supply chain attack has been attributed to China</li>
  <li>The AI agent future is even more stupid than expected; behold the OpenClaw/Clawdbot/Moltbook mess</li>
  <li>The Epstein files claim he had a personal hacker?</li>
  <li>Microsoft is finally getting ready to (think about starting to begin to) disable NTLM by default</li>
  <li>The usual bugs in the usual things! Ivanti, Fortinet, and Solarwinds. Again.</li>
  <li>Telco hides a free trip in its privacy policy, someone actually reads it and wins!</li>
</ul>

<p>This weeks’s episode is sponsored by opensource IDP platform Authentik. CEO Fletcher Heisler talks to Pat about their new endpoint agent that can enforce device posture policies during login.</p>

<p>This episode is also available on <a href="https://youtu.be/W5hxcHaNDMs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit</a></li>
										
                    	<li><a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/">Notepad++ Hijacked by State-Sponsored Hackers | Notepad++</a></li>
										
                    	<li><a href="https://notepad-plus-plus.org/news/v883-self-signed-certificate/">Notepad++ v8.8.3 - Self-signed Certificate: Certified by Code, Not Corporations | Notepad++</a></li>
										
                    	<li><a href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys">Hacking Moltbook: AI Social Network Reveals 1.5M API Keys | Wiz Blog</a></li>
										
                    	<li><a href="https://x.com/lcamtuf/status/2017751093653229597?s=20">lcamtuf on X: &quot;Moltbook debate in a nutshell&quot; / X</a></li>
										
                    	<li><a href="https://www.404media.co/exposed-moltbook-database-let-anyone-take-control-of-any-ai-agent-on-the-site/">Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site</a></li>
										
                    	<li><a href="https://x.com/AndrewMohawk/status/2017858486491599239">AndrewMohawk on X: &quot;How exactly did an attacker send a message to your bot since you need to approve all the channels and set keys etc&quot; / X</a></li>
										
                    	<li><a href="https://cyberinsider.com/signal-president-warns-ai-agents-are-making-encryption-irrelevant/">Signal president warns AI agents are making encryption irrelevant</a></li>
										
                    	<li><a href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/">Massive AI Chat App Leaked Millions of Users Private Conversations</a></li>
										
                    	<li><a href="https://x.com/runasand/status/2017652181441118603">Runa Sandvik on X: New court record from the FBI details the state of the devices seized from Washington Post reporter Hannah Natanson</a></li>
										
                    	<li><a href="https://www.justice.gov/epstein/files/DataSet%2010/EFTA01683874.pdf">EFTA01683874.pdf</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network">Disrupting the World&#39;s Largest Residential Proxy Network | Google Cloud Blog</a></li>
										
                    	<li><a href="https://www.reuters.com/world/americas/nobel-committee-says-peace-prize-winner-likely-revealed-early-by-digital-spying-2026-01-30/">Nobel Committee says Peace Prize winner likely revealed early by digital spying | Reuters</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/01/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/">County pays $600,000 to pentesters it arrested for assessing courthouse security - Ars Technica</a></li>
										
                    	<li><a href="https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526">Advancing Windows security: Disabling NTLM by default - Windows IT Pro Blog</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-flaws-ivanti-epmm-exploitation/811228/">Critical flaws in Ivanti EPMM lead to fast-moving exploitation attempts | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/cisa-orders-agencies-patch-solarwinds-vuln">CISA orders federal agencies to patch exploited SolarWinds bug by Friday | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-researchers-warn-forticloud-flaw-attack/810861/">CISA, security researchers warn FortiCloud SSO flaw is under attack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/01/29/fintech-firm-marquis-blames-hack-at-firewall-provider-sonicwall-for-its-data-breach/">Fintech firm Marquis blames hack at firewall provider SonicWall for its data breach | TechCrunch</a></li>
										
                    	<li><a href="https://www.cape.co/blog/easter-egg-in-privacy-policy">We Hid a Free Trip to Switzerland in Our Privacy Policy. Someone Found It in 2 Weeks. - Cape</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=IqLHE-lIP4s">Between Two Nerds: The internal logic of Russian power grid attacks - YouTube</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #822 -- France will ditch American tech over security risks</title>
            <pubDate>Wed, 28 Jan 2026 14:35:47 +1100</pubDate>
            <link>https://risky.biz/RB822/</link>
            <guid isPermaLink="true">https://risky.biz/RB822/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB822.mp3" length="61538376" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3845</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. They discuss:


  La France is tres sérieux about ditching US productivity software
  China’s Salt Typhoon was snooping on Downing Street
  Trump wields the mighty DISCOMBOBULATOR
  ESET says the Polish power grid wiper was Russia’s GRU Sandworm crew
  US cyber institutions CISA and NIST are struggling
  Voice phishing for MFA bypass is getting even more polished


This episode is sponsored by Sublime Security. Brian Baskin is one of the team behind Sublime’s 2026 Email Threat Research report. He joins to talk through what they see of attackers’ use of AI, as well as the other trends of the year.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. They discuss:</p>

<ul>
  <li>La France is tres sérieux about ditching US productivity software</li>
  <li>China’s Salt Typhoon was snooping on Downing Street</li>
  <li>Trump wields the mighty DISCOMBOBULATOR</li>
  <li>ESET says the Polish power grid wiper was Russia’s GRU Sandworm crew</li>
  <li>US cyber institutions CISA and NIST are struggling</li>
  <li>Voice phishing for MFA bypass is getting even more polished</li>
</ul>

<p>This episode is sponsored by Sublime Security. Brian Baskin is one of the team behind Sublime’s 2026 Email Threat Research report. He joins to talk through what they see of attackers’ use of AI, as well as the other trends of the year.</p>

<p>This episode is also available on <a href="https://youtu.be/hvkye_3O-hQ0">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.euronews.com/next/2026/01/27/france-to-ditch-us-platforms-microsoft-teams-zoom-for-sovereign-platform-amid-security-con">France to ditch US platforms Microsoft Teams, Zoom for ‘sovereign platform’ amid security concerns | Euronews</a></li>
										
                    	<li><a href="https://www.google.com/search?q=Suite+Num%C3%A9rique+plan&amp;rlz=1C5CHFA_enAU857AU857&amp;oq=Suite+Num%C3%A9rique+plan&amp;gs_lcrp=EgZjaHJvbWUyBggAEEUYOTIKCAEQABgKGBYYHjIICAIQABgWGB4yBwgDEAAY7wUyCggEEAAYgAQYogQyCggFEAAYgAQYogQyBwgGEAAY7wUyBwgHEAAY7wXSAQczMDRqMGo3qAIAsAIA&amp;sourceid=chrome&amp;ie=UTF-8">Suite Numérique plan - Google Search</a></li>
										
                    	<li><a href="https://www.telegraph.co.uk/news/2026/01/26/china-hacked-downing-street-phones-for-years">China hacked Downing Street phones for years</a></li>
										
                    	<li><a href="https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/">Cyberattack Targeting Poland’s Energy Grid Used a Wiper</a></li>
										
                    	<li><a href="https://www.pbs.org/newshour/nation/trump-says-u-s-used-secret-discombobulator-on-venezuelan-equipment-during-maduro-raid">Trump says U.S. used secret &#39;discombobulator&#39; on Venezuelan equipment during Maduro raid | PBS News</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-cyberattack-cripples-cars-across-russia/">Risky Bulletin: Cyberattack cripples cars across Russia - Risky Business Media</a></li>
										
                    	<li><a href="https://cyberscoop.com/cisa-madhu-gottumukkala-house-homeland-hearing-workforce-staffing-levels/">Lawmakers probe CISA leader over staffing decisions | CyberScoop</a></li>
										
                    	<li><a href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">Trump’s acting cyber chief uploaded sensitive files into a public version of ChatGPT - POLITICO</a></li>
										
                    	<li><a href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">Acting CISA director failed a polygraph. Career staff are now under investigation. - POLITICO</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/nist-cve-vulnerability-analysis-nvd-review/810300/">NIST is rethinking its role in analyzing software vulnerabilities | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-nsa-fbi-rsac-conference-jen-easterly/810482/">Federal agencies abruptly pull out of RSAC after organizer hires Easterly | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://cyberscoop.com/shinyhunters-voice-phishing-sso-okta-mfa-bypass-data-theft/">Real-Time phishing kits target Okta, Microsoft, Google</a></li>
										
                    	<li><a href="https://www.okta.com/blog/threat-intelligence/phishing-kits-adapt-to-the-script-of-callers/">Phishing kits adapt to the script of callers</a></li>
										
                    	<li><a href="https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/">On the Coming Industrialisation of Exploit Generation with LLMs – Sean Heelan&#39;s Blog</a></li>
										
                    	<li><a href="https://github.com/SeanHeelan/anamnesis-release/">GitHub - SeanHeelan/anamnesis-release: Automatic Exploit Generation with LLMs</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/01/overrun-with-ai-slop-curl-scraps-bug-bounties-to-ensure-intact-mental-health/">Overrun with AI slop, cURL scraps bug bounties to ensure &quot;intact mental health&quot; - Ars Technica</a></li>
										
                    	<li><a href="https://projectzero.google/2026/26/windows-administrator-protection.html">Bypassing Windows Administrator Protection - Project Zero</a></li>
										
                    	<li><a href="https://specterops.io/blog/2026/01/21/task-failed-successfully-microsofts-immediate-retirement-of-mdt/">Task Failed Successfully - Microsoft’s “Immediate” Retirement of MDT - SpecterOps</a></li>
										
                    	<li><a href="https://grahamhelton.com/blog/nodes-proxy-rce">Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission</a></li>
										
                    	<li><a href="https://blog.whatsapp.com/whatsapps-latest-privacy-protection-strict-account-settings">WhatsApp&#39;s Latest Privacy Protection: Strict Account Settings - WhatsApp Blog</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/01/23/microsoft-gave-fbi-a-set-of-bitlocker-encryption-keys-to-unlock-suspects-laptops-reports/">Microsoft gave FBI a set of BitLocker encryption keys to unlock suspects&#39; laptops: Reports | TechCrunch</a></li>
										
                    	<li><a href="https://www.wired.com/story/he-leaked-the-secrets-southeast-asian-scam-compound-then-had-to-get-out-alive/">He Leaked the Secrets of a Southeast Asian Scam Compound. Then He Had to Get Out Alive | WIRED</a></li>
										
                    	<li><a href="https://sublime.security/blog/key-findings-from-the-2026-sublime-email-threat-research-report/">Key findings from the 2026 Sublime Email Threat Research Report</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #821 -- Wiz researchers could have owned every AWS customer</title>
            <pubDate>Wed, 21 Jan 2026 15:28:42 +1100</pubDate>
            <link>https://risky.biz/RB821/</link>
            <guid isPermaLink="true">https://risky.biz/RB821/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB821.mp3" length="62201492" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3886</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, joined by a special guest. BBC World Cyber Correspondent Joe Tidy is a long time listener and he pops in for a ride-along in the news segment plus a chat about his new book.

This week news includes:

  Did the US cyber Venezuela’s power grid, or do they just want us to think they coulda?
  US govt might boycott the RSAC Conference ‘cause Jen Easterly being CEO makes them mad
  MS Patch Tuesday fixes CVSS5.5 bug and … stops you shutting down
  Wiz pulls off cloud stunt hack that ends with control of everyone’s AWS console
  Millions of Bluetooth devices that use Google’s Fast Pairing will pair with anyone, any time
  GNU inet-tools’ telnetd parties like it’s 2007, and brings -f root unauthed remote login back


Thinkst is this week’s sponsor, and long time friend of the show Haroon Meer joins. As always they’re polishing their Canary tokens - adding breadcrumbs to lead you to them - but they’re also a bunch of giant nerds who now run South Africa’s Computer Olympiad.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, joined by a special guest. BBC World Cyber Correspondent Joe Tidy is a long time listener and he pops in for a ride-along in the news segment plus a chat about his new book.</p>

<p>This week news includes:</p>
<ul>
  <li>Did the US cyber Venezuela’s power grid, or do they just want us to think they coulda?</li>
  <li>US govt might boycott the RSAC Conference ‘cause Jen Easterly being CEO makes them mad</li>
  <li>MS Patch Tuesday fixes CVSS5.5 bug and … stops you shutting down</li>
  <li>Wiz pulls off cloud stunt hack that ends with control of everyone’s AWS console</li>
  <li>Millions of Bluetooth devices that use Google’s Fast Pairing will pair with anyone, any time</li>
  <li>GNU inet-tools’ telnetd parties like it’s 2007, and brings -f root unauthed remote login back</li>
</ul>

<p>Thinkst is this week’s sponsor, and long time friend of the show Haroon Meer joins. As always they’re polishing their Canary tokens - adding breadcrumbs to lead you to them - but they’re also a bunch of giant nerds who now run South Africa’s Computer Olympiad.</p>

<p>This episode is also available on <a href="https://youtu.be/R_jyEjsckTY">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html">Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities - The New York Times</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/01/unnamed-officials-tell-nyt-precise-cyber-op-took-out-venezuelas-power-grid/">Why I’m withholding certainty that “precise” US cyber-op disrupted Venezuelan electricity - Ars Technica</a></li>
										
                    	<li><a href="https://www.rusi.org/explore-our-research/publications/commentary/layered-ambiguity-us-cyber-capabilities-raid-extract-maduro-venezuela">Layered Ambiguity: US Cyber Capabilities in the Raid to Extract Maduro from Venezuela | Royal United Services Institute</a></li>
										
                    	<li><a href="https://www.wired.com/story/former-cisa-director-jen-easterly-will-lead-rsa-conference/">Former CISA Director Jen Easterly Will Lead RSAC Conference | WIRED</a></li>
										
                    	<li><a href="https://www.nextgov.com/people/2026/01/trump-officials-consider-skipping-premier-cyber-conference-after-biden-era-cyber-leader-named-ceo/410744/">Trump officials consider skipping premier cyber conference after Biden-era cyber leader named CEO - Nextgov/FCW</a></li>
										
                    	<li><a href="https://therecord.media/desktop-windows-manager-vulnerability-added-to-cisa-list">Federal agencies ordered to patch Microsoft Desktop Windows Manager bug | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.theregister.com/2026/01/19/windows_11_shutdown_bug/">Windows 11 shutdown bug forces Microsoft into damage control • The Register</a></li>
										
                    	<li><a href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild">CodeBreach: Supply Chain Vuln &amp; AWS CodeBuild Misconfig | Wiz Blog</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-flaw-in-aws-console-risked-compromise-of-build-environment/809745/">Critical flaw in AWS Console risked compromise of build environment | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/01/never-before-seen-linux-malware-is-far-more-advanced-than-typical/">Never-before-seen Linux malware is “far more advanced than typical” - Ars Technica</a></li>
										
                    	<li><a href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/">VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun - Check Point Research</a></li>
										
                    	<li><a href="https://www.wired.com/story/google-fast-pair-bluetooth-audio-accessories-vulnerability-patches/">Hundreds of Millions of Audio Devices Need a Patch to Prevent Wireless Hacking and Tracking | WIRED</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-flaw-in-fortinet-fortisiem-targeted-in-exploitation-threat/809863/">Critical flaw in Fortinet FortiSIEM targeted in exploitation threat | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://horizon3.ai/attack-research/disclosures/cve-2025-64155-three-years-of-remotely-rooting-the-fortinet-fortisiem/">CVE-2025-64155: 3 Years of Remotely Rooting the FortiSIEM</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2026/01/a-single-click-mounted-a-covert-multistage-attack-against-copilot/">A single click mounted a covert, multistage attack against Copilot - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers">Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/guilty-plea-initial-access-broker-r1z">Jordanian initial access broker pleads guilty to helping target 50 companies | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/01/16/supreme-court-hacker-posted-stolen-government-data-on-instagram/">Supreme Court hacker posted stolen government data on Instagram | TechCrunch</a></li>
										
                    	<li><a href="https://seclists.org/oss-sec/2026/q1/89">oss-sec: GNU InetUtils Security Advisory: remote authentication by-pass in telnetd</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/c93w30gl5jno">How crypto criminals stole $700 million from people - often using age-old tricks</a></li>
										
                    	<li><a href="https://www.amazon.com/Ctrl-Alt-Chaos-Teenage-Internet/dp/133500193X/ref=tmm_hrd_swatch_0">Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #820 -- Asian fraud kingpin will face Chinese justice (pew pew!)</title>
            <pubDate>Wed, 14 Jan 2026 12:42:29 +1100</pubDate>
            <link>https://risky.biz/RB820/</link>
            <guid isPermaLink="true">https://risky.biz/RB820/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB820.mp3" length="56916314" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3555</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Risky Business returns for 2026! Patrick Gray and Adam Boileau talk through the week’s cybersecurity news, including:


  Santa brings hackers MongoDB memory leaks for Christmas
  Vercel pays out a million bucks to improve its React2Shell WAF defences
  39C3 delivers; the pink Power Ranger deletes nazis, while a catgirl ruins GnuPG
  Cambodian scam compound kingpin gets extradited to China, and we don’t think it’ll go well for him
  Krebs picks apart the Kimwolf botnet and residential proxy networks
  So many healthcare data leaks that we have a roundup section


This week’s episode is sponsored by Airlock Digital. The founders of the application allow-listing vendor, David Cottingham and Daniel Schell, discuss Microsoft’s ClickOnce .NET app packaging, and how attackers have been abusing it to load code. Airlock hates it when you load code!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Risky Business returns for 2026! Patrick Gray and Adam Boileau talk through the week’s cybersecurity news, including:</p>

<ul>
  <li>Santa brings hackers MongoDB memory leaks for Christmas</li>
  <li>Vercel pays out a million bucks to improve its React2Shell WAF defences</li>
  <li>39C3 delivers; the pink Power Ranger deletes nazis, while a catgirl ruins GnuPG</li>
  <li>Cambodian scam compound kingpin gets extradited to China, and we don’t think it’ll go well for him</li>
  <li>Krebs picks apart the Kimwolf botnet and residential proxy networks</li>
  <li>So many healthcare data leaks that we have a roundup section</li>
</ul>

<p>This week’s episode is sponsored by Airlock Digital. The founders of the application allow-listing vendor, David Cottingham and Daniel Schell, discuss Microsoft’s ClickOnce .NET app packaging, and how attackers have been abusing it to load code. Airlock hates it when you load code!</p>

<p>This episode is also available on <a href="https://youtu.be/5fsZklyapss">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/us-australia-bug-exploitation">US, Australia say ‘MongoBleed’ bug being exploited | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://doublepulsar. com/merry-christmas-day-have-a-mongodb-security-incident-9537f54289eb">Merry Christmas Day! Have a MongoDB security incident. | by Kevin Beaumont | Dec, 2025 | DoublePulsar</a></li>
										
                    	<li><a href="https://cyberscoop.com/vercel-cto-security-react2shell-vulnerability/">Inside Vercel’s sleep-deprived race to contain React2Shell | CyberScoop</a></li>
										
                    	<li><a href="https://gpg.fail/">gpg.fail</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/01/05/hacktivist-deletes-white-supremacist-websites-live-on-stage-during-hacker-conference/">Hacktivist deletes white supremacist websites live onstage during hacker conference | TechCrunch</a></li>
										
                    	<li><a href="https://therecord.media/chinese-attackers-zero-day">Chinese attackers exploiting zero-day to target Cisco email security products | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858">Ni8mare  -  Unauthenticated Remote Code Execution in n8n (CVE-2026-21858) | Cyera Research Labs</a></li>
										
                    	<li><a href="https://cyberscoop.com/servicenow-fixes-critical-ai-vulnerability-cve-2025-12420/">ServiceNow patches critical AI platform flaw that could allow user impersonation | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited">Alleged cyber scam kingpin arrested, extradited to China | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/fcc-cyber-trust-mark-iot-labeling-ul-withdraw/808732/">FCC IoT labeling program loses lead company after China probe | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/12/16/nsa-cybercom-joshua-rudd-china">Trump picks Lt. Gen. Joshua Rudd to lead NSA spy agency - The Washington Post</a></li>
										
                    	<li><a href="https://therecord.media/nsa-cyber-directorate-new-acting-leadership">NSA cyber directorate gets new acting leadership | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/dutch-court-sentences-hacker-who-smuggled-cocaine-ports">Dutch court sentences hacker who used port systems to smuggle cocaine to 7 years | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://uitspraken.rechtspraak.nl/details?id=ECLI:NL:GHAMS:2026:22">ECLI:NL:GHAMS:2026:22, Amsterdam Court of Appeal, 23-003218-22</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/">The Kimwolf Botnet is Stalking Your Local Network – Krebs on Security</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/">Who Benefited from the Aisuru and Kimwolf Botnets? – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/coupang-recovers-smashed-laptop-data-breach">Coupang recovers smashed laptop that alleged data leaker threw into river | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/ransomware-responders-guilty-plea-using-alphv-blackcat-us-attacks">Ransomware responders plead guilty to using ALPHV in attacks on US organizations | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/covenant-health-breach-qilin">Nearly 480,000 impacted by Covenant Health data breach | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://techcrunch.com/2026/01/08/illinois-health-department-exposed-over-700000-residents-personal-data-for-years/">Illinois health department exposed over 700,000 residents&#39; personal data for years | TechCrunch</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/12/18/tech-provider-for-nhs-england-confirms-data-breach/">Tech provider for NHS England confirms data breach | TechCrunch</a></li>
										
                    	<li><a href="https://www.nzherald.co.nz/nz/hacker-claiming-to-be-behind-managemyhealth-breach-i-do-it-for-the-money-and-im-in-negotiations-to-get-it/premium/FC2PYCTFXVEOXN4Q27ONTQIDKA/">Hacker claiming to be behind ManageMyHealth breach: ‘I do it for the money and I’m in negotiations to get it’ - NZ Herald</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>How the World Got Owned Episode 1: The 1980s</title>
            <pubDate>Wed, 07 Jan 2026 07:00:00 +1100</pubDate>
            <link>https://risky.biz/HTWGO1/</link>
            <guid isPermaLink="true">https://risky.biz/HTWGO1/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/HTWGO1.mp3" length="91636216" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3816</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s famous Cuckoo’s Egg story.

This podcast features the memories of:


  Jon Callas, former principal software engineer at Digital Equipment Corporation
  Mark Rasch, Morris Worm prosecutor
  Timothy Winslow, former 414 hacker
  Greg Chartrand, author of Cracking the Cuckoos Egg and
  Tony Sager, former NSA


How the World Got Owned is produced in partnership with SentinelOne.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s famous Cuckoo’s Egg story.</p>

<p>This podcast features the memories of:</p>

<ul>
  <li>Jon Callas, former principal software engineer at Digital Equipment Corporation</li>
  <li>Mark Rasch, Morris Worm prosecutor</li>
  <li>Timothy Winslow, former 414 hacker</li>
  <li>Greg Chartrand, author of Cracking the Cuckoos Egg and</li>
  <li>Tony Sager, former NSA</li>
</ul>

<p>How the World Got Owned is produced in partnership with SentinelOne.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.ussc.gov/guidelines/archive/1988-federal-sentencing-guidelines-manual-0">1988 Federal sentencing guidelines manual</a></li>
										
                    	<li><a href="https://www.nytimes.com/1990/05/05/us/computer-intruder-is-put-on-probation-and-fined-10000.html">Computer Intruder is put on probation and fined $10,000 | The New York Times</a></li>
										
                    	<li><a href="https://www.nytimes.com/1990/01/23/us/computer-intruder-is-found-guilty.html">Computer Intruder is found guilty | The New York Times</a></li>
										
                    	<li><a href="https://law.justia.com/cases/federal/appellate-courts/F2/928/504/452673/">United States of America, Appellee, v. Robert Tappan Morris, Defendant-appellant, 928 F.2d 504 (2d Cir. 1991)</a></li>
										
                    	<li><a href="https://www.goodreads.com/book/show/18154.The_Cuckoo_s_Egg">The Cuckoo’s Egg: Tracking a Spy Through the Maze of Computer Espionage | Clifford Stoll</a></li>
										
                    	<li><a href="https://www.goodreads.com/book/show/214876781-cracking-the-cuckoo-s-egg">Cracking the Cuckoo’s Egg: The Untold Story of tracking and finding Karl Koch aka Hagbard of the Chaos Computer Club | Greg Chartrand</a></li>
										
                    	<li><a href="https://www.nytimes.com/1987/09/16/world/computer-buffs-tapped-nasa-files.html">Computer Buffs Tapped NASA Files | The New York Times</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/archive/politics/1983/08/30/young-computer-bandits-byte-off-more-than-they-could-chew/f407e5df-6eaf-4f9b-8b38-04304960d2d9/">Young Computer Bandits Byte off More than They Could Chew | The Washington Post</a></li>
										
                    	<li><a href="https://www.edn.com/hacker-is-used-by-mainstream-media-september-5-1983/">‘Hacker’ is used by Mainstream Media, September 5, 1983 | EDN</a></li>
										
                    	<li><a href="https://www.upi.com/Archives/1983/09/19/A-17-year-old-boy-who-was-one-of-the-Milwaukee-area/4664432792000/">Neal Patrick to testify before congressional committee</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=TQUsLAAZuhU">Wargames official trailer, 1983</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=7TsT46z9EfI">CBS News Segment on Robert Morris Computer Hacker</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=BpubkTiD6c4">The Fall of the Berlin Wall | Sky News</a></li>
										
                    	<li><a href="https://edition.cnn.com/2015/03/11/tech/computer-hacker-essay-414s">I Hacked a Nuclear Facility in the 1980’s. You’re Welcome | CNN</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack</title>
            <pubDate>Wed, 17 Dec 2025 13:13:10 +1100</pubDate>
            <link>https://risky.biz/RB819/</link>
            <guid isPermaLink="true">https://risky.biz/RB819/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB819.mp3" length="51941434" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3245</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In the final show of 2025, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  React2Shell attacks continue, surprising no one
  The unholy combination of OAuth consent phishing, social engineering and Azure CLI
  Venezuela’s state oil firm gets ransomware’d, blames US… but what if it really is a US cyber op?!
  Russian junk-hacktivist gets indicted for cybering critical… err…  a car wash and a fountain
  Microsoft finally turns RC4 off by default in Active Directory Kerberos
  Traefik’s TLS verify=on … turns it off, whoopsie 🤡


This week’s episode is sponsored by Sublime Security, makers of an email filtering solution that’s up for  dealing with modern problems. Founder and CEO Josh Kamdjou joins to talk about calendar invite phishing, and the extra steps they’ve had to take to reach into people’s calendars and fix the mess.

The Risky Business weekly show is taking holiday break, and will return on 14 January for its twentieth year! Good luck out there, internet friends.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In the final show of 2025, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>React2Shell attacks continue, surprising no one</li>
  <li>The unholy combination of OAuth consent phishing, social engineering and Azure CLI</li>
  <li>Venezuela’s state oil firm gets ransomware’d, blames US… but what if it really is a US cyber op?!</li>
  <li>Russian junk-hacktivist gets indicted for cybering critical… err…  a car wash and a fountain</li>
  <li>Microsoft finally turns RC4 off by default in Active Directory Kerberos</li>
  <li>Traefik’s TLS verify=on … turns it off, whoopsie 🤡</li>
</ul>

<p>This week’s episode is sponsored by Sublime Security, makers of an email filtering solution that’s up for  dealing with modern problems. Founder and CEO Josh Kamdjou joins to talk about calendar invite phishing, and the extra steps they’ve had to take to reach into people’s calendars and fix the mess.</p>

<p>The Risky Business weekly show is taking holiday break, and will return on 14 January for its twentieth year! Good luck out there, internet friends.</p>

<p>This episode is also available on <a href="https://youtu.be/-5FFQnCyzLc">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.cybersecuritydive.com/news/react2shell-attacks-expand-multiple-sectors/808030/">React2Shell attacks expand widely across multiple sectors | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/react-issues-new-patches-after-security-researchers-flag-additional-flaws/807776/">React issues new patches after security researchers flag additional flaws | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/consentfix">ConsentFix: Browser-native ClickFix hijacks OAuth grants</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=AAiiIY-Soak">Hacking Endpoint to Identity (Microsoft 365): &quot;ConsentFix&quot; - YouTube</a></li>
										
                    	<li><a href="https://therecord.media/announced-nsa-deputy-director-pick-joe-francescon-not-taking-job">Announced pick for No. 2 at NSA won’t get the job as another candidate surfaces | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/lauraloomer/status/2000057405204300088">Laura Loomer on X: &quot;EXCLUSIVE: 🚨 White House Official Confirms Ongoing Search for NSA Deputy Director As Tim Kosiba&#39;s Deep State And Anti-Trump Ties Raise Red Flags 🚨&quot;</a></li>
										
                    	<li><a href="https://therecord.media/joshua-rudd-nomination-cyber-command-nsa">Senior official at Indo-Pacific Command is set to be Trump’s pick to lead Cyber Command, NSA | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.bloomberg.com/news/articles/2025-12-12/trump-administration-turning-to-private-firms-in-cyber-offensive">Trump Administration Turning to Private Firms in Cyber Offensive - Bloomberg</a></li>
										
                    	<li><a href="https://www.argusmedia.com/en/news-and-insights/latest-market-news/2766060-pdv-says-cyber-attacks-contained">PdV says cyber attacks contained | Latest Market News</a></li>
										
                    	<li><a href="https://therecord.media/venezuela-state-oil-company-blames-cyberattack-on-us">Venezuela state oil company blames cyberattack on US after tanker seizure | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal">Office of Public Affairs | Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups | United States Department of Justice</a></li>
										
                    	<li><a href="https://therecord.media/doj-cisa-warn-russia-hackers-targeting-critical-infrastructure">DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/vxunderground/status/1998779086374658416?s=12">vx-underground on X: &quot;The United States government has indicted a state-sponsored Threat Actor named Victoria Eduardovna Dubranova&quot;</a></li>
										
                    	<li><a href="https://x.com/vxunderground/status/1998783026063388847?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">vx-underground on X: &quot;I&#39;m actually laughing. One of the compromises is so dumb&quot;</a></li>
										
                    	<li><a href="https://www.ft.com/content/8ca64b0a-2b9a-4736-8df4-2b1c6c4693e8">German parliament suffers suspected cyber attack during Zelenskyy’s visit</a></li>
										
                    	<li><a href="https://www.bild.de/politik/inland/waehrend-selenskyj-besuch-grosse-internet-stoerung-im-bundestag-6940216a11416590a630bd61">Während Selenskyj-Besuch: Große Internet-Störung im Bundestag! | Politik | BILD.de</a></li>
										
                    	<li><a href="https://therecord.media/germany-summons-russian-ambassador-cyberattack-disinformation">Germany summons Russian ambassador over cyberattack, election disinformation | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.volkskrant.nl/binnenland/russische-hackgroep-had-toegang-tot-openbare-waterfontein-in-nederland~bd120e79/">Russische hackgroep had toegang tot openbare waterfontein in Nederland | de Volkskrant</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/">Most Parked Domains Now Serving Malicious Content – Krebs on Security</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/pornhub-extorted-after-hackers-steal-premium-member-activity-data/">PornHub extorted after hackers steal Premium member activity data</a></li>
										
                    	<li><a href="https://www.justice.gov/opa/pr/senior-manager-government-contractor-charged-cybersecurity-fraud-scheme">Office of Public Affairs | Senior Manager for Government Contractor Charged in Cybersecurity Fraud Scheme | United States Department of Justice</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/12/microsoft-will-finally-kill-obsolete-cipher-that-has-wreaked-decades-of-havoc/">Microsoft will finally kill obsolete cipher that has wreaked decades of havoc - Ars Technica</a></li>
										
                    	<li><a href="https://aisle.com/blog/cve-2025-66491-traefiks-verifyon-turned-tls-off">CVE-2025-66491: Traefik&#39;s &quot;Verify=On&quot; Turned TLS Off | AISLE</a></li>
										
                    	<li><a href="https://x.com/erfmufn/status/1997445694727279061">Dylan O&#39;Donnell 🦋 on X: &quot;This week I was rushed to hospital with a diagnosis of oesophageal cancer.&quot;</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Graph the planet!</title>
            <pubDate>Fri, 12 Dec 2025 06:26:18 +1100</pubDate>
            <link>https://risky.biz/soapbox103/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox103/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox103.mp3" length="41179172" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2573</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the Risky Business podcast, Patrick Gray chats with Jared Atkinson, CTO of SpecterOps, about BloodHound OpenGraph.

OpenGraph enumerates attack paths across platforms and services, not just your primary directories.

A compromised GitHub account to on-prem AD compromise attack path? It’s a thing, and OpenGraph will find it.

Cross-platform attack path enumeration! So good!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the Risky Business podcast, Patrick Gray chats with Jared Atkinson, CTO of SpecterOps, about BloodHound OpenGraph.</p>

<p>OpenGraph enumerates attack paths across platforms and services, not just your primary directories.</p>

<p>A compromised GitHub account to on-prem AD compromise attack path? It’s a thing, and OpenGraph will find it.</p>

<p>Cross-platform attack path enumeration! So good!</p>

<p>This episode is also available on <a href="https://youtu.be/uGGFqRbbQA0">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #818 -- React2Shell is a fun one</title>
            <pubDate>Wed, 10 Dec 2025 13:33:11 +1100</pubDate>
            <link>https://risky.biz/RB818/</link>
            <guid isPermaLink="true">https://risky.biz/RB818/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB818.mp3" length="56132960" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3507</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate?
  China is out popping shells with it
  Linux adds support for PCIe bus encryption
  Amnesty International says Intellexa can just TeamViewer into its customers’ surveillance systems
  …and a Belgian murder suspect complains that GrapheneOS’s duress wipe feature failed him?


This week’s episode is sponsored by Kroll Cyber. Simon Onyons is Managing Director at Kroll’s Cyber and Data Resilience arm, and he discusses a problem near to many of our hearts. Just how do you explain cyber risk to the board?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate?</li>
  <li>China is out popping shells with it</li>
  <li>Linux adds support for PCIe bus encryption</li>
  <li>Amnesty International says Intellexa can just TeamViewer into its customers’ surveillance systems</li>
  <li>…and a Belgian murder suspect complains that GrapheneOS’s duress wipe feature failed him?</li>
</ul>

<p>This week’s episode is sponsored by Kroll Cyber. Simon Onyons is Managing Director at Kroll’s Cyber and Data Resilience arm, and he discusses a problem near to many of our hearts. Just how do you explain cyber risk to the board?</p>

<p>This episode is also available on <a href="https://youtu.be/r3YSqx-U3OA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-apts-go-after-the-react2shell-vulnerability-within-hours/">Risky Bulletin: APTs go after the React2Shell vulnerability within hours - Risky Business Media</a></li>
										
                    	<li><a href="https://x.com/rauchg/status/1997362942929440937">Guillermo Rauch on X: &quot;React2Shell&quot; / X</a></li>
										
                    	<li><a href="https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc/blob/main/README.md">React2Shell-CVE-2025-55182-original-poc/README.md at main · lachlan2k/React2Shell-CVE-2025-55182-original-poc · GitHub</a></li>
										
                    	<li><a href="https://hydrogen.shopify.dev/">Hydrogen: Shopify’s headless commerce framework</a></li>
										
                    	<li><a href="https://therecord.media/researchers-track-dozens-react2shell-vuln">Researchers track dozens of organizations affected by React2Shell compromises tied to China’s MSS | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/">Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary</a></li>
										
                    	<li><a href="https://therecord.media/three-hacking-groups-two-vulnerabilities-china-microsoft">Three hacking groups, two vulnerabilities and all eyes on China | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-linux-adds-pcie-encryption-to-help-secure-cloud-servers/">Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers</a></li>
										
                    	<li><a href="https://cyberscoop.com/sean-plankey-cisa-nomination-stalled-senate-holds/">Sean Plankey nomination to lead CISA appears to be over after Thursday vote | CyberScoop</a></li>
										
                    	<li><a href="https://x.com/sekurlsa_pw/status/1997149684964442498?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">🕳 on X: &quot;This guy is complaining that GrapheneOS “failed him”. Showing a Belgian 🇧🇪 police request for an interrogation regarding premeditated murder (as a suspect).&quot; / X</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/12/04/sanctioned-spyware-maker-intellexa-had-direct-access-to-government-espionage-victims-researchers-say/">Sanctioned spyware maker Intellexa had direct access to government espionage victims, researchers say | TechCrunch</a></li>
										
                    	<li><a href="https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/">To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab</a></li>
										
                    	<li><a href="https://cyberscoop.com/ransomware-payments-decline-2024-fincen/">Is ransomware finally on the decline? Treasury data offers cautious hope | CyberScoop</a></li>
										
                    	<li><a href="https://cyberscoop.com/uk-warns-ai-prompt-injection-unfixable-security-flaw/">UK cyber agency warns LLMs will always be vulnerable to prompt injection | CyberScoop</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2025/12/previously-convicted-contractors-wiped-gov-databases-after-being-fired-feds-say/">In comedy of errors, men accused of wiping gov databases turned to an AI tool - Ars Technica</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #817 -- Less carnage than your usual Thanksgiving</title>
            <pubDate>Wed, 03 Dec 2025 13:38:27 +1100</pubDate>
            <link>https://risky.biz/RB817/</link>
            <guid isPermaLink="true">https://risky.biz/RB817/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB817.mp3" length="58677765" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3666</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. It’s a quiet week with Thanksgiving in the US, but there’s always some cyber to talk about:


  Airbus rolls out software updates after a cosmic ray bitflips an A320 into a dive
  Krebs tracks down a Scattered Lapsus$ Hunters teen through the usual poor opsec…
  … as Wired publishes an opsec guide for teens.
  Microsoft decides its login portal is worth a Content Security Policy
  South Korean online retailer data breach covers 65% of the country


This week’s episode is sponsored by Nebulock. Founder and CEO Damien Lewke joins to talk through their work bringing more SIgma threat detection rules to MacOS.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. It’s a quiet week with Thanksgiving in the US, but there’s always some cyber to talk about:</p>

<ul>
  <li>Airbus rolls out software updates after a cosmic ray bitflips an A320 into a dive</li>
  <li>Krebs tracks down a Scattered Lapsus$ Hunters teen through the usual poor opsec…</li>
  <li>… as Wired publishes an opsec guide for teens.</li>
  <li>Microsoft decides its login portal is worth a Content Security Policy</li>
  <li>South Korean online retailer data breach covers 65% of the country</li>
</ul>

<p>This week’s episode is sponsored by Nebulock. Founder and CEO Damien Lewke joins to talk through their work bringing more SIgma threat detection rules to MacOS.</p>

<p>This episode is also available on <a href="https://youtu.be/eViNIVpPV20">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://edition.cnn.com/2025/11/28/us/a320-series-fixes">Airlines race to fix their Airbus planes after warning solar radiation could cause pilots to lose control | CNN</a></li>
										
                    	<li><a href="https://cyberscoop.com/house-homeland-asks-anthropic-ceo-to-testfy-on-chinese-espionage-campaign/">Congress calls on Anthropic CEO to testify on Chinese Claude espionage campaign | CyberScoop</a></li>
										
                    	<li><a href="https://posthog.com/blog/nov-24-shai-hulud-attack-post-mortem">Post-mortem of Shai-Hulud attack on November 24th, 2025 - PostHog</a></li>
										
                    	<li><a href="https://www.armis.com/blog/update-shai-hulud-and-the-npm-ecosystem-why-ctem-must-extend-beyond-your-walls/">Update: Shai-Hulud and the npm Ecosystem: Why CTEM Must Extend Beyond Your Walls | Armis</a></li>
										
                    	<li><a href="https://secureannex.com/blog/glassworm-continued/">Glassworm&#39;s resurgence | Secure Annex</a></li>
										
                    	<li><a href="https://www.koi.ai/blog/4-million-browsers-infected-inside-shadypanda-7-year-malware-campaign">4.3 Million Browsers Infected: Inside ShadyPanda&#39;s 7-Year Malware Campaign | Koi Blog</a></li>
										
                    	<li><a href="https://bsky.app/profile/spuxx.bsky.social/post/3m6vwycw47c2u">Post by @spuxx.bsky.social — Bluesky</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/">Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ – Krebs on Security</a></li>
										
                    	<li><a href="https://www.wired.com/story/digital-opsec-for-teens/">The WIRED Guide to Digital Opsec for Teens | WIRED</a></li>
										
                    	<li><a href="https://www.abc.net.au/news/2025-11-28/perth-michael-clapis-guilty-airport-data-theft-sex-videos/105442798">Perth hacker Michael Clapsis jailed after setting up fake Qantas Wi-Fi, stealing sex videos - ABC News</a></li>
										
                    	<li><a href="https://x.com/edconwaysky/status/1995509077695435019">Ed Conway on X: &quot;The person who first downloaded the OBR&#39;s document at 11:35 on Budget day (I&#39;m guessing someone at Reuters, given they first reported it) had already guessed the web address and tried and failed to download it 32 times so far that day(!) https://t.co/6iLm2uEUj2&quot; / X</a></li>
										
                    	<li><a href="https://www.zdnet.com/article/reuters-accused-of-hack-attack/">Reuters accused of hack attack | ZDNET</a></li>
										
                    	<li><a href="https://www.wired.com/story/myanmar-kk-park-scam-compound-destruction/">The Destruction of a Notorious Myanmar Scam Compound Appears to Have Been ‘Performative’ | WIRED</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-change-cloud-login-entra-id-xss/806556/">Microsoft tightens cloud login process to prevent common attack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/fortinet-fortiweb-flaws-found-in-unsupported-versions-of-web-application-fi/806791/">Fortinet FortiWeb flaws found in unsupported versions of web application firewall | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/cryptomixer-service-takedown-bitcoin-seized">Cryptomixer platform raided by European police; $29 million in bitcoin seized | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/officials-accuse-north-korea-hackers-of-attack-on-crypto-exchange">Officials accuse North Korea’s Lazarus of $30 million theft from crypto exchange | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/coupang-south-korea-data-breach">Data breach hits &#39;South Korea&#39;s Amazon,&#39; potentially affecting 65% of country’s population | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.forbes.com/sites/the-wiretap/2025/11/26/nsa-contractor-groomed-teenage-girls-on-reddit-doj-alleges/">NSA Contractor Groomed Teenage Girls On Reddit, DOJ Alleges</a></li>
										
                    	<li><a href="https://nebulock.io/blog/coresigma-expanding-sigma-detection-for-macos">Nebulock developed coreSigma for MacOS</a></li>
										
                    	<li><a href="https://github.com/SigmaHQ/pySigma/pull/411">coreSigma repo:</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #816 -- Copilot Actions for Windows is extremely dicey</title>
            <pubDate>Wed, 26 Nov 2025 14:34:45 +1100</pubDate>
            <link>https://risky.biz/RB816/</link>
            <guid isPermaLink="true">https://risky.biz/RB816/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB816.mp3" length="55814564" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3487</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Salesforce partner Gainsight has customer data stolen
  Crowdstrike fires insider who gave hackers screenshots of internal systems
  Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs
  Shai-Hulud npm/Github worm is back, and rm -rf’ier than ever
  SEC gives up on Solarwinds lawsuit
  Dog eats cryptographer’s key material


This week’s episode is sponsored by runZero. HD Moore pops in to talk about how they’re integrating runZero with Bloodhound-style graph databases. He also discusses uses for driving runZero’s tools with an AI, plus the complexities of shipping AI when the company has a variety of deployment models.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Salesforce partner Gainsight has customer data stolen</li>
  <li>Crowdstrike fires insider who gave hackers screenshots of internal systems</li>
  <li>Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs</li>
  <li>Shai-Hulud npm/Github worm is back, and rm -rf’ier than ever</li>
  <li>SEC gives up on Solarwinds lawsuit</li>
  <li>Dog eats cryptographer’s key material</li>
</ul>

<p>This week’s episode is sponsored by runZero. HD Moore pops in to talk about how they’re integrating runZero with Bloodhound-style graph databases. He also discusses uses for driving runZero’s tools with an AI, plus the complexities of shipping AI when the company has a variety of deployment models.</p>

<p>This episode is also available on <a href="https://youtu.be/3YC5aBR-N5o">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://techcrunch.com/2025/11/21/google-says-hackers-stole-data-from-200-companies-following-gainsight-breach/">Google says hackers stole data from 200 companies following Gainsight breach</a></li>
										
                    	<li><a href="https://status.gainsight.com/">Gainsight Status</a></li>
										
                    	<li><a href="https://status.salesforce.com/generalmessages/20000233">Trust Status</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/">CrowdStrike fires &#39;suspicious insider&#39; who passed information to hackers</a></li>
										
                    	<li><a href="https://therecord.media/salesforce-cuts-off-access-to-third-party-unusual-activity">Salesforce cuts off access to third-party app after discovering ‘unusual activity’</a></li>
										
                    	<li><a href="https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today/">Атаки разящей панды: APT31 сегодня</a></li>
										
                    	<li><a href="https://www.justice.gov/archives/opa/pr/seven-hackers-associated-chinese-government-charged-computer-intrusions-targeting-perceived">Office of Public Affairs | Seven Hackers Associated with Chinese Government Charged with Computer Intrusions </a></li>
										
                    	<li><a href="https://www.theguardian.com/australia-news/2025/nov/24/australian-parliament-warned-turn-off-phones-china-visit-security">Australian federal MPs warned to turn off phones when Chinese delegation visits Parliament House</a></li>
										
                    	<li><a href="https://semgrep.dev/blog/2025/digging-for-secrets-sha1-hulud-the-second-coming-of-the-npm-worm/#3.-persistence-via-github-actions-runner">Sha1-Hulud: The Second Coming of the NPM Worm is Digging For Secrets</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/fcc-eliminates-telecom-cybersecurity-requirements/806052/">FCC eliminates cybersecurity requirements for telecom companies</a></li>
										
                    	<li><a href="https://www.fcc.gov/ecfs/document/101663436912/1">Trade Associations Cybersecurity Practices Ex Parte</a></li>
										
                    	<li><a href="https://therecord.media/solawards-lawsuit-dismissed-sec">SEC voluntarily dismisses SolarWinds lawsuit</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/record-ddos-attack-microsoft-azure/805886/">Record-breaking DDoS attack against Microsoft Azure mitigated</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/11/the-cloudflare-outage-may-be-a-security-roadmap/">The Cloudflare Outage May Be a Security Roadmap – Krebs on Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/11/critics-scoff-after-microsoft-warns-ai-feature-can-infect-machines-and-pilfer-data/">Critics scoff after Microsoft warns AI feature can infect machines and pilfer data</a></li>
										
                    	<li><a href="https://x.com/vxunderground/status/1992320900444643336">vx-underground on X: &quot;I&#39;ve had a surprising amount of people ask me about Copilot&quot;</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/command-injection-flaw-fortinet-fortiweb-exploitation/806027/">Researchers warn command injection flaw in Fortinet FortiWeb is under exploitation</a></li>
										
                    	<li><a href="https://therecord.media/transport-for-london-hack-scattered-spider-suspects-plead-not-guilty">Two suspected Scattered Spider hackers plead not guilty over Transport for London cyberattack</a></li>
										
                    	<li><a href="https://therecord.media/russia-arrests-tech-entrepreneur-treason">Russia arrests young cybersecurity entrepreneur on treason charges</a></li>
										
                    	<li><a href="https://cyberscoop.com/hacklore-org-cybersecurity-advice-bob-lord-security-myths/">This campaign aims to tackle persistent security myths in favor of better advice</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/11/cryptography-group-cancels-election-results-after-official-loses-secret-key/">Oops. Cryptographers cancel election results after losing decryption key.</a></li>
										
                    	<li><a href="https://www.runzero.com/blog/introducing-runzerohound/">Uncovering network attack paths with runZeroHound</a></li>
										
                    	<li><a href="https://help.runzero.com/docs/mcp/">Model Context Protocol</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Greynoise knows when bad bugs are coming</title>
            <pubDate>Fri, 21 Nov 2025 06:20:20 +1100</pubDate>
            <link>https://risky.biz/soapbox102/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox102/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox102.mp3" length="54538025" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2271</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether it’s malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nicely with typical 90-day disclosure timelines.

A fascinating chat with Andrew, as always.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the podcast, Andrew Morris joins Patrick Gray to talk about how Greynoise can often get a 90 day heads up on serious vulnerabilities. Whether it’s malicious actors doing reconnaissance or the affected vendors trying to understand the scope of the problem, it seems that mass scanning activity lines up pretty nicely with typical 90-day disclosure timelines.</p>

<p>A fascinating chat with Andrew, as always.</p>

<p>This episode is also available on <a href="https://youtu.be/AqSGEMGfaa0">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #815 -- Anthropic&apos;s AI APT report is a big deal</title>
            <pubDate>Wed, 19 Nov 2025 12:43:19 +1100</pubDate>
            <link>https://risky.biz/RB815/</link>
            <guid isPermaLink="true">https://risky.biz/RB815/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB815.mp3" length="49366036" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3084</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Anthropic says a Chinese APT orchestrated attacks using its AI
  It’s a day ending in -y, so of course there are shamefully bad Fortinet exploits in the wild
  Turns out slashing CISA was a bad idea, now it’s time for a hiring spree
  Researchers brute force entire phone number space against Whatsapp contact discovery API
  DOJ figures out how to make SpaceX turn off scam compounds’ Starlink service


This week’s episode is sponsored by Mastercard. Senior Vice President of Mastercard Cybersecurity Urooj Burney joins to talk about how the roles of fraud and cyber teams in the financial sector are starting to converge. Mastercard also recently acquired Recorded Future, and Urooj talks about how they aim to integrate cyber threat intelligence into the financial world.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Anthropic says a Chinese APT orchestrated attacks using its AI</li>
  <li>It’s a day ending in -y, so of course there are shamefully bad Fortinet exploits in the wild</li>
  <li>Turns out slashing CISA was a bad idea, now it’s time for a hiring spree</li>
  <li>Researchers brute force entire phone number space against Whatsapp contact discovery API</li>
  <li>DOJ figures out how to make SpaceX turn off scam compounds’ Starlink service</li>
</ul>

<p>This week’s episode is sponsored by Mastercard. Senior Vice President of Mastercard Cybersecurity Urooj Burney joins to talk about how the roles of fraud and cyber teams in the financial sector are starting to converge. Mastercard also recently acquired Recorded Future, and Urooj talks about how they aim to integrate cyber threat intelligence into the financial world.</p>

<p>This episode is also available on <a href="https://youtu.be/_R1jpzVZx-0">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">Full report: Disrupting the first reported AI-orchestrated cyber espionage campaign</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/">Researchers question Anthropic claim that AI-assisted attack was 90% autonomous - Ars Technica</a></li>
										
                    	<li><a href="https://cyberscoop.com/anthropic-ai-orchestrated-attack-required-many-human-hands/">China’s ‘autonomous’ AI-powered hacking campaign still required a ton of human work  | CyberScoop</a></li>
										
                    	<li><a href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/">Amazon discovers APT exploiting Cisco and Citrix zero-days | AWS Security Blog</a></li>
										
                    	<li><a href="https://therecord.media/fortinet-fortiweb-vulnerability-cisa-advisory">CISA gives federal agencies one week to patch exploited Fortinet bug | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-513">PSIRT | FortiGuard Labs</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733/">CISA, eyeing China, plans hiring spree to rebuild its depleted ranks | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.wired.com/story/lighthouse-google-lawsuit-scam-text-messages/">This Is the Platform Google Claims Is Behind a &#39;Staggering’ Scam Text Operation | WIRED</a></li>
										
                    	<li><a href="https://www.wired.com/story/a-simple-whatsapp-security-flaw-exposed-billions-phone-numbers/">A Simple WhatsApp Security Flaw Exposed 3.5 Billion Phone Numbers | WIRED</a></li>
										
                    	<li><a href="https://www.wired.com/story/doj-issued-seizure-warrants-to-starlink-over-satellite-internet-systems-used-at-scam-compounds/">DOJ Issued Seizure Warrant to Starlink Over Satellite Internet Systems Used at Scam Compound | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/multiple-us-nationals-guilty-pleas-north-korean-it-worker-scams">Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/jaguar-land-rover-quarterly-loss-cyberattack">Cyberattack leaves Jaguar Land Rover short of £680 million | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/akira-gang-received-million">FBI: Akira gang has received nearly $250 million in ransoms | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/operation-endgame-cybercrime-takedowns-rhadamanthys-venomrat-elysium">Operation Endgame: Police reveal takedowns of three key cybercrime tools | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/bitcoin-scam-mining-as-service/">Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds | WIRED</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #814 -- It&apos;s a bad time to be a scam compound operator</title>
            <pubDate>Wed, 12 Nov 2025 13:48:11 +1100</pubDate>
            <link>https://risky.biz/RB814/</link>
            <guid isPermaLink="true">https://risky.biz/RB814/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB814.mp3" length="60812934" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3799</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  The KK Park scam compound in Myanmar gets blasted with actual dynamite
  China sentences more scammers TO DEATH
  While Singapore is opting to lash them with the cane
  Chinese security firm KnownSec leaks a bunch of documents
  Necromancy continues on NSO Group, with a Trump associate in charge
  OWASP freshens up the Top 10, you won’t believe what’s number three!


This week’s episode is sponsored by Thinkst Canary. Big bird Haroon Meer joins and, as usual, makes a good point. If you’re going to trust a vendor to do something risky like put a box on your network, they have an obligation to explain how they make that safe. Thinkst has a /security page that does exactly that. So why do we let Palo Alto and Fortinet get away with “trust me, bro”?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>The KK Park scam compound in Myanmar gets blasted with actual dynamite</li>
  <li>China sentences more scammers TO DEATH</li>
  <li>While Singapore is opting to lash them with the cane</li>
  <li>Chinese security firm KnownSec leaks a bunch of documents</li>
  <li>Necromancy continues on NSO Group, with a Trump associate in charge</li>
  <li>OWASP freshens up the Top 10, you won’t believe what’s number three!</li>
</ul>

<p>This week’s episode is sponsored by Thinkst Canary. Big bird Haroon Meer joins and, as usual, makes a good point. If you’re going to trust a vendor to do something risky like put a box on your network, they have an obligation to explain how they make that safe. Thinkst has a /security page that does exactly that. So why do we let Palo Alto and Fortinet get away with “trust me, bro”?</p>

<p>This episode is also available on <a href="https://youtu.be/SVgSbsbAaIs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.irrawaddy.com/news/myanmars-crisis-the-world/myanmar-junta-dynamites-scam-hub-in-pr-move-as-global-pressure-grows.html">Myanmar Junta Dynamites Scam Hub in PR Move as Global Pressure Grows</a></li>
										
                    	<li><a href="https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death">China sentences 5 Myanmar scam kingpins to death | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.straitstimes.com/singapore/politics/law-passed-for-scammers-mules-to-be-caned-after-victims-in-singapore-lose-almost-4b-since-2020">Law passed for scammers, mules to be caned after victims in Singapore lose almost $4b since 2020 | The Straits Times</a></li>
										
                    	<li><a href="https://substack.com/inbox/post/178189244">KnownSec breach: What we know so far. - NetAskari</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-another-chinese-security-firm-has-its-data-leaked/">Risky Bulletin: Another Chinese security firm has its data leaked</a></li>
										
                    	<li><a href="https://www.politico.com/live-updates/2025/11/10/congress/cbo-still-under-threat-00644930">Inside Congress Live</a></li>
										
                    	<li><a href="https://www.wired.com/story/the-government-shutdown-is-a-ticking-cybersecurity-time-bomb/">The Government Shutdown Is a Ticking Cybersecurity Time Bomb | WIRED</a></li>
										
                    	<li><a href="https://www.theguardian.com/technology/2025/nov/10/apple-whatsapp-spyware-paragon">Former Trump official named NSO Group executive chairman | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/cisa-2015-information-sharing-law-renewal-bill-ending-shutdown">Short-term renewal of cyber information sharing law appears in bill to end shutdown | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/jaguar-land-rover-hack-hurt-uk-gdp-bank-england-says-rcna243083">Jaguar Land Rover hack hurt the U.K.&#39;s GDP, Bank of England says</a></li>
										
                    	<li><a href="https://www.bankofengland.co.uk/monetary-policy-report/2025/november-2025">Monetary Policy Report - November 2025 | Bank of England</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/sonicwall-state-linked-actor-attacks-cloud-backup/804867/">SonicWall says state-linked actor behind attacks against cloud backup service | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/japan-nikkei-slack-breach">Japanese media giant Nikkei reports Slack breach exposing employee and partner records | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://bsky.app/profile/campuscodi.risky.biz/post/3m5eglkakxs26">&quot;Intel sues former employee for allegedly stealing confidential data&quot; Post by @campuscodi.risky.biz — Bluesky</a></li>
										
                    	<li><a href="https://owasp.org/Top10/2025/0x00_2025-Introduction/">Introduction - OWASP Top 10:2025 RC1</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #813 -- FFmpeg has a point</title>
            <pubDate>Wed, 05 Nov 2025 14:29:28 +1100</pubDate>
            <link>https://risky.biz/RB813/</link>
            <guid isPermaLink="true">https://risky.biz/RB813/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB813.mp3" length="62543436" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3908</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  We love some good vulnerability reporting drama, this time FFmpeg’s got beef with Google
  OpenAI announces its Aardvark bug-gobbling system
  Two US ransomware responders get arrested for… ransomware
  Memento (nee HackingTeam) CEO says: Sì, those are totally our tools getting snapped in Russia
  Hackers help freight theft gangs steal shipments to resell
  A second Jabber Zeus mastermind gets his comeuppance 15 years on


This week’s episode is sponsored by Nucleus Security, who make a vulnerability information management system. Co-founder Scott Kuffer says that approaches for triaging vulnerabilities have started to fall apart, given there are just. So. Many. And they’re all important!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>We love some good vulnerability reporting drama, this time FFmpeg’s got beef with Google</li>
  <li>OpenAI announces its Aardvark bug-gobbling system</li>
  <li>Two US ransomware responders get arrested for… ransomware</li>
  <li>Memento (nee HackingTeam) CEO says: Sì, those are totally our tools getting snapped in Russia</li>
  <li>Hackers help freight theft gangs steal shipments to resell</li>
  <li>A second Jabber Zeus mastermind gets his comeuppance 15 years on</li>
</ul>

<p>This week’s episode is sponsored by Nucleus Security, who make a vulnerability information management system. Co-founder Scott Kuffer says that approaches for triaging vulnerabilities have started to fall apart, given there are just. So. Many. And they’re all important!</p>

<p>This episode is also available on <a href="https://youtu.be/6vd1PqMl-8Y">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://x.com/vxunderground/status/1984684125341532264">vx-underground on X: &quot;Yeah, so pretty much this entire drama thing is FFmpeg are a bunch of nerds…&quot;</a></li>
										
                    	<li><a href="https://x.com/ffmpeg/status/1984202651937255757">FFmpeg on X: &quot;@DavidEGrayson It&#39;s someone&#39;s hobby project of an obscure 1990s decoder…&quot;</a></li>
										
                    	<li><a href="https://x.com/halvarflake/status/1985245014914429064">Halvar Flake on X: &quot;Given the extremely big role ffmpeg has played historically...&quot;</a></li>
										
                    	<li><a href="https://x.com/thegrugq/status/1985233053925732408">thaddeus e. grugq on X: &quot;Current drama: Plucky security researcher Google takes on volunteer open source behemoth FFmpeg.&quot;</a></li>
										
                    	<li><a href="https://x.com/ErrataRob/status/1985809513568514394">Robert Graham on X: &quot;Current status: There&#39;s a conflict between Google…&quot;</a></li>
										
                    	<li><a href="https://openai.com/index/introducing-aardvark/">Introducing Aardvark: OpenAI’s agentic security researcher | OpenAI</a></li>
										
                    	<li><a href="https://cyberscoop.com/bugcrowd-mayhem-security-acquistion-ai-security-testing/">Bugcrowd acquires Mayhem Security to advance AI-powered security testing | CyberScoop</a></li>
										
                    	<li><a href="https://cyberscoop.com/incident-response-ransomware-professionals-charged-attacks/">Prosecutors allege incident response pros used ALPHV/BlackCat to commit string of ransomware attacks | CyberScoop</a></li>
										
                    	<li><a href="https://www.zetter-zeroday.com/former-trenchant-exec-sold-stolen-code-to-russian-buyer-even-after-learning-that-other-code-he-sold-was-being-utilized-by-different-broker-in-south-korea/?ref=zero-day-newsletter">Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being &quot;Utilized&quot; by Different Broker in South Korea</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/11/03/how-an-ex-l3-harris-trenchant-boss-stole-and-sold-cyber-exploits-to-russia/">How an ex-L3Harris Trenchant boss stole and sold cyber exploits to Russia | TechCrunch</a></li>
										
                    	<li><a href="https://opzero.ru/en/">Operation Zero — A Zero-Day Vulnerability Platform</a></li>
										
                    	<li><a href="https://x.com/jsrailton/status/1981430006132637837">John Scott-Railton on X: &quot;7/ There&#39;s a push to scale up America&#39;s offensive industry right now…&quot;</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/10/28/ceo-of-spyware-maker-memento-labs-confirms-one-of-its-government-customers-was-caught-using-its-malware/">CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware | TechCrunch</a></li>
										
                    	<li><a href="https://research.checkpoint.com/2025/microsoft-teams-impersonation-and-spoofing-vulnerabilities-exposed/">Exploiting Microsoft Teams: Impersonation and Spoofing Vulnerabilities Exposed Microsoft Teams Vulnerabilities Uncovered</a></li>
										
                    	<li><a href="https://therecord.media/cargo-theft-hackers-remote-monitoring-tools">Cargo theft gets a boost from hackers using remote monitoring tools | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics">Remote access, real cargo: cybercriminals targeting trucking and logistics | Proofpoint US</a></li>
										
                    	<li><a href="https://therecord.media/alleged-conti-ransomware-affiliate-extradited-ireland-tennessee">Alleged Conti ransomware gang affiliate appears in Tennessee court after Ireland extradition | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/meduza-stealer-malware-suspected-developers-arrested-russia">Three suspected developers of Meduza Stealer malware arrested in Russia | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/11/alleged-jabber-zeus-coder-mricq-in-u-s-custody/">Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody – Krebs on Security</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/windows-server-update-service-exploitation-50-victims/804362/">Windows Server Update Service exploitation ensnares at least 50 victims | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://bsky.app/profile/paulschnack.bsky.s ocial/post/3m4hfefzm5c2w">Post by @paulschnack.bsky.social — Bluesky</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD</title>
            <pubDate>Wed, 29 Oct 2025 14:30:38 +1100</pubDate>
            <link>https://risky.biz/RB812/</link>
            <guid isPermaLink="true">https://risky.biz/RB812/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB812.mp3" length="63609142" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3974</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate
  Microsoft WSUS bug being exploited in the wild
  Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG
  SpaceX finally starts disabling Starlink terminals used by scammers
  Garbage HP update deletes certificates that authed Windows systems to Entra


This week’s episode is sponsored by automation company Tines. Field CISO Matt Muller joins to discuss how Tines has embraced LLMs and the agentic-AI future into their workflow automation.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate</li>
  <li>Microsoft WSUS bug being exploited in the wild</li>
  <li>Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG</li>
  <li>SpaceX finally starts disabling Starlink terminals used by scammers</li>
  <li>Garbage HP update deletes certificates that authed Windows systems to Entra</li>
</ul>

<p>This week’s episode is sponsored by automation company Tines. Field CISO Matt Muller joins to discuss how Tines has embraced LLMs and the agentic-AI future into their workflow automation.</p>

<p>This episode is also available on <a href="https://youtu.be/qVTC4F5KeRI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://techcrunch.com/2025/10/23/u-s-government-accuses-former-l3harris-cyber-boss-of-stealing-trade-secrets/">US accuses former L3Harris cyber boss of stealing and selling secrets to Russian buyer | TechCrunch</a></li>
										
                    	<li><a href="https://cyberscoop.com/microsoft-windows-server-update-services-vulnerability-exploited-attacks/">Attackers bypass patch in deprecated Windows Server update tool | CyberScoop</a></li>
										
                    	<li><a href="https://hawktrace.com/blog/CVE-2025-59287-UNAUTH">CVE-2025-59287 WSUS Unauthenticated RCE | HawkTrace</a></li>
										
                    	<li><a href="https://hawktrace.com/blog/CVE-2025-59287">CVE-2025-59287 WSUS Remote Code Execution | HawkTrace</a></li>
										
                    	<li><a href="https://specterops.io/blog/2025/10/23/catching-credential-guard-off-guard/">Catching Credential Guard Off Guard - SpecterOps</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/10/bind-warns-of-bugs-that-could-bring-dns-cache-attack-back-from-the-dead/">Cache poisoning vulnerabilities found in 2 DNS resolving apps - Ars Technica</a></li>
										
                    	<li><a href="https://blog.talosintelligence.com/uncovering-qilin-attack-methods-exposed-through-multiple-cases/">Uncovering Qilin attack methods exposed through multiple cases</a></li>
										
                    	<li><a href="https://x.com/Safety/status/1981764501947953225">Safety on X: &quot;By November 10, we’re asking all accounts that use a security key as their two factor authentication (2FA) method to re-enroll their key to continue accessing X. You can re-enroll your existing security key, or enroll a new one. A reminder: if you enroll a new security key, any&quot; / X</a></li>
										
                    	<li><a href="https://therecord.media/spacex-disables-starlink-kits-in-myanmar-scam-compounds">SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://au.pcmag.com/networking/113929/spacex-update-your-inactive-starlink-dishes-now-or-theyll-be-bricked">SpaceX: Update Your Inactive Starlink Dishes Now or They&#39;ll Be Bricked</a></li>
										
                    	<li><a href="https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/">How we linked ForumTroll APT to Dante spyware by Memento Labs | Securelist</a></li>
										
                    	<li><a href="https://therecord.media/former-polish-official-indicted-spyware-probe">Former Polish official indicted over spyware purchase | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://patchmypc.com/blog/hp-oneagent-update-broke-entra-trust-on-hp-ai-devices/">HP OneAgent Update Broke Entra Trust on HP AI Devices</a></li>
										
                    	<li><a href="https://pulsesecurity.co.nz/articles/windows-ssh-is-awesome">Windows&#39; Built-in OpenSSH for Offensive Security</a></li>
										
                    	<li><a href="https://www.wired.com/story/how-hacked-card-shufflers-allegedly-enabled-a-mob-fueled-poker-scam-that-rocked-the-nba/">How Hacked Card Shufflers Allegedly Enabled a Mob-Fueled Poker Scam That Rocked the NBA | WIRED</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #811 -- F5 is the tip of the crap software iceberg</title>
            <pubDate>Wed, 22 Oct 2025 14:05:21 +1100</pubDate>
            <link>https://risky.biz/RB811/</link>
            <guid isPermaLink="true">https://risky.biz/RB811/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB811.mp3" length="49797265" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3111</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  China has been rummaging in F5’s networks for a couple of years
  Meanwhile China tries to deflect by accusing the NSA of hacking its national timing system
  Salesforce hackers use their stolen data trove to dox NSA, ICE employees
  Crypto stealing, proxy-deploying, blockchain-C2-ing VS Code worm charms us with its chutzpah
  Adam gets humbled by new Linux-capabilities backdoor trick
  Microsoft ignores its own guidance on avoiding BinaryFormatter, gets WSUS owned.


This episode is sponsored by Push Security. Co-founder and Chief Product Officer Jacques Louw joins to talk through how Push traced a LinkedIn phishing campaign targeting CEOs, and the new logging capabilities that proved critical to understanding it.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>China has been rummaging in F5’s networks for a couple of years</li>
  <li>Meanwhile China tries to deflect by accusing the NSA of hacking its national timing system</li>
  <li>Salesforce hackers use their stolen data trove to dox NSA, ICE employees</li>
  <li>Crypto stealing, proxy-deploying, blockchain-C2-ing VS Code worm charms us with its chutzpah</li>
  <li>Adam gets humbled by new Linux-capabilities backdoor trick</li>
  <li>Microsoft ignores its own guidance on avoiding BinaryFormatter, gets WSUS owned.</li>
</ul>

<p>This episode is sponsored by Push Security. Co-founder and Chief Product Officer Jacques Louw joins to talk through how Push traced a LinkedIn phishing campaign targeting CEOs, and the new logging capabilities that proved critical to understanding it.</p>

<p>This episode is also available on <a href="https://youtu.be/yFanv9MEf4M">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.wired.com/story/f5-hack-networking-software-big-ip/">Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks | WIRED</a></li>
										
                    	<li><a href="https://www.reuters.com/technology/breach-us-based-cybersecurity-provider-f5-blamed-china-bloomberg-news-reports-2025-10-16/">Breach at US-based cybersecurity provider F5 blamed on China, sources say | Reuters</a></li>
										
                    	<li><a href="https://www.csoonline.com/article/4074945/network-security-devices-endanger-orgs-with-90s-era-flaws.html">Network security devices endanger orgs with ’90s era flaws | CSO Online</a></li>
										
                    	<li><a href="https://therecord.media/china-attack-national-time-center">China claims it caught US attempting cyberattack on national time center | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.404media.co/hackers-dox-hundreds-of-dhs-ice-fbi-and-doj-officials/">Hackers Dox Hundreds of DHS, ICE, FBI, and DOJ Officials</a></li>
										
                    	<li><a href="https://www.404media.co/hackers-say-they-have-personal-data-of-thousands-of-nsa-and-other-government-officials/">Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials</a></li>
										
                    	<li><a href="https://archive.md/W5u5R#selection-1313.147-1313.674">ICE amps up its surveillance powers, targeting immigrants and antifa - The Washington Post</a></li>
										
                    	<li><a href="https://www.zetter-zeroday.com/john-bolton-indictment-provides-interesting-details-about-hack-of-his-aol-account-and-extortion-attempt/?ref=zero-day-newsletter">John Bolton Indictment Provides Interesting Details About Hack of His AOL Account and Extortion Attempt</a></li>
										
                    	<li><a href="https://www.reuters.com/sustainability/society-equity/us-court-orders-spyware-company-nso-stop-targeting-whatsapp-reduces-damages-2025-10-18/">US court orders spyware company NSO to stop targeting WhatsApp, reduces damages | Reuters</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware/">Apple alerts exploit developer that his iPhone was targeted with government spyware  | TechCrunch</a></li>
										
                    	<li><a href="https://www.wired.com/story/a-new-attack-lets-hackers-steal-2-factor-authentication-codes-from-android-phones/">A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones | WIRED</a></li>
										
                    	<li><a href="https://www.koi.ai/blog/glassworm-first-self-propagating-worm-using-invisible-code-hits-openvsx-marketplace">GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace | Koi Blog</a></li>
										
                    	<li><a href="https://therecord.media/europe-sim-farms-raided-latvia-austria-estonia">European police bust network selling thousands of phone numbers to scammers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/malmoeb/status/1979811891829502271">Stephan Berger on X: &quot;We recently took over an APT investigation from another forensic company. While reviewing analysis reports from the other company, we discovered that the attackers had been active in the network for months and had deployed multiple backdoors. One way they could regain root&quot; / X</a></li>
										
                    	<li><a href="https://dfir.ch/posts/linux_capabilities/">Linux Capabilities Revisited | dfir.ch</a></li>
										
                    	<li><a href="https://hawktrace.com/blog/CVE-2025-59287">CVE-2025-59287 WSUS Remote Code Execution | HawkTrace</a></li>
										
                    	<li><a href="https://edera.dev/stories/tarmageddon">TARmageddon (CVE-2025-62518): RCE Vulnerability Highlights the Challenges of Open Source Abandonware | Edera Blog</a></li>
										
                    	<li><a href="https://pushsecurity.com/hunt">Browser threat detection &amp; response | Push Security | Push Security</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/how-push-stopped-a-high-risk-linkedin-spear-phishing-attack/">How Push stopped a high risk LinkedIn spear-phishing attack</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Wide World of Cyber: A deep dive on the F5 hack</title>
            <pubDate>Tue, 21 Oct 2025 13:28:13 +1100</pubDate>
            <link>https://risky.biz/WWC11/</link>
            <guid isPermaLink="true">https://risky.biz/WWC11/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/WWC11.mp3" length="37646300" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2351</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Wide World of Cyber podcast Patrick Gray talks to Chris Krebs and Alex Stamos about the F5 incident. They talk about what happened, whether it’s a big deal, and why private equity ownership of mid-tier cybersecurity companies is often a red flag.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Wide World of Cyber podcast Patrick Gray talks to Chris Krebs and Alex Stamos about the F5 incident. They talk about what happened, whether it’s a big deal, and why private equity ownership of mid-tier cybersecurity companies is often a red flag.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Why Mastercard is scaling its cybersecurity business</title>
            <pubDate>Fri, 17 Oct 2025 10:12:05 +1100</pubDate>
            <link>https://risky.biz/soapbox101/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox101/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox101.mp3" length="44414134" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1849</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the Risky Business podcast, host Patrick Gray chats with Mastercard’s Executive Vice President and Head of Security Solutions, Johan Gerber, about how the card brand thinks about cybersecurity and why it’s aggressively investing in the space.

After listening to this interview you’ll understand why the credit card company spent $2.65b on threat intelligence vendor Recorded Future!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the Risky Business podcast, host Patrick Gray chats with Mastercard’s Executive Vice President and Head of Security Solutions, Johan Gerber, about how the card brand thinks about cybersecurity and why it’s aggressively investing in the space.</p>

<p>After listening to this interview you’ll understand why the credit card company spent $2.65b on threat intelligence vendor Recorded Future!</p>

<p>This episode is also available on <a href="https://youtu.be/xNn7387RGxE">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #810 -- Data extortion attacks have a silver lining</title>
            <pubDate>Wed, 15 Oct 2025 16:30:14 +1100</pubDate>
            <link>https://risky.biz/RB810a/</link>
            <guid isPermaLink="true">https://risky.biz/RB810a/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB810a.mp3" length="60694992" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3792</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  FBI intervenes in Scattered Spider Salesforce leaksite
  Clop loots Oracle E-Biz deployments
  Plus so much more data extortion.. At least it’s not ransomware … we guess?
  The US still can’t decide who’s gonna be in charge of NSA &amp; Cybercom
  Cambodian scam compounds get sanctioned and $15b in crypto is seized
  NSO gets sold for pocket-lint-grade money
  Bugs! Redis CVSS 10, Ivanti, Crowdstrike and… Internet Explorer?! zeroday?! In the wild?!!!?


This week’s episode is sponsored by Stairwell. Founder Mike Wiacek talks about how Stairwell brings VirusTotal-like visibility to private files, and about integrating the insights that brings into your SOC workflow.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>FBI intervenes in Scattered Spider Salesforce leaksite</li>
  <li>Clop loots Oracle E-Biz deployments</li>
  <li>Plus so much more data extortion.. At least it’s not ransomware … we guess?</li>
  <li>The US still can’t decide who’s gonna be in charge of NSA &amp; Cybercom</li>
  <li>Cambodian scam compounds get sanctioned and $15b in crypto is seized</li>
  <li>NSO gets sold for pocket-lint-grade money</li>
  <li>Bugs! Redis CVSS 10, Ivanti, Crowdstrike and… Internet Explorer?! zeroday?! In the wild?!!!?</li>
</ul>

<p>This week’s episode is sponsored by Stairwell. Founder Mike Wiacek talks about how Stairwell brings VirusTotal-like visibility to private files, and about integrating the insights that brings into your SOC workflow.</p>

<p>This episode is also available on <a href="https://youtu.be/zc_t8Q3by-I">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/breachforums-fbi-france-takedown-banner-scattered-spider-salesforce-leak">FBI takedown banner appears on BreachForums site as Scattered Spider promotes leak | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/oracle-customers-attacks-clop-google-mandiant/">Dozens of Oracle customers impacted by Clop data theft for extortion campaign | CyberScoop</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/">Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882)</a></li>
										
                    	<li><a href="https://risky.biz/clop-is-a-big-fish-but-not-worth-hunting/">Clop is a Big Fish, But Not Worth Hunting - Risky Business Media</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/10/shinyhunters-wage-broad-corporate-extortion-spree/">ShinyHunters Wage Broad Corporate Extortion Spree – Krebs on Security</a></li>
										
                    	<li><a href="https://www.engadget.com/cybersecurity/the-company-discord-blamed-for-its-recent-breach-says-it-wasnt-hacked-175536278.html">The company Discord blamed for its recent breach says it wasn&#39;t hacked</a></li>
										
                    	<li><a href="https://therecord.media/qantas-cybercriminals-stolen-data">Qantas confirms cybercriminals released stolen customer data | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/red-hat-gitlab-attack-consulting-data/">Red Hat confirms breach of GitLab instance, which stored company’s consulting data | CyberScoop</a></li>
										
                    	<li><a href="https://risky.biz/microsoft-revamps-edges-ie-mode-after-zero-day-attacks/">Risky Bulletin: Microsoft revamps Edge&#39;s &quot;IE Mode&quot; after zero-day attacks - Risky Business Media</a></li>
										
                    	<li><a href="https://therecord.media/kido-nursery-school-chain-hack-arrests-britain">Teenagers arrested in England over cyberattack on nursery chain Kido | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/william-hartman-not-nominee-nsa-cyber-command">Acting US Cyber Command, NSA chief won’t be nominated for the job, sources say | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-layoffs-reassignments-dhs-white-house-government-shutdown/802723/">Layoffs, reassignments further deplete CISA | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.msnbc.com/rachel-maddow-show/maddowblog/trumps-scandalous-directive-ag-pam-bondi-reached-public-accident-rcna236927">Trump’s scandalous directive to AG Pam Bondi reached the public by accident</a></li>
										
                    	<li><a href="https://therecord.media/feds-sanction-cambodian-conglomerate-scams-seize-15-billion">Feds sanction Cambodian conglomerate over cyber scams, seize $15 billion from chairman | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.theguardian.com/world/2025/oct/14/us-congress-committee-investigating-musk-owned-starlink-over-myanmar-scam-centres">US Congress committee investigating Musk-owned Starlink over Myanmar scam centres | Myanmar | The Guardian</a></li>
										
                    	<li><a href="https://www.wired.com/story/satellites-are-leaking-the-worlds-secrets-calls-texts-military-and-corporate-data/">Satellites Are Leaking the World’s Secrets: Calls, Texts, Military and Corporate Data | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/netherlands-special-powers-chinese-owned-semiconductor">Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/10/10/spyware-maker-nso-group-confirms-acquisition-by-us-investors/">Spyware maker NSO Group confirms acquisition by US investors | TechCrunch</a></li>
										
                    	<li><a href="https://www.wired.com/story/apple-announces-2-million-bug-bounty-reward/">Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits | WIRED</a></li>
										
                    	<li><a href="https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844">Wiz Finds Critical Redis RCE Vulnerability: CVE‑2025‑49844 | Wiz Blog</a></li>
										
                    	<li><a href="https://cyberscoop.com/sonicwall-customer-firewall-configurations-exposed/">SonicWall admits attacker accessed all customer firewall configurations stored on cloud portal | CyberScoop</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/sonicwall-sslvpn-devices-compromised/802716/">SonicWall SSLVPN devices compromised using valid credentials | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.crowdstrike.com/en-us/security-advisories/issues-affecting-crowdstrike-falcon-sensor-for-windows/">Issues Affecting CrowdStrike Falcon Sensor for Windows</a></li>
										
                    	<li><a href="https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/">ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities - SecurityWeek</a></li>
										
                    	<li><a href="https://www.theguardian.com/business/2025/oct/07/jaguar-land-rover-restart-production-suppliers-cyber-attack">Jaguar Land Rover launches phased restart at factories after cyber-attack | Jaguar Land Rover | The Guardian</a></li>
										
                    	<li><a href="https://www.tomshardware.com/software/windows/windows-10-is-no-longer-safe-to-run-heres-whos-affected-and-what-you-need-to-do">Windows 10 support ends today — here&#39;s who&#39;s affected and what you need to do</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Snake Oilers: Realm Security, Horizon3 and Persona</title>
            <pubDate>Wed, 08 Oct 2025 08:50:04 +1100</pubDate>
            <link>https://risky.biz/snakeoilers22pt2/</link>
            <guid isPermaLink="true">https://risky.biz/snakeoilers22pt2/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/snakeoilers22pt2.mp3" length="65798362" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2740</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Snake Oilers podcast, three vendors pop in to pitch you all on their wares:


  Realm Security: A security focussed, AI-first data pipeline platform
  Horizon3: AI hackers! Pentesting robots!! They’re coming fer yur jerbs!
  Persona: Verify customer and staff identities with live capture


This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Snake Oilers podcast, three vendors pop in to pitch you all on their wares:</p>

<ul>
  <li><a href="https://realm.security/riskybiz/">Realm Security</a>: A security focussed, AI-first data pipeline platform</li>
  <li><a href="https://horizon3.ai/">Horizon3</a>: AI hackers! Pentesting robots!! They’re coming fer yur jerbs!</li>
  <li><a href="https://withpersona.com">Persona</a>: Verify customer and staff identities with live capture</li>
</ul>

<p>This episode is also available on <a href="https://youtu.be/eaaKPWM0Vxg">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #809 -- Hackers try to pay a journalist for access to the BBC</title>
            <pubDate>Wed, 01 Oct 2025 17:01:41 +1000</pubDate>
            <link>https://risky.biz/RB809/</link>
            <guid isPermaLink="true">https://risky.biz/RB809/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB809.mp3" length="56859964" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2368</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray is on holiday so Amberleigh Jack and Adam Boileau hijack the studio to discuss the week’s cybersecurity news, including:


  Hackers learn that trying to coerce a journalist just makes for … a great story?
  A man in his 40s gets arrested over the European airport chaos. Yep, we’re surprised, too.
  Adam fanboys over Watchtowr Labs while bemoaning Fortra.
  Academics pick apart Tile trackers and find them lacking
  CISA tells agencies to patch their damn Cisco gear


This episode is also available on YouTube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray is on holiday so Amberleigh Jack and Adam Boileau hijack the studio to discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Hackers learn that trying to coerce a journalist just makes for … a great story?</li>
  <li>A man in his 40s gets arrested over the European airport chaos. Yep, we’re surprised, too.</li>
  <li>Adam fanboys over Watchtowr Labs while bemoaning Fortra.</li>
  <li>Academics pick apart Tile trackers and find them lacking</li>
  <li>CISA tells agencies to patch their damn Cisco gear</li>
</ul>

<p>This episode is also available on <a href="https://youtu.be/klnGOkUmguo">YouTube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.bbc.com/news/articles/c3w5n903447o">&#39;You&#39;ll never need to work again&#39;: Criminals offer reporter money to hack BBC</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/cgl15ykerlro">Government to guarantee £1.5bn Jaguar Land Rover loan after cyber shutdown</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/09/feds-tie-scattered-spider-duo-to-115m-in-ransoms/">Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms – Krebs on Security</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/uk-arrest-cyberattack-aviation/761008/">UK authorities arrest man in connection with cyberattack against aviation vendor | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/chinese-scammer-guilty-seizure-uk">Chinese scammer pleads guilty after UK seizes nearly $7 billion in bitcoin</a></li>
										
                    	<li><a href="https://therecord.media/asahi-japan-cyberattack-limits-shipping-call-centers">Cyberattack on Japanese beer giant Asahi limits shipping, call center operations | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/afghanistan-plunged-into-nationwide-internet-blackout">Afghanistan plunged into nationwide internet blackout, disrupting air travel, medical care | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.theregister.com/2025/09/30/tile_trackers_unencrypted_info/">Tile trackers are a stalker&#39;s dream, say Georgia Tech researchers</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/09/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks/">Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - Ars Technica</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/09/supermicro-server-motherboards-can-be-infected-with-unremovable-malware/">Supermicro server motherboards can be infected with unremovable malware - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/china-linked-hackers-brickstorm-backdoor-ip">China-linked hackers use ‘BRICKSTORM’ backdoor to steal IP | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign">Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors</a></li>
										
                    	<li><a href="https://therecord.media/cisco-asa-firewall-bugs-cisa-federal-agencies-warning">Federal agencies given one day to patch exploited Cisco firewall bugs | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte">Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/is-this-bad-this-feels-bad-goanywhere-cve-2025-10035/">Is This Bad? This Feels Bad. (Fortra GoAnywhere CVE-2025-10035)</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/it-is-bad-exploitation-of-fortra-goanywhere-mft-cve-2025-10035-part-2/">It Is Bad (Exploitation of Fortra GoAnywhere MFT CVE-2025-10035) - Part 2</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #808 -- Insane megabug in Entra left all tenants exposed</title>
            <pubDate>Wed, 24 Sep 2025 13:03:14 +1000</pubDate>
            <link>https://risky.biz/RB808/</link>
            <guid isPermaLink="true">https://risky.biz/RB808/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB808.mp3" length="50533951" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3157</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and special guest Rob Joyce discuss the week’s cybersecurity news, including:


  Secret Service raids a SIM farm in New York
  MI6 launches a dark web portal
  Are the 2023 Scattered Spider kids finally getting their comeuppance?
  Production halt continues for Jaguar Land Rover
  GitHub tightens its security after Shai-Hulud worm


This week’s episode is sponsored by Sublime Security. In this week’s sponsor interview, Sublime founder and CEO Josh Kamdjou joins host Patrick Gray to chat about the pros and cons of using agentic AI in an email security platform.

This episode is also available on YouTube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and special guest Rob Joyce discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Secret Service raids a SIM farm in New York</li>
  <li>MI6 launches a dark web portal</li>
  <li>Are the 2023 Scattered Spider kids finally getting their comeuppance?</li>
  <li>Production halt continues for Jaguar Land Rover</li>
  <li>GitHub tightens its security after Shai-Hulud worm</li>
</ul>

<p>This week’s episode is sponsored by Sublime Security. In this week’s sponsor interview, Sublime founder and CEO Josh Kamdjou joins host Patrick Gray to chat about the pros and cons of using agentic AI in an email security platform.</p>

<p>This episode is also available on <a href="https://youtu.be/xn63oyBFLW4">YouTube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.cbsnews.com/news/u-s-secret-service-disrupts-telecom-network-threatened-new-york-city-u-n-general-assembly/">U.S. Secret Service disrupts telecom network that threatened NYC during U.N. General Assembly</a></li>
										
                    	<li><a href="https://therecord.media/mi6-darkweb-portal-recruit-foreign-spies">MI6 launches darkweb portal to recruit foreign spies | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens | dirkjanm.io</a></li>
										
                    	<li><a href="https://www.helpnetsecurity.com/2025/09/23/npm-publishing-security-improvements/">Github npm changes</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/flights-europe-delayed-cyberattack-third-party/760745/">Flights across Europe delayed after cyberattack targets third-party vendor | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/europe-airports-delays-ransomware-attack-checkin-systemshttps://therecord.media/europe-airports-delays-ransomware-attack-checkin-systems">Major European airports work to restore services after cyberattack on check-in systems | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://databreaches.net/2025/09/21/when-goodbye-isnt-the-end-scattered-lapsus-hunters-hack-on/">When “Goodbye” isn’t the end: Scattered LAPSUS$ Hunters hack on | DataBreaches.Net</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/uk-arrests-scattered-spider-london-transit-hack-us-healthcare/760508/">UK arrests 2 more alleged Scattered Spider hackers over London transit system breach | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/las-vegas-arrest-scattered-spider-suspect-turns-self-in">Alleged Scattered Spider member turns self in to Las Vegas police | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/las-vegas-teenager-arrested-casino-attacks-scattered-spider/">Las Vegas police arrest minor accused of high-profile 2023 casino attacks | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/scattered-spider-unsealed-charges-115million-extortion-breached-courts-system">DOJ: Scattered Spider took $115 million in ransoms, breached a US court system | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/vxunderground/status/1968801092663136696?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">vx-underground on X: &quot;Scattered Spider ransoms company for 964BTC - wtf_thats_alot.jpeg - Document says &quot;Cost of BTC at time was $36M&quot; - $36M / 964BTC = $37.5K - BTC value was $37.5K in November, 2023 - Google &quot;Ransomware, November, 2023&quot; - omfg.exe https://t.co/uv2EzbL5HT&quot; | X</a></li>
										
                    	<li><a href="https://therecord.media/jlr-cyber-shockwave-auto-sector">JLR ‘cyber shockwave ripping through UK industry’ as supplier share price plummets by 55% | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/jaguar-land-rover-extend-production-pause-cyberattack/760883/">Jaguar Land Rover to extend production pause into October following cyberattack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/fisa-section-702-legislation-sen-tom-cotton-plan">New plan would give Congress another 18 months to revisit Section 702 surveillance powers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/ai-vulnerability-detection-patching-threats-mandiant-summit/760746/">AI-powered vulnerability detection will make things worse, not better, former US cyber official warns | Cybersecurity Dive</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #807 -- Shai-Hulud npm worm wreaks old-school havoc</title>
            <pubDate>Wed, 17 Sep 2025 13:01:40 +1000</pubDate>
            <link>https://risky.biz/RB807/</link>
            <guid isPermaLink="true">https://risky.biz/RB807/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB807.mp3" length="51205266" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3199</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Shai-Hulud worm propagates via npm and steals credentials
  Jaguar Land Rover attack may put smaller suppliers out of business
  Leaked data emerges from the vendor behind the Great Firewall of China
  Vastaamo hacker walks free while appeal is underway
  Why is a senator so mad about Kerberos?


This week’s episode is sponsored by Knocknoc. Chief exec Adam Pointon joins to talk through the surprising number of customers that are using Knocknoc’s identity-to-firewall glue to protect internal services and networks.

This week’s episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Shai-Hulud worm propagates via npm and steals credentials</li>
  <li>Jaguar Land Rover attack may put smaller suppliers out of business</li>
  <li>Leaked data emerges from the vendor behind the Great Firewall of China</li>
  <li>Vastaamo hacker walks free while appeal is underway</li>
  <li>Why is a senator so mad about Kerberos?</li>
</ul>

<p>This week’s episode is sponsored by Knocknoc. Chief exec Adam Pointon joins to talk through the surprising number of customers that are using Knocknoc’s identity-to-firewall glue to protect internal services and networks.</p>

<p>This week’s episode is also available on <a href="https://youtu.be/LzCRbNX_Z0s">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/">Self-Replicating Worm Hits 180+ Software Packages – Krebs on Security</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/czdjn0lv64ro">Jaguar Land Rover: Some suppliers &#39;face bankruptcy&#39; due to hack crisis</a></li>
										
                    	<li><a href="https://www.telegraph.co.uk/business/2025/09/15/jaguar-land-rover-production-shutdown-november/">Jaguar Land Rover production shutdown could last until November</a></li>
										
                    	<li><a href="https://www.wsj.com/tech/details-emerge-on-u-s-china-tiktok-deal-594e009f">U.S. Investors, Trump Close In on TikTok Deal With China - WSJ</a></li>
										
                    	<li><a href="https://www.wsj.com/tech/details-emerge-on-u-s-china-tiktok-deal-594e009f">U.S. Investors, Trump Close In on TikTok Deal With China - WSJ</a></li>
										
                    	<li><a href="https://www.wired.com/story/made-in-china-how-chinas-surveillance-industry-actually-works/">How China’s Propaganda and Surveillance Systems Really Operate | WIRED</a></li>
										
                    	<li><a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-beasts-diving-into-the-depths-of-the-global-spyware-market/">Mythical Beasts: Diving into the depths of the global spyware market - Atlantic Council</a></li>
										
                    	<li><a href="https://therecord.media/finland-vastaamo-hacker-free-during-appeal-conviction">Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/finland-vastaamo-hack-us-national-charged">US national charged in Finnish psychotherapy center extortion | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/conor-fitzpatrick-pompompurin-three-year-sentence-breachforums-administrator">BreachForums administrator given three-year prison stint after resentencing | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/microsoft-cloudflare-disrupt-raccoono365-credential-stealing-tool">Microsoft, Cloudflare disrupt RaccoonO365 credential stealing tool run by Nigerian national | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/09/senator-blasts-microsoft-for-making-default-windows-vulnerable-to-kerberoasting/">Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” - Ars Technica</a></li>
										
                    	<li><a href="https://www.reuters.com/legal/government/us-warns-hidden-radios-may-be-embedded-solar-powered-highway-infrastructure-2025-09-10/">Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure | Reuters</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/ 09/15/israel-announces-seizure-of-1-5-million-from-crypto-wallets-tied-to-iran/">Israel announces seizure of $1.5M from crypto wallets tied to Iran | TechCrunch</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: runZero shakes up vulnerability management</title>
            <pubDate>Mon, 15 Sep 2025 10:01:43 +1000</pubDate>
            <link>https://risky.biz/soapbox100/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox100/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox100.mp3" length="49401522" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2057</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the Risky Business podcast, industry legend HD Moore joins the show to talk about runZero’s major push into vulnerability management.

With its new Nuclei integration, runZero is now able to get a very accurate picture of what’s vulnerable in your environment, without spraying highly privileged credentials at attackers on your network.

It can also integrate with your EDR platform, and other data sources, to give you powerful visibility into the true state of things on your network and in your cloud.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the Risky Business podcast, industry legend HD Moore joins the show to talk about runZero’s major push into vulnerability management.</p>

<p>With its new Nuclei integration, runZero is now able to get a very accurate picture of what’s vulnerable in your environment, without spraying highly privileged credentials at attackers on your network.</p>

<p>It can also integrate with your EDR platform, and other data sources, to give you powerful visibility into the true state of things on your network and in your cloud.</p>

<p>This episode is also available on <a href="https://youtu.be/8mta57Ba7rQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #806 -- Apple&apos;s Memory Integrity Enforcement is a big deal</title>
            <pubDate>Wed, 10 Sep 2025 14:54:02 +1000</pubDate>
            <link>https://risky.biz/RB806/</link>
            <guid isPermaLink="true">https://risky.biz/RB806/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB806.mp3" length="49649343" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3102</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Apple ruins exploit developers’ week with fresh memory corruption mitigations
  Feross Aboukhadijeh drops by to talk about the big, dumb npm supply chain attack
  Salesloft says its GitHub was the initial entry point for its compromise
  Sitecore says people should “patch” its using-the-keymat-from-the-documentation “zero day”
  Rogue certs for 1.1.1.1 appear to be just (stupid) testing
  Jaguar Land Rover ransomware attackers are courting trouble


This week’s episode is sponsored by open source cloud security tool, Prowler. Founder Toni de la Fuente joins to discuss their new support for Microsoft 365. Time to point Prowler at your OneDrive and Sharepoint!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Apple ruins exploit developers’ week with fresh memory corruption mitigations</li>
  <li>Feross Aboukhadijeh drops by to talk about the big, dumb npm supply chain attack</li>
  <li>Salesloft says its GitHub was the initial entry point for its compromise</li>
  <li>Sitecore says people should “patch” its using-the-keymat-from-the-documentation “zero day”</li>
  <li>Rogue certs for 1.1.1.1 appear to be just (stupid) testing</li>
  <li>Jaguar Land Rover ransomware attackers are courting trouble</li>
</ul>

<p>This week’s episode is sponsored by open source cloud security tool, Prowler. Founder Toni de la Fuente joins to discuss their new support for Microsoft 365. Time to point Prowler at your OneDrive and Sharepoint!</p>

<p>This episode is also available on <a href="https://youtu.be/Dk1KizNzRSQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://security.apple.com/blog/memory-integrity-enforcement/">Blog - Memory Integrity Enforcement: A complete vision for memory safety in Apple devices - Apple Security Research</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/09/03/venezuelas-president-thinks-american-spies-cant-hack-huawei-phones/">Venezuela&#39;s president thinks American spies can&#39;t hack Huawei phones | TechCrunch</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/09/18-popular-code-packages-hacked-rigged-to-steal-crypto/">18 Popular Code Packages Hacked, Rigged to Steal Crypto – Krebs on Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/09/software-packages-with-more-than-2-billion-weekly-downloads-hit-in-supply-chain-attack/">Software packages with more than 2 billion weekly downloads hit in supply-chain attack - Ars Technica</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/salesloft-drift-restored-probe-github/759506/">Salesloft platform integration restored after probe reveals monthslong GitHub account compromise | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/cisa-orders-patch-for-sitecore-zero-day">CISA orders federal agencies to patch Sitecore zero-day following hacking reports | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/09/as-hackers-exploit-one-high-severity-sap-flaw-company-warns-of-3-more/">SAP warns of high-severity vulnerabilities in multiple products - Ars Technica</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2025/09/the-number-of-mis-issued-1-1-1-1-certificates-grows-heres-the-latest/">The number of mis-issued 1.1.1.1 certificates grows. Here’s the latest. - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/cyberattack-jaguar-land-rover-economic-growth-uk-government">Cyberattack on Jaguar Land Rover threatens to hit British economic growth | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/jaguar-land-rover-cyberattack-workers-stay-home">Cyberattack forces Jaguar Land Rover to tell staff to stay at home | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/bridgestone-americas--probe-restore-operations/759577/">Bridgestone Americas continues probe as it looks to restore operations | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/qantas-airline-reduces-bonuses-executives-data-breach">Qantas penalizes executives for July cyberattack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/cyber-command-nsa-dual-hat-single-leader-trump-administration">Cyber Command, NSA to remain under single leader as officials shelve plan to end &#39;dual hat&#39; | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/09/gop-cries-censorship-over-spam-filters-that-work/">GOP Cries Censorship Over Spam Filters That Work – Krebs on Security</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-apt-report-no-just-a-phishing-test/">Risky Bulletin: APT report? No, just a phishing test! - Risky Business Media</a></li>
										
                    	<li><a href="https://bsky.app/prof ile/patrick.risky.biz/post/3lygvoef6es22">Post by @patrick.risky.biz — Bluesky</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Snake Oilers: Nebulock, Vali Cyber and Cape</title>
            <pubDate>Mon, 08 Sep 2025 14:20:48 +1000</pubDate>
            <link>https://risky.biz/snakeoilers22pt1/</link>
            <guid isPermaLink="true">https://risky.biz/snakeoilers22pt1/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/snakeoilers22pt1.mp3" length="67064073" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2793</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Snake Oilers podcasts, three vendors pop in to pitch you all on their wares:


  Automated, AI-powered threat hunting with Nebulock


Damien Lewke from Nebulock joins the show to talk about how its agentic AI platform can surface attacker activity out of all those “low” and “informational” findings your detection team doesn’t have time to look at.


  Runtime security for hypervisors from Vali Cyber


Austin Gadient from Vali Cyber stops by to talk about ZeroLock, its hypervisor security product. It’s marketed as a counter-ransomware control but is just a generally useful security platform for virtualised environments.


  A secure mobile telco: Cape


The only thing American cell providers love more than providing patchy coverage is getting their customers’ data owned. Cape is here to change that. It’s a security and anonymity-focussed virtual mobile network operator (MVNO) that’s been spun up by a highly competent team. If we lived in the USA we would be customers, and a bunch of CISOs listening to this might want to consider Cape subscriptions for their workforce.

This episode is also available on Youtube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Snake Oilers podcasts, three vendors pop in to pitch you all on their wares:</p>

<ul>
  <li>Automated, AI-powered threat hunting with <a href="https://nebulock.io/">Nebulock</a></li>
</ul>

<p>Damien Lewke from Nebulock joins the show to talk about how its agentic AI platform can surface attacker activity out of all those “low” and “informational” findings your detection team doesn’t have time to look at.</p>

<ul>
  <li>Runtime security for hypervisors from <a href="https://valicyber.com/">Vali Cyber</a></li>
</ul>

<p>Austin Gadient from Vali Cyber stops by to talk about ZeroLock, its hypervisor security product. It’s marketed as a counter-ransomware control but is just a generally useful security platform for virtualised environments.</p>

<ul>
  <li>A secure mobile telco: <a href="https://cape.co/">Cape</a></li>
</ul>

<p>The only thing American cell providers love more than providing patchy coverage is getting their customers’ data owned. Cape is here to change that. It’s a security and anonymity-focussed virtual mobile network operator (MVNO) that’s been spun up by a highly competent team. If we lived in the USA we would be customers, and a bunch of CISOs listening to this might want to consider Cape subscriptions for their workforce.</p>

<p>This episode is also available on <a href="https://youtu.be/K1C-bR728ro">Youtube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #805 -- On the Salesloft Drift breach and &quot;OAuth soup&quot;</title>
            <pubDate>Wed, 03 Sep 2025 13:56:55 +1000</pubDate>
            <link>https://risky.biz/RB805/</link>
            <guid isPermaLink="true">https://risky.biz/RB805/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB805.mp3" length="59459876" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3715</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  The Salesloft breach and why OAuth soup is a problem
  The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed
  Google says it will stand up a “disruption unit”
  Microsoft writes up a ransomware gang that’s all-in on the cloud future
  Aussie firm hot-mics its work-from-home employees’ laptops
  Youtube scam baiters help the feds take down a fraud ring


This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>The Salesloft breach and why OAuth soup is a problem</li>
  <li>The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed</li>
  <li>Google says it will stand up a “disruption unit”</li>
  <li>Microsoft writes up a ransomware gang that’s all-in on the cloud future</li>
  <li>Aussie firm hot-mics its work-from-home employees’ laptops</li>
  <li>Youtube scam baiters help the feds take down a fraud ring</li>
</ul>

<p>This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please!</p>

<p>This episode is also available on <a href="https://youtu.be/SKWooX9Kg3k">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chatbot-maker-salesloft/">The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security</a></li>
										
                    	<li><a href="https://www.salesloft.com/">Salesloft: The Leading AI Revenue Orchestration Platform</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-zscaler-supply-chain-attacks/758990/">Palo Alto Networks, Zscaler customers impacted by supply chain attacks | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://blog.cloudflare.com/response-to-salesloft-drift-incident/">The impact of the Salesloft Drift breach on Cloudflare and our customers</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/china-used-three-private-companies-hack-global-telecoms-us-says-rcna227543">China used three private companies to hack global telecoms, U.S. says</a></li>
										
                    	<li><a href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF</a></li>
										
                    	<li><a href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/ransomware-gang-takedown-proliferation">Ransomware gang takedowns causing explosion of new, smaller groups | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/sweden-municipalities-ransomware-software">Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.microsoft.com/en-us/security/blog/2025/08/27/storm-0501s-evolving-techniques-lead-to-cloud-based-ransomware/">Storm-0501’s evolving techniques lead to cloud-based ransomware | Microsoft Security Blog</a></li>
										
                    	<li><a href="https://www.wired.com/story/the-era-of-ai-generated-ransomware-has-arrived/">The Era of AI-Generated Ransomware Has Arrived | WIRED</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=AjQVn1bGBQw">Between Two Nerds: How threat actors are using AI to run wild - YouTube</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/08/affiliates-flock-to-soulless-scam-gambling-machine/">Affiliates Flock to ‘Soulless’ Scam Gambling Machine – Krebs on Security</a></li>
										
                    	<li><a href="https://www.ft.com/content/fe2c9ae1-d175-4eb9-909e-0b171f6d097c">UK sought broad access to Apple customers’ data, court filing suggests</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/09/02/ice-reactivates-contract-with-spyware-maker-paragon/">ICE reactivates contract with spyware maker Paragon | TechCrunch</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/">WhatsApp fixes &#39;zero-click&#39; bug used to hack Apple users with spyware | TechCrunch</a></li>
										
                    	<li><a href="https://www.afr.com/work-and-careers/workplace/company-turned-laptops-into-covert-recording-devices-to-monitor-wfh-20250822-p5mp0z">Safetrac turned staff laptops into covert recording devices to monitor WFH</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-youtubers-unmask-and-help-dismantle-giant-chinese-scam-ring/">Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring - Risky Business Media</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #804 -- Phrack&apos;s DPRK hacker is probably a Chinese APT guy</title>
            <pubDate>Wed, 27 Aug 2025 15:02:20 +1000</pubDate>
            <link>https://risky.biz/RB804/</link>
            <guid isPermaLink="true">https://risky.biz/RB804/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB804.mp3" length="51410296" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3212</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Australia expels Iranian ambassador
  Hackers sabotage Iranian shipping satcoms
  APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK?
  Trail of Bits uses image-downscaling to sneak prompts into Google Gemini
  The Com’s King Bob gets ten years in the slammer
  It’s a day that ends in -y, so of course there’s a new Citrix Netscaler RCE being used in the wild.


This week’s episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they’ve been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Australia expels Iranian ambassador</li>
  <li>Hackers sabotage Iranian shipping satcoms</li>
  <li>APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK?</li>
  <li>Trail of Bits uses image-downscaling to sneak prompts into Google Gemini</li>
  <li>The Com’s King Bob gets ten years in the slammer</li>
  <li>It’s a day that ends in -y, so of course there’s a new Citrix Netscaler RCE being used in the wild.</li>
</ul>

<p>This week’s episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they’ve been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please.</p>

<p>This episode is also available on <a href="https://youtu.be/UyBhgvy43r8">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.news.com.au/national/iran-ambassador-expelled-fromaustralia-anthony-albanese-accuses-nation-of-directing-antisemitic-attacks/news-story/9f552080e7aa76f06f15ce3271bc6862">Embassy staff flee Canberra in dead of night | news.com.au — Australia’s leading news site for latest headlines</a></li>
										
                    	<li><a href="https://www.reuters.com/world/swedish-security-service-says-iran-uses-criminal-networks-sweden-2024-05-30/">Swedish security service says Iran uses criminal networks in Sweden | Reuters</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-hackers-sabotage-iranian-ships-at-sea-again/">Risky Bulletin: Hackers sabotage Iranian ships at sea, again - Risky Business Media</a></li>
										
                    	<li><a href="https://www.reuters.com/sustainability/boards-policy-regulation/microsoft-scales-back-chinese-access-cyber-early-warning-system-2025-08-20/">Microsoft scales back Chinese access to cyber early warning system | Reuters</a></li>
										
                    	<li><a href="https://www.propublica.org/article/microsoft-china-defense-department-cloud-computing-security">Microsoft Didn’t Disclose Key Details to U.S. Officials of China-Based Engineers, Record Shows — ProPublica</a></li>
										
                    	<li><a href="https://phrack.org/issues/72/7_md#article">.:: Phrack Magazine ::.</a></li>
										
                    	<li><a href="https://spur.us/how-spur-uncovered-a- chinese-proxy-and-vpn-service-used-in-an-apt-campaign/">Uncovering the Chinese Proxy Service Used in APT Campaigns</a></li>
										
                    	<li><a href="https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/">Weaponizing image scaling against production AI systems -The Trail of Bits Blog</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/russia-hacking-cisco-switches-fbi-warning/758206/">FBI, Cisco warn of Russia-linked hackers targeting critical infrastructure organizations | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://cyberscoop.com/crowdstrike-silk-typhoon-murky-panda-china-espionage/">CrowdStrike warns of uptick in Silk Typhoon attacks this summer | CyberScoop</a></li>
										
                    	<li><a href="https://cyberplace.social/@GossiTheDog/115095063936712306">Kevin Beaumont: &quot;There’s a bunch of new Netscal…&quot; - Cyberplace</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/us-charges-oregon-man-botnet-for-hire/758293/">US charges Oregon man in vast botnet-for-hire operation | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/south-korea-arrests-hacker-accused-of-targeting-celebrities-bts">South Korea arrests suspected Chinese hacker accused of targeting BTS singer and other celebrities | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/">SIM-Swapper, Scattered Spider Hacker Gets 10 Years – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/chinese-national-sentenced-prison">Chinese national who sabotaged Ohio company’s systems handed four-year jail stint | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/nevada-state-offices-close-after-wide-ranging-network-security-incident-2025-08-26/">Nevada state offices close after wide-ranging &#39;network security incident&#39; | Reuters</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/08/dslroot-proxies-and-the-threat-of-legal-botnets/">DSLRoot, Proxies, and the Threat of ‘Legal Botnets’ – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/russia-google-meet-ban-crackdown">Russia weighs Google Meet ban as part of foreign tech crackdown | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.forbes.com/sites/thomasbrewster/2025/08/26/kremlin-whatsapp-rival-is-designed-to-spy-on-users/">Kremlin-Mandated Messaging App Max Is Designed To Spy On Users</a></li>
										
                    	<li><a href="https://glavny.tv/last-news/russia/ieromonah-rpts-makariy-prizval-pomolitsya-za-messendzher-max/">Иеромонах РПЦ Макарий призвал помолиться за мессенджер MAX</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Wide World of Cyber: Microsoft&apos;s China Entanglement</title>
            <pubDate>Mon, 25 Aug 2025 14:24:29 +1000</pubDate>
            <link>https://risky.biz/WWC10/</link>
            <guid isPermaLink="true">https://risky.biz/WWC10/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/WWC10.mp3" length="65859520" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2743</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The Wide World of Cyber podcast is back! In this episode host Patrick Gray chats with Alex Stamos and Chris Krebs about Microsoft’s entanglement in China.

Redmond has been using Chinese engineers to do everything from remotely support US DoD private cloud systems to maintain the on premise version of the SharePoint code base. It’s all blown up in the press over the last month, but how did we get here? Did Microsoft make these decisions to save money? Or was it more about getting access to the Chinese market? And how can we all make the world’s most important software company stop doing things like this? Tune in to the Wide World of Cyber podcast to find out!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The Wide World of Cyber podcast is back! In this episode host Patrick Gray chats with Alex Stamos and Chris Krebs about Microsoft’s entanglement in China.</p>

<p>Redmond has been using Chinese engineers to do everything from remotely support US DoD private cloud systems to maintain the on premise version of the SharePoint code base. It’s all blown up in the press over the last month, but how did we get here? Did Microsoft make these decisions to save money? Or was it more about getting access to the Chinese market? And how can we all make the world’s most important software company stop doing things like this? Tune in to the Wide World of Cyber podcast to find out!</p>

<p>This episode is also available on <a href="https://youtu.be/C8B7y7CvhZM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #803 -- Oracle&apos;s CSO Mary Ann Davidson quietly departs</title>
            <pubDate>Wed, 20 Aug 2025 14:34:58 +1000</pubDate>
            <link>https://risky.biz/RB803/</link>
            <guid isPermaLink="true">https://risky.biz/RB803/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB803.mp3" length="56152352" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3508</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Oracle’s long term CSO departs, and we’re not that sad about it
  Canada’s House of Commons gets popped through a Microsoft bug
  Russia degrades voice calls via Whatsapp and Telegram to push people towards Max
  South-East Asian scam compounds are also behind child sextortion
  Reports that the UK has backed down on Apple crypto are… strange
  Oh and of course there’s a Fortinet bug! There’s always a Fortinet bug!


This week’s episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins the show this week, and explains the journey of implementing SSO backed login on Windows, Mac and Linux. You’ll never guess which one was a few lines of PAM config, and which was a multi-month engineering project!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Oracle’s long term CSO departs, and we’re not that sad about it</li>
  <li>Canada’s House of Commons gets popped through a Microsoft bug</li>
  <li>Russia degrades voice calls via Whatsapp and Telegram to push people towards Max</li>
  <li>South-East Asian scam compounds are also behind child sextortion</li>
  <li>Reports that the UK has backed down on Apple crypto are… strange</li>
  <li>Oh and of course there’s a Fortinet bug! There’s always a Fortinet bug!</li>
</ul>

<p>This week’s episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins the show this week, and explains the journey of implementing SSO backed login on Windows, Mac and Linux. You’ll never guess which one was a few lines of PAM config, and which was a multi-month engineering project!</p>

<p>This episode is also available on <a href="https://youtu.be/1oGbizhqV28">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.msn.com/en-in/news/India/is-oracle-facing-headwinds-after-layoffs-its-4-decade-veteran-chief-security-officer-mary-ann-davidson-departs/ar-AA1KOgUs">Is Oracle facing headwinds? After layoffs, its 4-decade veteran Chief Security Officer Mary Ann Davidson departs</a></li>
										
                    	<li><a href="https://www.itnews.com.au/news/oracle-cso-blasted-over-anti-security-research-rant-407776">Oracle CSO blasted over anti-security research rant - iTnews</a></li>
										
                    	<li><a href="https://therecord.media/zelle-lawsuit-new-york-state-scams-fraud">New York lawsuit against Zelle creator alleges features allowed $1 billion in thefts | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/08/mobile-phishers-target-brokerage-accounts-in-ramp-and-dump-cashout-scheme/">Mobile Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme – Krebs on Security</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/08/13/how-we-found-teaonher-spilling-users-drivers-licenses-in-less-than-10-minutes/">How we found TeaOnHer spilling users&#39; driver&#39;s licenses in less than 10 minutes | TechCrunch</a></li>
										
                    	<li><a href="https://www.theguardian.com/technology/2025/aug/19/uk-has-backed-down-on-demand-to-access-us-apple-user-data-spy-chief-says">UK has backed down on demand to access US Apple user data, spy chief says</a></li>
										
                    	<li><a href="https://x.com/DNIGabbard/status/1957623737232007638">DNI Tulsi Gabbard on X: &quot;As a result, the UK has agreed to drop its mandate for&quot;</a></li>
										
                    	<li><a href="https://blog.workday.com/en-us/protecting-you-from-social-engineering-campaigns-update-from-workday.html?refCamp=7014X000002rwAFQAY">Hackers target Workday in social engineering attack</a></li>
										
                    	<li><a href="https://therecord.media/russia-restricts-voice-calls-whatsapp-telegram-cybercrime">Russia curbs WhatsApp, Telegram calls to counter cybercrime | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/hackers-compromise-canada-house-of-commons">Hackers reportedly compromise Canadian House of Commons through Microsoft vulnerability | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/norway-police-suspect-pro-russian-hackers-dam-sabotage">Norway police believe pro-Russian hackers were behind April dam sabotage | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/ot-asset-inventory-guidance-cisa-international/757569/">US agencies, international allies issue guidance on OT asset inventorying | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://pwner.gg/blog/2025-08-13-fortiweb-cve-2025-52970">FortMajeure: Authentication Bypass in FortiWeb (CVE-2025-52970)</a></li>
										
                    	<li><a href="https://x.com/statedept_nea/status/1957445268942528763?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">U.S. State Dept - Near Eastern Affairs on X: &quot;He did not claim diplomatic immunity and was released by a state judge&quot;</a></li>
										
                    	<li><a href="https://www.wired.com/story/child-sextorition-scam-compounds-southeast-asia/">493 Cases of Sextortion Against Children Linked to Notorious Scam Compounds | WIRED</a></li>
										
                    	<li><a href="https://phrack.org/issues/72/1">.:: Phrack Magazine ::.</a></li>
										
                    	<li><a href="https://www.itnews.com.au/news/accenture-to-buy-australian-cyber-security-firm-cybercx-619634">Accenture to buy Australian cyber security firm CyberCX - iTnews</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: How to measure vulnerability reachability</title>
            <pubDate>Fri, 15 Aug 2025 09:06:39 +1000</pubDate>
            <link>https://risky.biz/soapbox99/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox99/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox99.mp3" length="51584403" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2148</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications.

It’s great to know there’s a CVE in a library you’re using, but it’s even better if you can say whether or not that vulnerability actually impacts your application.

They also talk about how Socket started out as a way to discover malicious packages in software projects, but these days it’s playing the CVE game as well.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications.</p>

<p>It’s great to know there’s a CVE in a library you’re using, but it’s even better if you can say whether or not that vulnerability actually impacts your application.</p>

<p>They also talk about how Socket started out as a way to discover malicious packages in software projects, but these days it’s playing the CVE game as well.</p>

<p>This episode is also available on <a href="https://youtu.be/cCzr83mU3A4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #802 -- Accessing internal Microsoft apps with your Hotmail creds</title>
            <pubDate>Wed, 13 Aug 2025 15:51:34 +1000</pubDate>
            <link>https://risky.biz/RB802/</link>
            <guid isPermaLink="true">https://risky.biz/RB802/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB802.mp3" length="57621046" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3600</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  CISA warns about the path from on-prem Exchange to the cloud
  Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are
  Everyone and their dog seems to have a shell in US Federal Court information systems
  Google pays $250k for a Chrome sandbox escape
  Attackers use javascript in adult SVG files to … farm facebook likes?!
  SonicWall says users aren’t getting hacked with an 0day… this time.


This week’s episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>CISA warns about the path from on-prem Exchange to the cloud</li>
  <li>Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are</li>
  <li>Everyone and their dog seems to have a shell in US Federal Court information systems</li>
  <li>Google pays $250k for a Chrome sandbox escape</li>
  <li>Attackers use javascript in adult SVG files to … farm facebook likes?!</li>
  <li>SonicWall says users aren’t getting hacked with an 0day… this time.</li>
</ul>

<p>This week’s episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together.</p>

<p>This episode is also available on <a href="https://youtu.be/Yfs4guB641k">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/microsoft-exchange-server-vulnerability-cisa-alert">CISA, Microsoft issue alerts on ‘high-severity’ Exchange vulnerability | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Mollema-Advanced-AD-to-Entra-ID-lateral-movement-techniques-Wednesday.pdf">Advanced Active Directory to Entra ID lateral movement techniques</a></li>
										
                    	<li><a href="https://research.eye.security/consent-and-compromise/">Consent &amp; Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications</a></li>
										
                    	<li><a href="https://www.politico.com/news/2025/08/08/federal-court-hack-cartels-00500391">Cartels may be able to target witnesses after major court hack</a></li>
										
                    	<li><a href="https://therecord.media/federal-judiciary-tightens-digital-security-escalated-cyberattack">Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks’ | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/citrix-netscaler-attacks-netherlands/757434/">Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/darpa-ai-cyber-challenge-winners-def-con/757252/">DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://blog.trailofbits.com/2025/08/08/buttercup-is-now-open-source/">Buttercup is now open-source!</a></li>
										
                    	<li><a href="https://portswigger.net/research/http1-must-die">HTTP/1.1 must die: the desync endgame</a></li>
										
                    	<li><a href="https://therecord.media/us-confirms-blacksuit-takedown">US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/scarcruft-north-korea-hackers-add-ransomware">North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/08/adult-sites-use-malicious-svg-files-to-rack-up-likes-on-facebook/">Adult sites are stashing exploit code inside racy .svg files - Ars Technica</a></li>
										
                    	<li><a href="https://issues.chromium.org/issues/412578726">Google pays 250k for Chromium sandbox escape</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/sonicwall-says-recent-attack-wave-involved-previously-disclosed-flaw-not-z/757067/">SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/winrar-zero-day-exploited-romcom-paper-werewolf-goffee-hackers">Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/tornado-cash-money-laundering-conviction">Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/google-gemini-calendar-invite-hijack-smart-home/">Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED</a></li>
										
                    	<li><a href="https://secureannex.com/blog/these-vibes-are-off/">Malware in Open VSX: These Vibes Are Off</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/phishing-with-active-directory-federation-services/">How attackers are using Active Directory Federation Services to phish with legit office.com links</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/phishing-detection-evasion-launch/">Introducing our guide to phishing detection evasion techniques</a></li>
										
                    	<li><a href="https://specterops.io/resources/state-of-apm/">The State of Attack Path Management</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #801 -- AI models can hack well now and it&apos;s weirding us out</title>
            <pubDate>Wed, 06 Aug 2025 15:24:55 +1000</pubDate>
            <link>https://risky.biz/RB801/</link>
            <guid isPermaLink="true">https://risky.biz/RB801/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB801.mp3" length="63388858" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3961</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut.

This episode explores the rise of AI-powered bug hunting:

  Google’s Project Zero and Deepmind team up to find and report 20 bugs to open source projects
  The XBOW AI bug hunting platform sees success on HackerOne
  Is an AI James Kettle on the horizon?


There’s also plenty of regular cybersecurity news to discuss:

  On-prem Sharepoint’s codebase is maintained out of China… awkward!
  China frets about the US backdooring its NVIDIA chips, how you like ‘dem apples, China?
  SonicWall advises customers to turn off their VPNs
  Hardware controlling Dell laptop fingerprint and card readers has nasty driver bugs
  Russia uses its ISPs to in-the-middle embassy computers and backdoor ‘em.
  The Russian government pushes VK’s Max messenger for everything


This week’s show is sponsored by device management platform Devicie. Head of Solutions Sean Ollerton talks through the impending Windows 10 apocalypse, as Microsoft ends mainstream support. He says Windows 11 isn’t as scary as people make out, but if the update isn’t on your radar now, time is running out.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut.</p>

<p>This episode explores the rise of AI-powered bug hunting:</p>
<ul>
  <li>Google’s Project Zero and Deepmind team up to find and report 20 bugs to open source projects</li>
  <li>The XBOW AI bug hunting platform sees success on HackerOne</li>
  <li>Is an AI James Kettle on the horizon?</li>
</ul>

<p>There’s also plenty of regular cybersecurity news to discuss:</p>
<ul>
  <li>On-prem Sharepoint’s codebase is maintained out of China… awkward!</li>
  <li>China frets about the US backdooring its NVIDIA chips, how you like ‘dem apples, China?</li>
  <li>SonicWall advises customers to turn off their VPNs</li>
  <li>Hardware controlling Dell laptop fingerprint and card readers has nasty driver bugs</li>
  <li>Russia uses its ISPs to in-the-middle embassy computers and backdoor ‘em.</li>
  <li>The Russian government pushes VK’s Max messenger for everything</li>
</ul>

<p>This week’s show is sponsored by device management platform Devicie. Head of Solutions Sean Ollerton talks through the impending Windows 10 apocalypse, as Microsoft ends mainstream support. He says Windows 11 isn’t as scary as people make out, but if the update isn’t on your radar now, time is running out.</p>

<p>This episode is also available on <a href="https://youtu.be/jX0V5J9g1TQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://techcrunch.com/2025/08/04/google-says-its-ai-based-bug-hunter-found-20-security-vulnerabilities/">Google says its AI-based bug hunter found 20 security vulnerabilities | TechCrunch</a></li>
										
                    	<li><a href="https://cyberscoop.com/is-xbows-success-the-beginning-of-the-end-of-human-led-bug-hunting-not-yet/">Is XBOW’s success the beginning of the end of human-led bug hunting? Not yet. | CyberScoop</a></li>
										
                    	<li><a href="https://x.com/albinowax/status/1951722079302160845">James Kettle on X: &quot;There I am being careful to balance hyping my talk without going too far and then this gets published 😂 maybe the countdown timer is just too ominous! </a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-china-with-the-accusations-again/">Risky Bulletin: China with the accusations again - Risky Business Media</a></li>
										
                    	<li><a href="https://mp.weixin.qq.com/s/MjIlXBYK0kK2ysU6a78BAg">美情报机构频繁对我国防军工领域实施网络攻击窃密</a></li>
										
                    	<li><a href="https://www.propublica.org/article/microsoft-sharepoint-hack-china-cybersecurity">SharePoint Exploit: Microsoft Used China-Based Engineers to Maintain the Software — ProPublica</a></li>
										
                    	<li><a href="https://asiatimes.com/2025/08/china-fears-nvidia-chips-could-track-trace-and-shut-down-its-ais/">China fears Nvidia chips could track, trace and shut down its AIs - Asia Times</a></li>
										
                    	<li><a href="https://therecord.media/sonicwall-possible-zero-day-gen-7-firewalls-ssl-vpn">SonicWall urges customers to take VPN devices offline after ransomware incidents | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.sonicwall.com/support/notices/gen-7-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430">Gen 7 SonicWall Firewalls – SSLVPN Recent Threat Activity</a></li>
										
                    	<li><a href="https://blog.talosintelligence.com/revault-when-your-soc-turns-against-you/">ReVault! When your SoC turns against you…</a></li>
										
                    	<li><a href="https://www.404media.co/nearly-100-000-chatgpt-conversations-were-searchable-on-google/">Nearly 100,000 ChatGPT Conversations Were Searchable on Google</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2025/07/microsoft-catches-russian-hackers-targeting-foreign-embassies/">Microsoft catches Russian hackers targeting foreign embassies - Ars Technica</a></li>
										
                    	<li><a href="https://www.wired.com/story/russia-fsb-turla-secret-blizzard-apolloshadow-isp-cyberespionage/">The Kremlin’s Most Devious Hacking Group Is Using Russian ISPs to Plant Spyware | WIRED</a></li>
										
                    	<li><a href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats | Microsoft Security Blog</a></li>
										
                    	<li><a href="https://therecord.media/russia-bans-speedtest-ookla">Russia blocks popular US-made internet speed test tool over national security concerns | The Record from Recorded Future News</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Soap Box: Why AI can&apos;t fix bad security products</title>
            <pubDate>Fri, 01 Aug 2025 13:37:33 +1000</pubDate>
            <link>https://risky.biz/soapbox98/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox98/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox98.mp3" length="53576896" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2231</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Soap Box edition of the show Patrick Gray chats with the CEO of email security company Sublime Security, Josh Kamdjou. They talk about where AI is useful, where it isn’t, and why AI can’t save vendors from their bad product design choices.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Soap Box edition of the show Patrick Gray chats with the CEO of email security company Sublime Security, Josh Kamdjou. They talk about where AI is useful, where it isn’t, and why AI can’t save vendors from their bad product design choices.</p>

<p>This episode is also available on <a href="https://youtu.be/7g1BGIBxHPs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP</title>
            <pubDate>Wed, 30 Jul 2025 14:49:20 +1000</pubDate>
            <link>https://risky.biz/RB800/</link>
            <guid isPermaLink="true">https://risky.biz/RB800/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB800.mp3" length="51493796" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3217</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Did the SharePoint bug leak out of the Microsoft MAPP program?
  Expel retracts its FIDO bypass writeup
  The mess surrounding the women-only dating-safety app Tea gets worse
  Broadcom customers struggle to get patches for VMWare hypervisor escapes
  Aeroflot gets hacked by the Cyber Partisans, disrupting flights


This week’s episode is sponsored by Push Security. Daniel Cuthbert joins and explains how having telemetry about identity from inside the browser is a key pillar for investigating intrusions in the browser-centric future.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Did the SharePoint bug leak out of the Microsoft MAPP program?</li>
  <li>Expel retracts its FIDO bypass writeup</li>
  <li>The mess surrounding the women-only dating-safety app Tea gets worse</li>
  <li>Broadcom customers struggle to get patches for VMWare hypervisor escapes</li>
  <li>Aeroflot gets hacked by the Cyber Partisans, disrupting flights</li>
</ul>

<p>This week’s episode is sponsored by Push Security. Daniel Cuthbert joins and explains how having telemetry about identity from inside the browser is a key pillar for investigating intrusions in the browser-centric future.</p>

<p>This episode is also available on <a href="https://youtu.be/ABIwfZiZwqo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.bloomberg.com/news/articles/2025-07-25/microsoft-sharepoint-hack-probe-on-whether-chinese-hackers-found-flaw-via-alert">Microsoft Probing Whether Cyber Alert Tipped Off Chinese Hackers</a></li>
										
                    	<li><a href="https://therecord.media/microsoft-says-warlock-ransomware-deployed-in-sharepoint-attacks">Microsoft says Warlock ransomware deployed in SharePoint attacks as governments scramble | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/what-we-know-microsoft-sharepoint-attacks/753961/">What we know about the Microsoft SharePoint attacks | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://expel.com/blog/an-important-update-and-apology-on-our-poisonseed-blog/">An important update (and apology) on our PoisonSeed blog</a></li>
										
                    	<li><a href="https://www.404media.co/tea-user-files-class-action-after-womens-safety-app-exposes-data/">Tea User Files Class Action After Women’s Safety App Exposes Data</a></li>
										
                    	<li><a href="https://www.404media.co/a-second-tea-breach-reveals-users-dms-about-abortions-and-cheating/">A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating</a></li>
										
                    	<li><a href="https://www.nytimes.com/2025/07/29/us/politics/nsa-lawyer-fired.html">Top Lawyer for National Security Agency Is Fired</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/defending-vsphere-from-unc3944?linkId=15878871">From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944</a></li>
										
                    	<li><a href="https://www.theregister.com/2025/07/23/vmware_patch_download_problems/">VMware prevents some perpetual license holders from downloading patches</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/07/pro-ukrainian-hackers-take-credit-for-attack-that-snarls-russian-flight-travel/">Pro-Ukrainian hackers take credit for attack that snarls Russian flight travel - Ars Technica</a></li>
										
                    	<li><a href="https://www.by.cpartisans.org/post/kiberudar-po-ajeroflotu-rf">КИБЕРУДАР ПО АЭРОФЛОТУ РФ!v</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/north-korea-remote-it-worker-sanctions/754087/">Treasury sanctions North Koreans involved in IT-worker schemes | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://statescoop.com/st-paul-mn-cyberattack-walz-national-guard/">Minnesota governor activates National Guard amid St. Paul cyberattack | StateScoop</a></li>
										
                    	<li><a href="https://www.luxtimes.lu/luxembourg/post-luxembourg-outage-caused-by-a-targeted-cyberattack-firm-confirms/80019668.html">Outage was result of cyberattack, Post Luxembourg says</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/clorox-380-million-suit-cognizant-cyberattack/753837/">Clorox files $380 million suit blaming Cognizant for 2023 cyberattack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://cyberscoop.com/cisco-identity-services-engines-active-exploits/">Cisco network access security platform vulnerabilities under active exploitation | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/arizona-woman-sentenced-north-korean-laptop-farm">Arizona woman sentenced to 8.5 years for running North Korean laptop farm | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/07/24/cybercrime-forum-leak-zone-publicly-exposed-its-users-ip-addresses/">Cybercrime forum Leak Zone publicly exposed its users&#39; IP addresses | TechCrunch</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #799 -- Everyone&apos;s Sharepoint gets shelled</title>
            <pubDate>Wed, 23 Jul 2025 15:53:42 +1000</pubDate>
            <link>https://risky.biz/RB799/</link>
            <guid isPermaLink="true">https://risky.biz/RB799/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB799.mp3" length="70989795" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>4435</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss:


  Microsoft tried to make outsourcing the Pentagon’s cloud maintenance to China okay (it was not)
  She shells Sharepoint by the sea-shore (by ‘she’ we mean ‘China’)
  Four (alleged) Scattered Spider members arrested (and bailed) in the UK
  Hackers spend $2700 to buy creds for a Brazilian payment system, steal $100M
  Fortinet has SQLI in the auth header, Citrix mem leak is weaponised, HP hardcodes creds and Sonicwalls get user-moderootkits. Just security vendor things!


This week’s episode is sponsored by Airlock Digital. CEO David Cottingham talks through what it takes to build a mature, resilient management platform for a security critical system.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss:</p>

<ul>
  <li>Microsoft tried to make outsourcing the Pentagon’s cloud maintenance to China okay (it was not)</li>
  <li>She shells Sharepoint by the sea-shore (by ‘she’ we mean ‘China’)</li>
  <li>Four (alleged) Scattered Spider members arrested (and bailed) in the UK</li>
  <li>Hackers spend $2700 to buy creds for a Brazilian payment system, steal $100M</li>
  <li>Fortinet has SQLI in the auth header, Citrix mem leak is weaponised, HP hardcodes creds and Sonicwalls get user-moderootkits. Just security vendor things!</li>
</ul>

<p>This week’s episode is sponsored by Airlock Digital. CEO David Cottingham talks through what it takes to build a mature, resilient management platform for a security critical system.</p>

<p>This episode is also available on <a href="https://youtu.be/Xs3q4LG5yvg">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://x.com/secdef/status/1946324468898426899">Update on DOD’s cloud services</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/microsoft-stop-using-engineers-china-tech-support-us-military-hegseth-orders-2025-07-18/">Microsoft to stop using engineers in China for tech support of US military, Hegseth orders review</a></li>
										
                    	<li><a href="https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers">A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers</a></li>
										
                    	<li><a href="https://x.com/LauraLoomer/status/1947310343425794189">While DOD policy bans unauthorized apps like TikTok from being on employees phones over national security risks</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/07/microsoft-fix-targets-attacks-on-sharepoint-zero-day/">Microsoft Fix Targets Attacks on SharePoint Zero-Day – Krebs on Security</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/national-guard-was-hacked-chinas-salt-typhoon-group-dhs-says-rcna218648">National Guard was hacked by China&#39;s &#39;Salt Typhoon&#39; group, DHS says</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/suspected-contractor-for-chinas-hafnium-group-arrested-in-in-italy/752533/">Suspected contractor for China’s Hafnium group arrested in in Italy | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/singapore-accuses-chinese-backed-hackers-critical-infrastructure-attacks">Singapore accuses Chinese state-backed hackers of attacking critical infrastructure networks | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/07/uk-charges-four-in-scattered-spider-ransom-group/">UK Arrests Four in ‘Scattered Spider’ Ransom Group – Krebs on Security</a></li>
										
                    	<li><a href="https://nation.cymru/news/four-people-bailed-after-arrests-over-cyber-attacks-on-ms-co-op-and-harrods/">Four people bailed after arrests over cyber attacks on M&amp;S, Co-op and Harrods</a></li>
										
                    	<li><a href="https://therecord.media/brazil-police-arrest-worker-theft">Brazilian police arrest IT worker over $100 million cyber theft | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/at-least-750-us-hospitals-faced-disruptions-during-last-years-crowdstrike-outage-study-finds/">At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/hacker-returns-stolen-gmx-bounty">Hacker returns cryptocurrency stolen from GMX exchange after $5 million bounty payment | The Record</a></li>
										
                    	<li><a href="https://therecord.media/indian-crypto-dcx-millions-stolen">Indian crypto exchange CoinDCX says $44 million stolen from reserves | The Record</a></li>
										
                    	<li><a href="https://therecord.media/chainalysis-crypto-stolen-billions">Chainalysis: $2.17 billion in crypto stolen in first half of 2025, driven by North Korean hacks | The Record</a></li>
										
                    	<li><a href="https://expel.com/blog/poisonseed-bypassing-fido-keys-to-fetch-user-accounts/">PoisonSeed bypassing FIDO keys to ‘fetch’ user accounts</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-browser-extensions-hijacked-for-web-scraping-botnet/">Risky Bulletin: Browser extensions hijacked for web scraping botnet</a></li>
										
                    	<li><a href="https://www.404media.co/a-startup-is-selling-data-hacked-from-peoples-computers-to-debt-collectors/">A Startup is Selling Data Hacked from Peoples’ Computers to Debt Collectors</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/07/18/a-surveillance-vendor-was-caught-exploiting-a-new-ss7-attack-to-track-peoples-phone-locations/">A surveillance vendor was caught exploiting a new SS7 attack to track people&#39;s phone locations | TechCrunch</a></li>
										
                    	<li><a href="https://kyivindependent.com/ukrainian-intel-hackers-hit-gazproms-network-infrastructure-sources-say-07-2025/">Ukrainian hackers wipe databases at Russia&#39;s Gazprom in major cyberattack, intelligence source says</a></li>
										
                    	<li><a href="https://therecord.media/file-transfer-crushftp-zero-day">File transfer company CrushFTP warns of zero-day exploit seen in the wild | The Record</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-hardcoded-passwords-in-aruba-access-points/">HPE warns of hardcoded passwords in Aruba access points</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/pre-auth-sql-injection-to-rce-fortinet-fortiweb-fabric-connector-cve-2025-25257/">Pre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257)</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/researchers-cisa-exploitation-citrix-netscaler/752819/">Researchers, CISA confirm active exploitation of critical Citrix Netscaler flaw | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/07/google-finds-custom-backdoor-being-installed-on-sonicwall-network-devices/">Google finds custom backdoor being installed on SonicWall network devices - Ars Technica</a></li>
										
                    	<li><a href="https://www.404media.co/hackers-can-remotely-trigger-the-brakes-on-american-trains-and-the-problem-has-been-ignored-for-years/">Hackers Can Remotely Trigger the Brakes on American Trains and the Problem Has Been Ignored for Years</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Prowler, the open cloud security platform</title>
            <pubDate>Tue, 15 Jul 2025 06:15:09 +1000</pubDate>
            <link>https://risky.biz/soapbox97/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox97/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox97.mp3" length="46299053" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1928</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler.

Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler’s successful transition from an open-source project into a community, and now a growing business with an as-a-service platform.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Toni de la Fuente, founder of open source multi-cloud security product Prowler.</p>

<p>Toni explains how Prowler came to be, and how its journey followed his own learning about the cloud. The pair also discuss Prowler’s successful transition from an open-source project into a community, and now a growing business with an as-a-service platform.</p>

<p>This episode is also available on <a href="https://youtu.be/JR9t9nRlatA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #798 -- Mexican cartel surveilled the FBI to identify, kill witnesses</title>
            <pubDate>Wed, 02 Jul 2025 14:54:27 +1000</pubDate>
            <link>https://risky.biz/RB798/</link>
            <guid isPermaLink="true">https://risky.biz/RB798/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB798.mp3" length="59843082" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3739</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Australian airline Qantas looks like it got a Scattered Spider-ing
  Microsoft works towards blunting the next CrowdStrike disaster
  Changes are coming for Microsoft’s default enterprise app consenting setup
  Synology downplays hardcoded passwords for its M365 cloud backup agent
  The next Citrix Netscaler memory disclosure looks nasty
  Drug cartels used technical surveillance to find, fix and finish FBI informants and witnesses


This week’s episode is sponsored by RAD Security. Co-founder Jimmy Mesta joins to talk through how they use AI automation to assess the security posture of sprawling cloud environments.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Australian airline Qantas looks like it got a Scattered Spider-ing</li>
  <li>Microsoft works towards blunting the next CrowdStrike disaster</li>
  <li>Changes are coming for Microsoft’s default enterprise app consenting setup</li>
  <li>Synology downplays hardcoded passwords for its M365 cloud backup agent</li>
  <li>The next Citrix Netscaler memory disclosure looks nasty</li>
  <li>Drug cartels used technical surveillance to find, fix and finish FBI informants and witnesses</li>
</ul>

<p>This week’s episode is sponsored by RAD Security. Co-founder Jimmy Mesta joins to talk through how they use AI automation to assess the security posture of sprawling cloud environments.</p>

<p>This episode is also available on <a href="https://youtu.be/mpu3prpQrOU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.abc.net.au/news/2025-07-02/qantas-cyber-attack-significant-data-stolen/105484720">Qantas hit by cyber attack, leaving 6 million customer records at risk of data breach</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/scattered-spider-appears-to-pivot-toward-aviation-sector/751917/">Scattered Spider appears to pivot toward aviation sector | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-windows-resilient-2024-it-outage/751740/">Microsoft to make Windows more resilient following 2024 IT outage | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=JBt-sB0qXqk">(384) The Ultimate Guide to App Consent in Microsoft Entra - YouTube</a></li>
										
                    	<li><a href="https://modzero.com/en/blog/when-backups-open-backdoors-synology-active-backup-m365/">When Backups Open Backdoors: Accessing Sensitive Cloud Data via &quot;Synology Active Backup for Microsoft 365&quot; / modzero</a></li>
										
                    	<li><a href="https://cyberscoop.com/att-wireless-account-lock-sim-swapping-protection/">AT&amp;T deploys new account lock feature to counter SIM swapping | CyberScoop</a></li>
										
                    	<li><a href="https://www.reuters.com/legal/government/iran-linked-hackers-threaten-release-trump-aides-emails-2025-06-30/">Iran-linked hackers threaten to release Trump aides&#39; emails | Reuters</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/iran-cyberattacks-warning-us-government-israel-war/751963/">US government warns of new Iran-linked cyber threats on critical infrastructure | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/">Actively exploited vulnerability gives extraordinary control over server fleets - Ars Technica</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-vulnerability-citrix-netscaler/751617/">Critical vulnerability in Citrix Netscaler raises specter of exploitation wave | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.wired.com/story/identities-of-80-plus-americans-stolen-for-north-korean-it-worker-scams/">Identities of More Than 80 Americans Stolen for North Korean IT Worker Scams | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/cloudflare-russia-restricting-access-crackdown">Cloudflare confirms Russia restricting access to services amid free internet crackdown | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://edition.cnn.com/2025/06/28/politics/mexican-drug-cartel-fbi-hack-informants?cid=ios_app">Mexican drug cartel used hacker to track FBI official, then killed potential FBI informants, government audit says | CNN Politics</a></li>
										
                    	<li><a href="https://oig.justice.gov/sites/default/files/reports/25-065_t.pdf">Audit of the FBI&#39;s Efforts to Mitigate the Effects of Ubiquitous Technical Surveillance - Redacted Report</a></li>
										
                    	<li><a href="https://therecord.media/nato-agreement-5percent-gdp-defense-spending-cyber">NATO members aim for spending 5% of GDP on defense, with 1.5% eligible for cyber | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/bulletproof-hosting-provider-aezagroup-sanctions/">US sanctions bulletproof hosting provider for supporting ransomware, infostealer operations | CyberScoop</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/06/26/us-french-authorities-confirm-arrest-of-breachforums-hackers/">US, French authorities confirm arrest of BreachForums hackers | TechCrunch</a></li>
										
                    	<li><a href="https://therecord.media/spain-europol-cryptocurrency-investment-scheme-takedown">Spanish police arrest five over $542 million crypto investment scheme | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/cambodia-scam-compounds-amnesty-international-report">Scam compounds labeled a &#39;living nightmare&#39; as Cambodian government accused of turning a blind eye | The Record from Recorded Future News</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #797 -- Stuxnet vs Massive Ordnance Penetrators</title>
            <pubDate>Wed, 25 Jun 2025 14:48:25 +1000</pubDate>
            <link>https://risky.biz/RB797/</link>
            <guid isPermaLink="true">https://risky.biz/RB797/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB797.mp3" length="59795836" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3736</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  We roll our eyes over the “16 billion credentials” leak hitting mainstream news
  Some interesting cyber angles emerge from the conflict in Iran
  Opensource maintainer of libxml2 is fed up with this hacker crap
  Shockingly, there are yet more ways to trick people into pasting commands into Windows
  Veeam “patches” its backup software RCE like it’s 2002 … by breaking the public PoC


This week’s episode is sponsored by Internet-wide honeypot reconnaissance platform, Greynoise. Founder Andrew Morris joins to talk about their journey spotting Chinese ORB-builders hacking thousands of ASUS routers, and why they’re destined for the woodchipper.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>We roll our eyes over the “16 billion credentials” leak hitting mainstream news</li>
  <li>Some interesting cyber angles emerge from the conflict in Iran</li>
  <li>Opensource maintainer of libxml2 is fed up with this hacker crap</li>
  <li>Shockingly, there are yet more ways to trick people into pasting commands into Windows</li>
  <li>Veeam “patches” its backup software RCE like it’s 2002 … by breaking the public PoC</li>
</ul>

<p>This week’s episode is sponsored by Internet-wide honeypot reconnaissance platform, Greynoise. Founder Andrew Morris joins to talk about their journey spotting Chinese ORB-builders hacking thousands of ASUS routers, and why they’re destined for the woodchipper.</p>

<p>This episode is also available on <a href="https://youtu.be/CHiBh88nrtQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/">No, the 16 billion credentials leak is not a new data breach</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/06/suspected-china-state-hackers-exploited-patched-flaw-to-breach-canadian-telecom/">Canadian telecom hacked by suspected China state group - Ars Technica</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/telecom-giant-viasat-breached-by-chinas-salt-typhoon-hackers/">Telecom giant Viasat breached by China&#39;s Salt Typhoon hackers</a></li>
										
                    	<li><a href="https://x.com/wartranslated/status/1936742379567935575?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">WarTranslated on X: &quot;Iran’s jamming GPS in the Strait of Hormuz, messing with ~970 ships, per Windward. UKMTO confirms the interference. Faulty AIS coordinates are screwing up navigation in the Persian Gulf. The IRGC threatens to shut the strait down in hours. https://t.co/kdMJvshOGC&quot; / X</a></li>
										
                    	<li><a href="https://x.com/dalperovitch/status/1936769659275264355?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Dmitri Alperovitch on X: &quot;Chairman of the Joint Chiefs Gen. Dan Caine says @US_CYBERCOM supported this strike mission&quot; / X</a></li>
										
                    	<li><a href="https://www.politico.com/news/2025/06/20/richard-angle-nsa-cyber-command-00415619">Top Pentagon spy pick rejected by White House - POLITICO</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/dhs-warns-of-heightened-cyber-threat-as-us-enters-iran-conflict/751314/">DHS warns of heightened cyber threat as US enters Iran conflict | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://edition.cnn.com/2025/06/24/politics/intel-assessment-us-strikes-iran-nuclear-sites">Exclusive: Early US intel assessment suggests strikes on Iran did not destroy nuclear sites, sources say</a></li>
										
                    	<li><a href="https://www.nbcnews.com/world/iran/iran-trump-nuclear-israel-bombing-what-next-rcna214328">U.S. braces for Iran&#39;s response after overnight strikes on nuclear sites</a></li>
										
                    	<li><a href="https://podcast.silverado.org/e/assessing-the-damage-to-iran-s-nuclear-program/">Assessing the Damage to Iran’s Nuclear Program</a></li>
										
                    	<li><a href="https://www.tiranatimes.com/iran-hacks-tirana-municipality-in-retaliation-over-mek/">Iran Hacks Tirana Municipality in Retaliation Over MEK - Tirana Times</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/06/20/irans-government-says-it-shut-down-internet-to-protect-against-cyberattacks/">Iran&#39;s government says it shut down internet to protect against cyberattacks | TechCrunch</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/aflac-cyber-crime-spree-insurance/751175/">Aflac discloses cyber intrusion linked to wider crime spree targeting insurance industry | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/tonga-ministry-of-health-hit-with-cyberattack">Tonga Ministry of Health hit with cyberattack affecting website, IT systems | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/alleged-ryuk-member-arrest-ukraine-extradited-us">Alleged Ryuk ransomware gang member arrested in Ukraine and extradited to US | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/revil-cybercrime-gang-members-released-russia">Russia releases REvil members after convictions for payment card fraud | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://specterops.io/blog/2025/06/10/onelogin-many-issues-how-i-pivoted-from-a-trial-tenant-to-compromising-customer-signing-keys/">OneLogin, Many Issues: How I Pivoted from a Trial Tenant to Compromising Customer Signing Keys - SpecterOps</a></li>
										
                    	<li><a href="https://gitlab.gnome.org/GNOME/libxml2/-/issues/913">Triaging security issues reported by third parties (#913) · Issue · GNOME/libxml2</a></li>
										
                    	<li><a href="https://gitlab.gnome.org/GNOME/libxml2/-/commit/35d04a0848d8648807672e2ac1ba73ff7bbaee3a">README: Set expectations straight (35d04a08) · Commits · GNOME / libxml2 · GitLab</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia">What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia | Google Cloud Blog</a></li>
										
                    	<li><a href="https://mrd0x.com/filefix-clickfix-alternative/">FileFix - A ClickFix Alternative | mr.d0x</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/06/tech-support-scammers-inject-malicious-phone-numbers-into-big-name-websites/">Address bar shows hp.com. Browser displays scammers’ malicious text anyway. - Ars Technica</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/veeam-patch-critical-flaw-backup/751052/">Researchers urge vigilance as Veeam releases patch to address critical flaw | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://mrbruh.com/asus_p2/">ASUSpicious Flaw - Millions of Users’ Information Exposed Since 2022 | MrBruh&#39;s Epic Blog</a></li>
										
                    	<li><a href="https://www.watoday.com.au/national/western-australia/perth-man-admits-creating-evil-twin-wi-fi-service-to-steal-personal-information-20250620-p5m92m.html">Perth dad who created ‘evil twin’ Wi-Fi did so to access pictures of women</a></li>
										
                    	<li><a href="https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers">GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #796 -- With special guest co-host Chris Krebs</title>
            <pubDate>Wed, 18 Jun 2025 14:43:47 +1000</pubDate>
            <link>https://risky.biz/RB796/</link>
            <guid isPermaLink="true">https://risky.biz/RB796/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB796.mp3" length="58639202" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3664</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through:


  Israeli “hacktivists” take out an Iranian state-owned bank
  Scattered-spider and friends pivot into attacking insurers
  Securing identities in a cloud-first world keeps us awake at night
  Microsoft takes the “aas” out of SaaS for Europe, leaving us with just software!
  An AI prompt injection into M365 exfils corporate data


This week’s episode is sponsored by Kroll’s Cyber practice. Kroll Cyber Associate Managing Director George Glass is based in London and talks through his experiences helping organisations in the UK deal with the Scattered Spider attacks.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through:</p>

<ul>
  <li>Israeli “hacktivists” take out an Iranian state-owned bank</li>
  <li>Scattered-spider and friends pivot into attacking insurers</li>
  <li>Securing identities in a cloud-first world keeps us awake at night</li>
  <li>Microsoft takes the “aas” out of SaaS for Europe, leaving us with just software!</li>
  <li>An AI prompt injection into M365 exfils corporate data</li>
</ul>

<p>This week’s episode is sponsored by Kroll’s Cyber practice. Kroll Cyber Associate Managing Director George Glass is based in London and talks through his experiences helping organisations in the UK deal with the Scattered Spider attacks.</p>

<p>This episode is also available on <a href="https://youtu.be/3wfVQywhIHs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://cyberscoop.com/iran-bank-sepah-cyberattack/.">Iran’s Bank Sepah disrupted by cyberattack claimed by pro-Israel hacktivist group | CyberScoop</a></li>
										
                    	<li><a href="https://www.politico.eu/article/iran-orders-officials-to-ditch-connected-devices/">Iran orders officials to ditch connected devices</a></li>
										
                    	<li><a href="https://www.radware.com/getattachment/072a3d01-ad06-4070-99bc-1162d7d05906/Threat-Alert-Heightened-Cyberthreat-Amidst-Israel-Iran-Conflict.pdf.aspx">Heightened Cyberthreat Amidst Israel-Iran Conflict</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/threat-group-linked-to-uk-us-retail-attacks-now-targeting-insurance-indust/750870/">Threat group linked to UK, US retail attacks now targeting insurance industry | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/06/apple-previews-new-import-export-feature-to-make-passkeys-more-interoperable/">Coming to Apple OSes: A seamless, secure way to import and export passkeys - Ars Technica</a></li>
										
                    	<li><a href="https://www.wsj.com/tech/cybersecurity/cyberattack-on-washington-post-compromises-email-accounts-of-journalists-70bf1300">Cyberattack on Washington Post Compromises Email Accounts of Journalists</a></li>
										
                    	<li><a href="https://therecord.media/keir-giles-russia-researcher-email-hacked">Hackers impersonating US government compromise email account of prominent Russia researcher | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://blogs.microsoft.com/blog/2025/06/16/announcing-comprehensive-sovereign-solutions-empowering-european-organizations/">A good one to talk to Chris about:</a></li>
										
                    	<li><a href="https://www.aim.security/lp/aim-labs-echoleak-blogpost">Breaking down ‘EchoLeak’, the First Zero-Click AI Vulnerability Enabling Data Exfiltration from Microsoft 365 Copilot</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/simplehelp-vulnerabilities-cisa-warning/750676/">CISA warns of supply chain risks as ransomware attacks exploit SimpleHelp flaws | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/unfi-groceries-supplier-cyberattack-update">Whole Foods supplier making progress on restoration after cyberattack left shelves empty | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/yes24-south-korea-ransomware-attack">Ransomware attack on ticketing platform upends South Korean entertainment industry | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.westjet.com/en-ca/news/2025/advisory--cybersecurity-incident-">Advisory: Cybersecurity incident</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Soap Box: AI has entered the SOC, and it ain&apos;t going anywhere</title>
            <pubDate>Mon, 16 Jun 2025 11:40:56 +1000</pubDate>
            <link>https://risky.biz/soapbox96/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox96/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox96.mp3" length="44615703" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1858</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC.

The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in security?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC.</p>

<p>The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in security?</p>

<p>This episode is also available on <a href="https://youtu.be/mGU4pliTV5w">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #795 -- How The Com is hacking Salesforce tenants</title>
            <pubDate>Wed, 11 Jun 2025 14:57:30 +1000</pubDate>
            <link>https://risky.biz/RB795/</link>
            <guid isPermaLink="true">https://risky.biz/RB795/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB795.mp3" length="64886843" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>4054</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  New York Times gets a little stolen Russian FSB data as a treat
  iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign
  Researcher figures out a trick to get Google account holders’ full names and phone numbers
  Major US food distributor gets ransomwared
  The Com’s social engineering of Salesforce app authorisations is a harbinger of our future problems
  Australian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar.


This week’s episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta’s Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>New York Times gets a little stolen Russian FSB data as a treat</li>
  <li>iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign</li>
  <li>Researcher figures out a trick to get Google account holders’ full names and phone numbers</li>
  <li>Major US food distributor gets ransomwared</li>
  <li>The Com’s social engineering of Salesforce app authorisations is a harbinger of our future problems</li>
  <li>Australian Navy forgets New Zealand has computers, zaps Kiwis with their giant radar.</li>
</ul>

<p>This week’s episode is sponsored by identity provider Okta. Long-time friend of the show Alex Tilley is Okta’s Global Threat Research Coordinator, and he joins to discuss how organisations can use both human and technical signals to spot North Koreans in their midst.</p>

<p>This episode is also available on <a href="https://youtu.be/elVFqcIWphQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.nytimes.com/2025/06/07/world/europe/russia-intelligence-documents-leak-how.html">How The Times Obtained Secret Russian Intelligence Documents - The New York Times</a></li>
										
                    	<li><a href="https://therecord.media/ukraine-military-russia-strategic-bomber">Ukraine&#39;s military intelligence claims cyberattack on Russian strategic bomber maker | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/harris-walz-campaign-may-targeted-iphone-hackers-cybersecurity-firm-sa-rcna199468">Harris-Walz campaign may have been targeted by iPhone hackers, cybersecurity firm says</a></li>
										
                    	<li><a href="https://iverify.io/blog/iverify-uncovers-evidence-of-zero-click-mobile-exploitation-in-the-us">iVerify Uncovers Evidence of Zero-Click Mobile Exploitation in the U.S.</a></li>
										
                    	<li><a href="https://therecord.media/paragon-spyware-maker-cuts-ties-italy-government">Spyware maker cuts ties with Italy after government refused audit into hack of journalist’s phone | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/06/06/italian-lawmakers-say-italy-used-spyware-to-target-phones-of-immigration-activists-but-not-against-journalist/">Italian lawmakers say Italy used spyware to target phones of immigration activists, but not against journalist | TechCrunch</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/06/03/phone-chipmaker-qualcomm-fixes-three-zero-days-exploited-by-hackers/">Android chipmaker Qualcomm fixes three zero-days exploited by hackers | TechCrunch</a></li>
										
                    	<li><a href="https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/">Cellebrite to acquire mobile testing firm Corellium in $200 million deal | CyberScoop</a></li>
										
                    	<li><a href="https://www.404media.co/apple-gave-governments-data-on-thousands-of-push-notifications/">Apple Gave Governments Data on Thousands of Push Notifications</a></li>
										
                    	<li><a href="https://www.404media.co/a-researcher-figured-out-how-to-reveal-any-phone-number-linked-to-a-google-account/">A Researcher Figured Out How to Reveal Any Phone Number Linked to a Google Account</a></li>
										
                    	<li><a href="https://brutecat.com/articles/leaking-google-phones">Bruteforcing the phone number of any Google user</a></li>
										
                    	<li><a href="https://therecord.media/acreed-infostealer-arises-after-lumma-takedown">Acreed infostealer poised to replace Lumma after global crackdown | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/bidencash-cybercrime-darknet-market-takedown-us-netherlands">BidenCash darknet forum taken down by US, Dutch law enforcement | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/uk-nhs-calls-for-blood-donations-after-cyberattack">NHS calls for 1 million blood donors as UK stocks remain low following cyberattack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/major-food-wholesaler-cyberattack-impacting-distribution">Major food wholesaler says cyberattack impacting distribution systems | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/kettering-health-ohio-interlock-ransomware">Kettering Health confirms attack by Interlock ransomware group as health record system is restored | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/hackers-abuse-salesforce-tool-extortion/749790/">Hackers abuse malicious version of Salesforce tool for data theft, extortion | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://x.com/infosec_au/status/1930449312892498008?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">shubs on X: &quot;IP whitelisting is fundamentally broken. At @assetnote, we&#39;ve successfully bypassed network controls by routing traffic through a specific location (cloud provider, geo-location). Today, we&#39;re releasing Newtowner, to help test for this issue: https://t.co/X3dkMz9gwK&quot; / X</a></li>
										
                    	<li><a href="https://www.wired.com/story/ross-ulbricht-31-million-donation-alphabay/">Ross Ulbricht Got a $31 Million Donation From a Dark Web Dealer, Crypto Tracers Suspect | WIRED</a></li>
										
                    	<li><a href="https://www.9news.com.au/national/australian-navy-ship-causes-radio-and-internet-outages-to-parts-of-nz/7f5910c2-612a-4680-b7e1-283f0f4c5032">Australian navy ship causes radio and internet outages to parts of New Zealand</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #794 -- Psychic Panda outgunned by Fluffy Lizard and UNC56728242</title>
            <pubDate>Wed, 04 Jun 2025 14:56:13 +1000</pubDate>
            <link>https://risky.biz/RB794/</link>
            <guid isPermaLink="true">https://risky.biz/RB794/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB794.mp3" length="56060113" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3502</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Cyber firms agree to deconflict and cross-reference hacker group names
  Russian nuclear facility blueprints gathered from public procurement websites
  Someone audio deepfaked the White House Chief of Staff, but for the dumbest reasons
  Germany identifies the Trickbot kingpin
  Google spots China’s MSS using Calendar events for malware C2
  Meta apps abuse localhost listeners to track web sessions.


This week’s episode is sponsored by automation vendor Tines. Its Field CISO, Matt Muller, joins the show to discuss an open letter penned by JP Morgan Chase’s CISO that pleads with Software as a Service suppliers to try to suck less at security.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Cyber firms agree to deconflict and cross-reference hacker group names</li>
  <li>Russian nuclear facility blueprints gathered from public procurement websites</li>
  <li>Someone audio deepfaked the White House Chief of Staff, but for the dumbest reasons</li>
  <li>Germany identifies the Trickbot kingpin</li>
  <li>Google spots China’s MSS using Calendar events for malware C2</li>
  <li>Meta apps abuse localhost listeners to track web sessions.</li>
</ul>

<p>This week’s episode is sponsored by automation vendor Tines. Its Field CISO, Matt Muller, joins the show to discuss an open letter penned by JP Morgan Chase’s CISO that pleads with Software as a Service suppliers to try to suck less at security.</p>

<p>This episode is also available on <a href="https://youtu.be/tvzh7GacC3A">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.reuters.com/sustainability/boards-policy-regulation/forest-blizzard-vs-fancy-bear-cyber-companies-hope-untangle-weird-hacker-2025-06-02/">&#39;Forest Blizzard&#39; vs &#39;Fancy Bear&#39; - cyber companies hope to untangle weird hacker nicknames | Reuters</a></li>
										
                    	<li><a href="https://www.404media.co/ukraines-massive-drone-attack-was-powered-by-open-source-software/">Ukraine&#39;s Massive Drone Attack Was Powered by Open Source Software</a></li>
										
                    	<li><a href="https://danwatch.dk/en/serious-security-breach-russian-nuclear-facilities-exposed/">Massive security breach: Russian nuclear facilities exposed online</a></li>
										
                    	<li><a href="https://newlinesmag.com/reportage/how-a-spyware-app-compromised-assads-army/">How a Spyware App Compromised Assad’s Army - New Lines Magazine</a></li>
										
                    	<li><a href="https://www.wsj.com/politics/policy/federal-authorities-probe-effort-to-impersonate-white-house-chief-of-staff-65da0d59">Exclusive | Federal Authorities Probe Effort to Impersonate White House Chief of Staff Susie Wiles - WSJ</a></li>
										
                    	<li><a href="https://therecord.media/malaysia-hack-scam-whatsapp-minister">Malaysian home minister’s WhatsApp hacked, used to scam contacts | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/05/u-s-sanctions-cloud-provider-funnull-as-top-source-of-pig-butchering-scams/">U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams – Krebs on Security</a></li>
										
                    	<li><a href="https://cyberscoop.com/avcheck-global-takedown/">Top counter antivirus service disrupted in global takedown | CyberScoop</a></li>
										
                    	<li><a href="https://www.wired.com/story/stern-trickbot-identified-germany-bka/">Cops in Germany Claim They’ve ID’d the Mysterious Trickbot Ransomware Kingpin | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/australia-ransomware-victims-must-report-payments">Australian ransomware victims now must tell the government if they pay up | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/china-hackers-google-calendar-events-research/749290/">Google: China-backed hackers hiding malware in calendar events | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://archive.md/R0VUa#selection-1331.0-1356.0">Coinbase breach linked to customer data leak in India, sources say | Reuters</a></li>
										
                    	<li><a href="https://therecord.media/defense-intelligence-agency-it-specialist-suspected-leak-foreign-government">US military IT specialist arrested for allegedly trying to leak secrets to foreign government | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/nso-group-appeals-jury-award-168million-">NSO appeals WhatsApp decision, says it can’t pay $168 million in ‘unlawful’ damages | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/connectwise-nation-state-attack-targeted-some-customers">ConnectWise says nation-state attack targeted multiple ScreenConnect customers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://security.googleblog.com/2025/05/sustaining-digital-certificate-security-chrome-root-store-changes.html">Google Online Security Blog: Sustaining Digital Certificate Security - Upcoming Changes to the Chrome Root Store</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/">Meta and Yandex are de-anonymizing Android users’ web browsing identifiers - Ars Technica</a></li>
										
                    	<li><a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">An Open Letter to Third-Party Suppliers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #793 -- Scattered Spider is hijacking MX records</title>
            <pubDate>Wed, 28 May 2025 14:56:57 +1000</pubDate>
            <link>https://risky.biz/RB793/</link>
            <guid isPermaLink="true">https://risky.biz/RB793/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB793.mp3" length="62291043" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3892</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this week’s edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week’s news, including:


  EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes
  The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed
  Brian Krebs eats a 6.3Tbps DDoS … ‘cause that’s how you demo your packet cannon
  Law enforcement takes out Lumma Stealer, Qakbot, Danabot and some dark web drug traffickers
  Iranian behind 2019 Baltimore ransomware mysteriously appears in North Carolina and pleads guilty
  CISA’s leadership is fleeing in droves, even though the US needs them more than ever.


This week’s episode is sponsored by Thinkst Canary. Long time friend of the show Haroon Meer joins and talks through where he feels the industry is at, having just returned home from the AI-fueled hype at this year’s RSA conference.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this week’s edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week’s news, including:</p>

<ul>
  <li>EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes</li>
  <li>The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed</li>
  <li>Brian Krebs eats a 6.3Tbps DDoS … ‘cause that’s how you demo your packet cannon</li>
  <li>Law enforcement takes out Lumma Stealer, Qakbot, Danabot and some dark web drug traffickers</li>
  <li>Iranian behind 2019 Baltimore ransomware mysteriously appears in North Carolina and pleads guilty</li>
  <li>CISA’s leadership is fleeing in droves, even though the US needs them more than ever.</li>
</ul>

<p>This week’s episode is sponsored by Thinkst Canary. Long time friend of the show Haroon Meer joins and talks through where he feels the industry is at, having just returned home from the AI-fueled hype at this year’s RSA conference.</p>

<p>This episode is also available on <a href="https://youtu.be/VDk__mgXCH4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.nextgov.com/cybersecurity/2025/05/china-linked-silk-typhoon-hackers-accessed-commvault-cloud-environments-person-familiar-says/405579/">China-linked ‘Silk Typhoon’ hackers accessed Commvault cloud environments, person familiar says - Nextgov/FCW</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-svg-use-for-phishing-explodes-in-2025/">Risky Bulletin: SVG use for phishing explodes in 2025 - Risky Business Media</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/">KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/midwestern-cellcom-telcom-cyberattack">Midwestern telco Cellcom confirms cyber incident after days of service outages | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-takedown-lumma-stealer/748727/">Microsoft leads international takedown of Lumma Stealer | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://x.com/g0njxa/status/1925905296137838626?s=46&amp;t=VLIuBKdOq3MvRk4IpV-_-A">Who said what? on X: &quot;Message from the administrator of Lumma Stealer on the forums about the recent events🕊️👀 https://t.co/MOjCSMMErK&quot; / X</a></li>
										
                    	<li><a href="https://therecord.media/hackers-charged-infrastructure-dismantled-operation-endgame">Ransomware hackers charged, infrastructure dismantled in international law enforcement operation | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/05/oops-danabot-malware-devs-infected-their-own-pcs/">Oops: DanaBot Malware Devs Infected Their Own PCs – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/doj-charges-man-allegedly-behind-qakbot-malware">DOJ charges man allegedly behind Qakbot malware | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/global-law-enforcement-arrest-270-tied-to-dark-web-drug-sales">US, Europol arrest 270 dark web drug traffickers in Operation RapTor | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/iranian-years-decades-guilty-ransomware">Iranian pleads guilty to launching Baltimore ransomware attack, faces 30 years behind bars | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/decentralized-crypto-platform-cetus-theft">Decentralized crypto platform Cetus hit with $223 million hack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/nearly-70000-impacted-coinbase-breach">Nearly 70,000 impacted by Coinbase breach involving $20 million ransom demand | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.9news.com.au/world/usa-new-york-crypto-investor-is-charged-with-kidnapping-and-torturing-a-man/9756fcd9-1e8f-4895-9407-bac5ef0048bd">USA: Crypto investor charged with kidnapping, torturing man in an NYC apartment</a></li>
										
                    	<li><a href="https://therecord.media/vietnam-orders-telegram-messaging-ban">Vietnam orders ban on Telegram messaging app over security concerns | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/hacker-who-breached-communications-app-used-by-trump-aide-stole-data-across-us-2025-05-21/">Exclusive: Hacker who breached communications app used by Trump aide stole data from across US government | Reuters</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-senior-official-departures/748992/">CISA loses nearly all top officials as purge continues | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/05/23/national-security-council-trump-rubio/">White House dismisses scores of National Security Council staff - The Washington Post</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now</title>
            <pubDate>Wed, 21 May 2025 14:21:26 +1000</pubDate>
            <link>https://risky.biz/RB792/</link>
            <guid isPermaLink="true">https://risky.biz/RB792/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB792.mp3" length="50926457" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3181</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:

  TeleMessage memory dumps show up on DDoSecrets
  Coinbase contractor bribed to hand over user data
  Telegram does seem to be actually cooperating with law enforcement
  Britain’s legal aid service gets 15 years worth of applicant data stolen
  Shocking no one, Ivanti were weaseling when they blamed latest bugs on a third party library


This week’s episode is sponsored by Prowler, who make an open source cloud security tool. Founder and original project developer Toni de la Fuente joins to talk through the flexibility that open tooling brings. Prowler is also adding support for SaaS platforms like M365, and of course, an AI assistant to help you write checks!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>
<ul>
  <li>TeleMessage memory dumps show up on DDoSecrets</li>
  <li>Coinbase contractor bribed to hand over user data</li>
  <li>Telegram does seem to be actually cooperating with law enforcement</li>
  <li>Britain’s legal aid service gets 15 years worth of applicant data stolen</li>
  <li>Shocking no one, Ivanti were weaseling when they blamed latest bugs on a third party library</li>
</ul>

<p>This week’s episode is sponsored by Prowler, who make an open source cloud security tool. Founder and original project developer Toni de la Fuente joins to talk through the flexibility that open tooling brings. Prowler is also adding support for SaaS platforms like M365, and of course, an AI assistant to help you write checks!</p>

<p>This episode is also available on <a href="https://youtu.be/naXPpXlBm2U">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://ddosecrets.com/article/telemessage">TeleMessage - Distributed Denial of Secrets</a></li>
										
                    	<li><a href="https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/">How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes | WIRED</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/coinbase-says-thieves-stole-user-data-tried-extort-20m-rcna207017">Coinbase says thieves stole user data and tried to extort $20M</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/hack-coinbase-400m/748382/">Hack could cost Coinbase up to $400M: filing | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.wsj.com/finance/currencies/crypto-industry-robberies-attacks-32c2867a">Severed Fingers and ‘Wrench Attacks’ Rattle the Crypto Elite</a></li>
										
                    	<li><a href="https://newsletterhunt.com/emails/188645">Money Stuff: US Debt Rates Itself | NewsletterHunt</a></li>
										
                    	<li><a href="https://www.reuters.com/world/china/2-massive-black-market-services-blocked-by-telegram-messaging-app-says-2025-05-15/">2 massive black market services blocked by Telegram, messaging app says | Reuters</a></li>
										
                    	<li><a href="https://www.404media.co/telegram-gave-authorities-data-on-more-than-20-000-users/">Telegram Gave Authorities Data on More than 20,000 Users</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/05/13/government-email-alert-system-govdelivery-used-to-send-scam-messages/">GovDelivery, an email alert system used by governments, abused to send scam messages | TechCrunch</a></li>
										
                    	<li><a href="https://au.finance.yahoo.com/news/ato-warning-as-hackers-steal-14000-in-tax-returns-be-wary-235742016.html">ATO warning as hackers steal $14,000 in tax returns: ‘Be wary’</a></li>
										
                    	<li><a href="https://therecord.media/sec-social-media-hack-sentencing">Hack of SEC social media account earns 14-month prison sentence for Alabama man | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/alleged-hacker-largest-breach-us-childrens-data-agrees-plead-guilty-rcna207963">19-year-old accused of largest child data breach in U.S. agrees to plead guilty</a></li>
										
                    	<li><a href="https://7news.com.au/news/beach-mansion-benz-and-bitcoin-worth-45m-seized-from-league-of-legends-hacker-shane-stephen-duffy-c-18731943">Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy | 7NEWS</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/05/20/nso-group-pegasus-trump-eo/">Pegasus spyware maker rebuffed in efforts to get off trade blacklist - The Washington Post</a></li>
										
                    	<li><a href="https://therecord.media/peter-green-chilled-ransomware-uk-logistics-company">Ransomware attack hits supplier of refrigerated groceries to British supermarkets | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/uk-legal-aid-agency-data-breach">UK government confirms massive data breach following hack of Legal Aid Agency | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/ivanti-endpoint-mobile-manager-exploited-vulnerabilities/748464/">Ivanti Endpoint Mobile Manager customers exploited via chained vulnerabilities | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/">Expression Payloads Meet Mayhem - Ivanti EPMM Unauth RCE Chain (CVE-2025-4427 and CVE-2025-4428)</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Push Security&apos;s browser-first twist on identity security</title>
            <pubDate>Fri, 16 May 2025 09:33:43 +1000</pubDate>
            <link>https://risky.biz/soapbox95/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox95/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox95a.mp3" length="49558260" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2064</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security.

Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find  shadow/personal account that a user has spun up.

It’s extremely difficult to bypass. That’s because when you’re in the browser it doesn’t matter how a phishing link arrives, or how a threat actor has concealed it from your detection stack – if the user sees it, Push sees it.

There are solutions for protecting your users SSO credentials, like passkeys. But what about all the SaaS in your environment? Even if it’s enrolled into your SSO, are you sure that’s how your users are authenticating to it? What about the automation platforms your developers and admins use? What about data platforms like Snowflake? Are your using setting up passkeys for those accounts? How would you know, and what problems can it cause if those accounts are vulnerable?

This is a fun one!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security.</p>

<p>Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find  shadow/personal account that a user has spun up.</p>

<p>It’s extremely difficult to bypass. That’s because when you’re in the browser it doesn’t matter how a phishing link arrives, or how a threat actor has concealed it from your detection stack – if the user sees it, Push sees it.</p>

<p>There are solutions for protecting your users SSO credentials, like passkeys. But what about all the SaaS in your environment? Even if it’s enrolled into your SSO, are you sure that’s how your users are authenticating to it? What about the automation platforms your developers and admins use? What about data platforms like Snowflake? Are your using setting up passkeys for those accounts? How would you know, and what problems can it cause if those accounts are vulnerable?</p>

<p>This is a fun one!</p>

<p>This episode is also available on <a href="https://youtu.be/yyq8kcWpRRU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #791 -- Woof! Copilot for Sharepoint coughs up creds and keys</title>
            <pubDate>Wed, 14 May 2025 14:47:37 +1000</pubDate>
            <link>https://risky.biz/RB791/</link>
            <guid isPermaLink="true">https://risky.biz/RB791/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB791.mp3" length="55576591" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3472</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Struggling to find that pesky passwords.xlsx in Sharepoint? Copilot has your back!
  The ransomware ecosystem is finding life a bit tough lately
  SAP Netweaver bug being used by Chinese APT crew
  Academics keep just keep finding CPU side-channel attacks
  And of course… bugs! Asus, Ivanti, Fortinet… and a Nissan LEAF?


This week’s episode is sponsored by Resourcely, who will soothe your Terraform pains. Founder and CEO Tracis McPeak joins to talk about how to get from a very red dashboard full of cloud problems to a workable future.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Struggling to find that pesky passwords.xlsx in Sharepoint? Copilot has your back!</li>
  <li>The ransomware ecosystem is finding life a bit tough lately</li>
  <li>SAP Netweaver bug being used by Chinese APT crew</li>
  <li>Academics keep just keep finding CPU side-channel attacks</li>
  <li>And of course… bugs! Asus, Ivanti, Fortinet… and a Nissan LEAF?</li>
</ul>

<p>This week’s episode is sponsored by Resourcely, who will soothe your Terraform pains. Founder and CEO Tracis McPeak joins to talk about how to get from a very red dashboard full of cloud problems to a workable future.</p>

<p>This episode is also available on <a href="https://youtu.be/eShq_dvwWiA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.pentestpartners.com/security-blog/exploiting-copilot-ai-for-sharepoint/">Exploiting Copilot AI for SharePoint | Pen Test Partners</a></li>
										
                    	<li><a href="https://mrbruh.com/asusdriverhub/">MrBruh&#39;s Epic Blog</a></li>
										
                    	<li><a href="https://www.reuters.com/technology/ransomware-group-lockbit-appears-have-been-hacked-analysts-say-2025-05-08/">Ransomware group Lockbit appears to have been hacked, analysts say | Reuters</a></li>
										
                    	<li><a href="https://x.com/GangExposed/status/1919741718338936980">&quot;CONTI LEAK: Video they tried to bury! 6+ Conti members on a private jet. TARGET’s birthday — $10M bounty on his head. Filmed by TARGET himself. Original erased — we kept a copy.&quot;</a></li>
										
                    	<li><a href="https://www.dailymail.co.uk/news/article-14699457/hackers-target-Marks-Spencers-political-allegiance.html">Mysterious hackers who targeted Marks and Spencer&#39;s computer systems hint at political allegiance as they warn other tech criminals not to attack former Soviet states </a></li>
										
                    	<li><a href="https://www.coveware.com/blog/2025/4/29/the-organizational-structure-of-ransomware-threat-actor-groups-is-evolving-before-our-eyes">The organizational structure of ransomware groups is evolving rapidly.</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/sap-netweaver-exploitation-second-wave/747661/">SAP NetWeaver exploitation enters second wave of threat activity</a></li>
										
                    	<li><a href="https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures">China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/05/doge-software-engineers-computer-infected-by-info-stealing-malware/">DOGE software engineer’s computer infected by info-stealing malware</a></li>
										
                    	<li><a href="https://therecord.media/hackers-hijack-japan-finance-accounts">Hackers hijack Japanese financial accounts to conduct nearly $2 billion in trades</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/05/09/fbi-and-dutch-police-seize-and-shut-down-botnet-of-hacked-routers/">FBI and Dutch police seize and shut down botnet of hacked routers</a></li>
										
                    	<li><a href="https://therecord.media/poland-arrests-four-ddos-hire">Poland arrests four in global DDoS-for-hire takedown</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/school-districts-hit-extortion-attempts-powerschool-breach-rcna205429">School districts hit with extortion attempts after PowerSchool breach</a></li>
										
                    	<li><a href="https://therecord.media/eu-launches-vulnerability-database">EU launches vulnerability database to tackle cybersecurity threats </a></li>
										
                    	<li><a href="https://www.vusec.net/projects/training-solo/">Training Solo - vusec</a></li>
										
                    	<li><a href="https://comsec.ethz.ch/research/microarch/branch-privilege-injection/">Branch Privilege Injection: Exploiting Branch Predictor Race Conditions – Computer Security Group</a></li>
										
                    	<li><a href="https://i.blackhat.com/Asia-25/Asia-25-Evdokimov-Remote-Exploitation-of-Nissan-Leaf.pdf">Remote Exploitation of Nissan Leaf: Controlling Critical Body Elements from the Internet</a></li>
										
                    	<li><a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-254">PSIRT | FortiGuard Labs</a></li>
										
                    	<li><a href="https://www.ivanti.com/blog/epmm-security-update">EPMM Security Update | Ivanti</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Wide World of Cyber: How state adversaries attack security vendors</title>
            <pubDate>Fri, 09 May 2025 10:28:56 +1000</pubDate>
            <link>https://risky.biz/WWC9/</link>
            <guid isPermaLink="true">https://risky.biz/WWC9/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/WWC9.mp3" length="75921142" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3162</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them.

From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns.

This edition of the Wide World of Cyber was recorded in front of a live audience in San Francisco, with Patrick attending via Zoom.

The Wide World of Cyber podcast series is a wholly sponsored co-production between SentinelOne and Risky Business Media.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them.</p>

<p>From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns.</p>

<p>This edition of the Wide World of Cyber was recorded in front of a live audience in San Francisco, with Patrick attending via Zoom.</p>

<p>The Wide World of Cyber podcast series is a wholly sponsored co-production between SentinelOne and Risky Business Media.</p>

<p>This episode is also available on <a href="https://youtu.be/vdxrU4XX8GQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate</title>
            <pubDate>Wed, 07 May 2025 14:55:44 +1000</pubDate>
            <link>https://risky.biz/RB790/</link>
            <guid isPermaLink="true">https://risky.biz/RB790/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB790.mp3" length="53977337" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3372</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow.
  Ransomware attacks on UK retailers are linked, and Marks &amp; Spencer has it extra bad
  After six years dormant, a Magento eCommerce platform backdoor comes to life
  The North Korean IT worker scam is truly webscale
  NSO group owes Meta $168m for hacking WhatsApp


This week’s episode is sponsored by vulnerability management wranglers, Nucleus Security. Aaron Unterberger joins to talk through the complexities of tracking vulnerabilities in cloud components - left to the source, right to the deployments, and …sideways into the sidecars?

This week’s show also features an excerpt from Pat’s interview with Senator Mark Warner - Scoot back one in your podcast feed to check out the full chat, or find it on Youtube.

This episode is available on Youtube too.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow.</li>
  <li>Ransomware attacks on UK retailers are linked, and Marks &amp; Spencer has it extra bad</li>
  <li>After six years dormant, a Magento eCommerce platform backdoor comes to life</li>
  <li>The North Korean IT worker scam is truly webscale</li>
  <li>NSO group owes Meta $168m for hacking WhatsApp</li>
</ul>

<p>This week’s episode is sponsored by vulnerability management wranglers, Nucleus Security. Aaron Unterberger joins to talk through the complexities of tracking vulnerabilities in cloud components - left to the source, right to the deployments, and …sideways into the sidecars?</p>

<p>This week’s show also features an excerpt from Pat’s interview with Senator Mark Warner - <a href="https://risky.biz/markwarner/">Scoot back one in your podcast feed</a> to check out the full chat, or find it on <a href="https://youtu.be/ZezjjoaYrQA">Youtube</a>.</p>

<p>This episode is available on <a href="https://youtu.be/dM4TGUpMO-0">Youtube</a> too.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.404media.co/mike-waltz-accidentally-reveals-obscure-app-the-government-is-using-to-archive-signal-messages/">Mike Waltz Accidentally Reveals Obscure App the Government Is Using to Archive Signal Messages</a></li>
										
                    	<li><a href="https://micahflee.com/despite-misleading-marketing-israeli-company-telemessage-used-by-trump-officials-can-access-plaintext-chat-logs/">Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs</a></li>
										
                    	<li><a href="https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/">The Signal Clone the Trump Admin Uses Was Hacked</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/telemessage-suspends-services-hackers-say-breached-app-rcna204925">App used by Mike Waltz suspends services after hacking claims</a></li>
										
                    	<li><a href="https://www.404media.co/senator-demands-investigation-into-trump-admin-signal-clone-after-404-media-investigation/">Senator Demands Investigation into Trump Admin Signal Clone After 404 Media Investigation</a></li>
										
                    	<li><a href="https://x.com/_MG_/status/1918148557670105354">MG on X: &quot;Looks like TeleMessage was probably procured and rolled out under Biden. There are public records for it. https://t.co/XCuZpi8PL3&quot; / X</a></li>
										
                    	<li><a href="https://therecord.media/harrods-cyberattack-uk-retailer">Harrods becomes latest retailer to announce attempted cyberattack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/crkx3vy54nzo">Co-op DragonForce cyber attack includes customer data, firm admits</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/cg72k851dd8o">Co-op cyber attack: Staff told to keep cameras on in meetings</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/05/hundreds-of-e-commerce-sites-hacked-in-supply-chain-attack/">Hundreds of e-commerce sites hacked in supply-chain attack - Ars Technica</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/05/microsoft-pushes-unphishable-logins-forward-with-new-sign-in-options/">Microsoft’s new “passwordless by default” is great but comes at a cost - Ars Technica</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that/">Windows RDP lets you log in using revoked passwords. Microsoft is OK with that. - Ars Technica</a></li>
										
                    	<li><a href="https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/">North Korean operatives have infiltrated hundreds of Fortune 500 companies | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/us-fincen-cut-off-huione-group-southeast-asia-cyber-scam">US wants to cut off key player in Southeast Asian cybercrime industry | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/myanmar-militia-leader-us-sanctions-cyber-scam-industry">Myanmar militia leader sanctioned by US over cyber scam connections | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/trump-cisa-budget-cuts-disinformation/747047/">Trump proposes major cut to CISA’s budget, citing false ‘censorship’ claims | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/nsa-to-cut-up-to-2000-roles-downsizing">NSA to cut up to 2,000 civilian roles as part of intel community downsizing | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/nso-group-owes-whatsapp-over-spyware-infections-jury/">NSO Group owes $168M in damages to WhatsApp over spyware infections, jury says | CyberScoop</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs</title>
            <pubDate>Tue, 06 May 2025 15:03:06 +1000</pubDate>
            <link>https://risky.biz/markwarner/</link>
            <guid isPermaLink="true">https://risky.biz/markwarner/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/markwarner.mp3" length="71639690" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2984</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about:


  The latest developments in the Signalgate scandal
  Why America needs to be more aggressive in responding to Volt Typhoon
  How tariffs are affecting American alliances
  Why the Five Eyes alliance is sacrosanct


This episode is available on Youtube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about:</p>

<ul>
  <li>The latest developments in the Signalgate scandal</li>
  <li>Why America needs to be more aggressive in responding to Volt Typhoon</li>
  <li>How tariffs are affecting American alliances</li>
  <li>Why the Five Eyes alliance is sacrosanct</li>
</ul>

<p>This episode is available on <a href="https://youtu.be/ZezjjoaYrQA">Youtube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #789 -- Apple&apos;s AirPlay vulns are surprisingly awful</title>
            <pubDate>Wed, 30 Apr 2025 15:30:32 +1000</pubDate>
            <link>https://risky.biz/RB789/</link>
            <guid isPermaLink="true">https://risky.biz/RB789/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB789.mp3" length="60045002" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3751</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  British retail stalwart Marks &amp; Spencer gets cybered
  South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat
  It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups
  Juice jacking! No, really! Some researchers actually did it (so still not in the wild, then)
  Anti-DOGE whistleblower sure sounds like he has a point


This week’s episode is sponsored by Knocknoc, who let you glue your firewalls to your single sign on. Knocknoc’s CEO Adam Pointon talks about the joy that having end-to-end IPv6 would bring for zero-trust access control. He also touches on people using Knocknoc inside their network to isolate critical systems.

Editors Note : Pat also gives Adam (Boileau) stick in the sponsor interview about the Risky Biz webserver not having IPv6 enabled, which fact-checking during the edit says is FAKE NEWS. Just uh, don’t look at how fresh that AAAA record in the DNS is, friends 😉

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>British retail stalwart Marks &amp; Spencer gets cybered</li>
  <li>South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat</li>
  <li>It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups</li>
  <li>Juice jacking! No, really! Some researchers actually did it (so still not in the wild, then)</li>
  <li>Anti-DOGE whistleblower sure sounds like he has a point</li>
</ul>

<p>This week’s episode is sponsored by Knocknoc, who let you glue your firewalls to your single sign on. Knocknoc’s CEO Adam Pointon talks about the joy that having end-to-end IPv6 would bring for zero-trust access control. He also touches on people using Knocknoc inside their network to isolate critical systems.</p>

<p><em>Editors Note : Pat also gives Adam (Boileau) stick in the sponsor interview about the Risky Biz webserver not having IPv6 enabled, which fact-checking during the edit says is FAKE NEWS. Just uh, don’t look at how fresh that AAAA record in the DNS is, friends 😉</em></p>

<p>This episode is also available on <a href="https://youtu.be/wke0U7WKI5o">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/british-retailer-MS-confirms-cyber-incident-store-delays">British retailer M&amp;S confirms being hit by ‘cyber incident’ amid store delays | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.theguardian.com/business/2025/apr/29/m-and-s-cyber-attack-linked-to-hacking-group-scattered-spider">M&amp;S cyber-attack linked to hacking group Scattered Spider | Marks &amp; Spencer | The Guardian</a></li>
										
                    	<li><a href="https://theedgemalaysia.com/node/752925">Bina Puri shares, Warrant B close sharply lower day after hacking</a></li>
										
                    	<li><a href="https://www.freemalaysiatoday.com/category/highlight/2025/04/25/bina-puri-pos-malaysia-tumble-following-hacking-incident">Bina Puri, Pos Malaysia tumble following hacking incident | FMT</a></li>
										
                    	<li><a href="https://therecord.media/japan-warns-of-unauthorized-trades-hacked-accounts">Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.globaltimes.cn/page/202504/1333032.shtml">US conducts cyberattacks against major Chinese commercial encryption provider: report - Global Times</a></li>
										
                    	<li><a href="https://www.iranintl.com/en/202504289343">Iran says major cyberattack on infrastructure repelled | Iran International</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/c209yrl3258o">Spain rules out cyber attack - but what could have caused power cut?</a></li>
										
                    	<li><a href="https://www.france24.com/en/live-news/20250428-south-korea-s-sk-telecom-begins-sim-card-replacement-after-data-breach">South Korea&#39;s SK Telecom begins SIM card replacement after data breach</a></li>
										
                    	<li><a href="https://www.oligo.security/blog/airborne">AirBorne: Wormable Zero-Click RCE in Apple AirPlay Puts Billions of Devices at Risk | Oligo Security | Oligo Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/04/ios-and-android-juice-jacking-defenses-have-been-trivial-to-bypass-for-years/">iOS and Android juice jacking defenses have been trivial to bypass for years - Ars Technica</a></li>
										
                    	<li><a href="https://www.androidauthority.com/android-16-usb-data-advanced-protection-3548018/">How Android 16&#39;s new security mode will stop USB-based attacks - Android Authority</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/researchers-warn-of-critical-flaw-found-in-erlang-otp-ssh/745900/">Researchers warn of critical flaw found in Erlang OTP SSH | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-vulnerability-sap-netweaver-exploitation/746383/">Critical vulnerability in SAP NetWeaver under threat of active exploitation | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://strobes.co/blog/cve-2025-31324-critical-sap-flaw-explained/">CVE-2025-31324: Critical SAP Flaw Explained | Strobes</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/">Fire In The Hole, We’re Breaching The Vault - Commvault Remote Code Execution (CVE-2025-34028)</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-nfc-card-malware-keeps-evolving-in-russia-a-bad-omen-for-the-future/">Risky Bulletin: NFC card malware keeps evolving in Russia, a bad omen for the future - Risky Business Media</a></li>
										
                    	<li><a href="https://apnews.com/article/hegseth-signal-chat-dirty-internet-line-6a64707f10ca553eb905e5a70e10bd9d">Hegseth had unsecured internet line in Pentagon for Signal, sources say | AP News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/04/whistleblower-doge-siphoned-nlrb-case-data/">Whistleblower: DOGE Siphoned NLRB Case Data – Krebs on Security</a></li>
										
                    	<li><a href="https://whistlebloweraid.org/wp-content/uploads/2025/04/2025_0414_Berulis-Disclosure-with-Exhibits.s.pdf">2025_0414_Berulis-Disclosure-with-Exhibits.s.pdf</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-deputy-director-madhu-gottumukkala/746371/">CISA gets a deputy director as it braces for major layoffs | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/two-top-cyber-officials-resign-from-cisa">Two top cyber officials resign from CISA | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.reuters.com/technology/ex-cisa-chief-chris-krebs-leaving-sentinelone-following-trump-pressure-sources-2025-04-16/">Ex-CISA chief Chris Krebs leaving SentinelOne following Trump pressure | Reuters</a></li>
										
                    	<li><a href="https://www.nbcnews.com/politics/national-security/chris-krebs-speaks-cuts-trump-cuts-digital-defense-rcna203427">Former cyber official targeted by Trump speaks out after cuts to digital defense</a></li>
										
                    	<li><a href="https://www.sentinelone.com/labs/top-tier-target-what-it-takes-to-defend-a-cybersecurity-company-from-todays-adversaries/">Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today&#39;s Adversaries | SentinelOne</a></li>
										
                    	<li><a href="https://x.com/zachxbt/status/1916756932763046273">ZachXBT on X: &quot;Nine hours ago a suspicious transfer was made from a potential victim for 3520 BTC ($330.7M)&quot;</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank</title>
            <pubDate>Mon, 28 Apr 2025 14:44:34 +1000</pubDate>
            <link>https://risky.biz/snakeoilers21pt2/</link>
            <guid isPermaLink="true">https://risky.biz/snakeoilers21pt2/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/snakeoilers21pt2.mp3" length="55953843" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2330</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products:

  LimaCharlie: A public cloud for SecOps
  Honeywell Cyber Insights: An OT security/discovery solution
  Fortra’s CobaltStrike and Outflank: Security tooling for red teamers


This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products:</p>
<ul>
  <li><a href="https://limacharlie.io/">LimaCharlie</a>: A public cloud for SecOps</li>
  <li><a href="https://process.honeywell.com/us/en/products/ot-cybersecurity/cyber-insights">Honeywell Cyber Insights</a>: An OT security/discovery solution</li>
  <li><a href="https://www.fortra.com/offensive-security-tools">Fortra’s CobaltStrike</a> and <a href="https://www.outflank.nl/">Outflank</a>: Security tooling for red teamers</li>
</ul>

<p>This episode is also available on <a href="https://youtu.be/UZN4e-iiVLo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Snake Oilers: Pangea, Cosive and Sysdig</title>
            <pubDate>Thu, 17 Apr 2025 15:15:58 +1000</pubDate>
            <link>https://risky.biz/snakeoilers21pt1/</link>
            <guid isPermaLink="true">https://risky.biz/snakeoilers21pt1/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/snakeoilers21pt1.mp3" length="68779980" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2865</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Snake Oilers three vendors pitch host Patrick Gray on their tech:


  Pangea: Guardrails and security for AI agents and applications (https://pangea.cloud)


Worried about your AI apps going rogue, being mean to your customers or even disclosing sensitive information? Pangea exists to address these risks. Fascinating stuff.


  Cosive: A threat intelligence company that can host your MISP server in AWS. CloudMISP! (https://www.cosive.com/snakeoilers)


Are you running a MISP server on some old hardware under a desk in your SOC? There’s a better way! Cosive can run it for you on AWS so you can just use it instead of wrestling with maintaining it. They also do some CTI consulting to help you get better use out of MISP.


  Sysdig: A Linux runtime security platform (https://sysdig.com/)


The modern Windows network is an all-singing, all-dancing, perfectly orchestrated, EDR-protected ballet. The modern Linux production environment… isn’t. Find out how Sysdig can help you get some visibility and control over your Linux fleet.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Snake Oilers three vendors pitch host Patrick Gray on their tech:</p>

<ul>
  <li>Pangea: Guardrails and security for AI agents and applications (https://pangea.cloud)</li>
</ul>

<p>Worried about your AI apps going rogue, being mean to your customers or even disclosing sensitive information? Pangea exists to address these risks. Fascinating stuff.</p>

<ul>
  <li>Cosive: A threat intelligence company that can host your MISP server in AWS. CloudMISP! (https://www.cosive.com/snakeoilers)</li>
</ul>

<p>Are you running a MISP server on some old hardware under a desk in your SOC? There’s a better way! Cosive can run it for you on AWS so you can just use it instead of wrestling with maintaining it. They also do some CTI consulting to help you get better use out of MISP.</p>

<ul>
  <li>Sysdig: A Linux runtime security platform (https://sysdig.com/)</li>
</ul>

<p>The modern Windows network is an all-singing, all-dancing, perfectly orchestrated, EDR-protected ballet. The modern Linux production environment… isn’t. Find out how Sysdig can help you get some visibility and control over your Linux fleet.</p>

<p>This episode is also available on <a href="https://youtu.be/Q1mdNlVRnBo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #788 -- Trump targets Chris Krebs, SentinelOne</title>
            <pubDate>Wed, 16 Apr 2025 14:34:04 +1000</pubDate>
            <link>https://risky.biz/RB788/</link>
            <guid isPermaLink="true">https://risky.biz/RB788/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB788.mp3" length="77180477" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3215</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray talks to former NSA Cybersecurity Director Rob Joyce about Donald Trump’s unprecedented, unwarranted and completely bonkers political persecution of Chris Krebs and his employer SentinelOne.

They also talk through the week’s cybersecurity news, covering:


  Mitre’s stewardship of the CVE database gets its funding DOGE’d
  The US signs on to the Pall Mall anti-spyware agreement
  China tries to play the nationstate cyber-attribution game, but comedically badly
  Hackers run their malware inside the Windows sandbox, for security against EDR


This week’s episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins to talk through the increasing sprawl of the identity ecosystem.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray talks to former NSA Cybersecurity Director Rob Joyce about Donald Trump’s unprecedented, unwarranted and completely bonkers political persecution of Chris Krebs and his employer SentinelOne.</p>

<p>They also talk through the week’s cybersecurity news, covering:</p>

<ul>
  <li>Mitre’s stewardship of the CVE database gets its funding DOGE’d</li>
  <li>The US signs on to the Pall Mall anti-spyware agreement</li>
  <li>China tries to play the nationstate cyber-attribution game, but comedically badly</li>
  <li>Hackers run their malware inside the Windows sandbox, for security against EDR</li>
</ul>

<p>This week’s episode is sponsored by open source identity provider Authentik. CEO Fletcher Heisler joins to talk through the increasing sprawl of the identity ecosystem.</p>

<p>This episode is also available on <a href="https://youtu.be/uXY_HouhZww">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.reuters.com/world/us/cybersecurity-industry-falls-silent-trump-turns-ire-sentinelone-2025-04-10/">Cybersecurity industry falls silent as Trump turns ire on SentinelOne | Reuters</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/us-cyber-defenders-shaken-trumps-attack-former-boss-rcna200597">U.S. cyber defenders shaken by Trump&#39;s attack on their former boss</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/04/trump-revenge-tour-targets-cyber-leaders-elections/">Trump Revenge Tour Targets Cyber Leaders, Elections – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/wyden-blocks-plankey-nomination-cisa">Wyden to block Trump&#39;s CISA nominee until agency releases report on telecoms’ ‘negligent cybersecurity’ | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.dni.gov/index.php/newsroom/press-releases/press-releases-2025/4063-pr-05-25">Gabbard sets up DOGE-style team to cut costs, uncover intel ‘weaponization’</a></li>
										
                    	<li><a href="https://www.securityweek.com/mitre-signals-potential-cve-program-deterioration-as-us-gov-funding-expires/">MITRE Warns CVE Program Faces Disruption Amid US Funding Uncertainty</a></li>
										
                    	<li><a href="https://therecord.media/us-to-sign-pall-mall-process-code-of-practice-spyware">US to sign Pall Mall pact aimed at countering spyware abuses | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/04/09/court-document-reveals-locations-of-whatsapp-victims-targeted-by-nso-spyware/">Court document reveals locations of WhatsApp victims targeted by NSO spyware | TechCrunch</a></li>
										
                    	<li><a href="https://www.wired.com/story/nso-group-the-vogel-group-lobbying-trump-administration/">Spyware Maker NSO Group Is Paving a Path Back Into Trump’s America | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/ncsc-shares-details-on-spyware-targeting-uyghur-tiben-taiwanese-groups">NCSC shares technical details of spyware targeting Uyghur, Tibetan and Taiwanese groups | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-chinese-apt-abuses-windows-sandbox-to-go-invisible-on-infected-hosts/">Risky Bulletin: Chinese APT abuses Windows Sandbox to go invisible on infected hosts</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/china-escalates-cyber-fight-us-names-alleged-nsa-hackers-rcna201286">China escalates cyber fight with U.S., names alleged NSA hackers</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/04/researcher-uncovers-dozens-of-sketchy-chrome-extensions-with-4-million-installs/">Researcher uncovers dozens of sketchy Chrome extensions with 4 million installs - Ars Technica</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/04/china-based-sms-phishing-triad-pivots-to-banks/">China-based SMS Phishing Triad Pivots to Banks – Krebs on Security</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-ca-b-forum-approves-47-day-tls-certs/">Risky Bulletin: CA/B Forum approves 47-days TLS certs</a></li>
										
                    	<li><a href="https://www.digitaltrustcenter.nl/nieuws/ransomware-in-het-mkb-cybercriminelen-verhogen-losgeld-bij-cyberverzekering">Ransomware in het mkb: Cybercriminelen verhogen losgeld bij cyberverzekering</a></li>
										
                    	<li><a href="https://www.404media.co/4chan-is-down-following-what-looks-to-be-a-major-hack-spurred-by-meme-war/">4chan Is Down Following What Looks to Be a Major Hack Spurred By Meme War</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Wide World of Cyber: How the Trump admin is changing the cybersecurity landscape</title>
            <pubDate>Thu, 10 Apr 2025 15:03:10 +1000</pubDate>
            <link>https://risky.biz/WWC8/</link>
            <guid isPermaLink="true">https://risky.biz/WWC8/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/WWC8a.mp3" length="62648353" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2609</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this podcast, Patrick Gray chats with SentinelOne’s Chris Krebs and Alex Stamos about the huge changes afoot in the United States government and what they mean for the threat environment. From the director of NSA being fired to massive job cuts at CISA and huge foreign policy shifts, tomorrow’s threat environment is going to be very different to today’s. Tune in to hear analysis from two of the best in the business!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this podcast, Patrick Gray chats with SentinelOne’s Chris Krebs and Alex Stamos about the huge changes afoot in the United States government and what they mean for the threat environment. From the director of NSA being fired to massive job cuts at CISA and huge foreign policy shifts, tomorrow’s threat environment is going to be very different to today’s. Tune in to hear analysis from two of the best in the business!</p>

<p>This episode is also available on <a href="https://youtu.be/JPYtQseDoyQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #787 -- Trump fires NSA director, CISA cuts inbound</title>
            <pubDate>Wed, 09 Apr 2025 15:30:07 +1000</pubDate>
            <link>https://risky.biz/RB787/</link>
            <guid isPermaLink="true">https://risky.biz/RB787/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB787.mp3" length="50919135" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3181</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Oracle quietly cops to being hacked, but immediately pivots into pretending it didn’t matter
  NSA and CyberCom leaders fired for not being MAGA enough
  US Treasury had some dusty corners it hadn’t found China in yet, looked, found China in them
  …which is a great time to discuss slashing CISA’s staffing
  Ransomware crews and bullet proof hosting providers are getting rekt, and we love it
  And Microsoft patches yet another logging 0-day being used in the wild.


This episode is sponsored by Yubico, makers of Yubikey hardware authentication tokens. Yubico’s Vice President of Solutions Architecture and Alliances Derek Hanson joins to discuss how the consumer-centric passkey ecosystem has become a real challenge for enterprises. One that Yubico is actually ideally positioned to solve.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Oracle quietly cops to being hacked, but immediately pivots into pretending it didn’t matter</li>
  <li>NSA and CyberCom leaders fired for not being MAGA enough</li>
  <li>US Treasury had some dusty corners it hadn’t found China in yet, looked, found China in them</li>
  <li>…which is a great time to discuss slashing CISA’s staffing</li>
  <li>Ransomware crews and bullet proof hosting providers are getting rekt, and we love it</li>
  <li>And Microsoft patches yet another logging 0-day being used in the wild.</li>
</ul>

<p>This episode is sponsored by Yubico, makers of Yubikey hardware authentication tokens. Yubico’s Vice President of Solutions Architecture and Alliances Derek Hanson joins to discuss how the consumer-centric passkey ecosystem has become a real challenge for enterprises. One that Yubico is actually ideally positioned to solve.</p>

<p>This episode is also available on <a href="https://youtu.be/Pj707gEGrQs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.bleepingcomputer.com/news/security/oracle-privately-confirms-cloud-breach-to-customers/">Oracle privately confirms Cloud breach to customers</a></li>
										
                    	<li><a href="https://bsky.app/profile/doublepulsar.com/post/3lmcfv6s2us2a">Oracle have finally issued a written notification to customers about their cybersecurity incident.</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/trump-fires-nsa-director-head-us-cyber-command/744480/">Head of NSA and US Cyber Command reportedly fired | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/04/03/trump-national-security-council-firings/">Trump fires numerous National Security Council staff - The Washington Post</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/trump-scrutiny-cisa-cuts/744619/">Trump administration under scrutiny as it puts major round of CISA cuts on the table | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.bloomberg.com/news/articles/2025-04-08/hackers-spied-on-100-bank-regulators-emails-for-over-a-year?embedded-checkout=true">Hackers Spied on US Bank Regulators’ Emails for Over a Year - Bloomberg</a></li>
										
                    	<li><a href="https://www.theguardian.com/us-news/2025/apr/06/signal-group-chat-leak-how-it-happened">This is how Jeffrey Goldberg got added to the Signal chat</a></li>
										
                    	<li><a href="https://therecord.media/cybercriminals-australia-hacking-campaign-pension">Cybercriminals are trying to loot Australian pension accounts in new campaign | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.theguardian.com/australia-news/2025/apr/04/australian-super-funds-compromised-cybersecurity-data-breach-hack">$500,000 stolen in Australian super fund data breach | Superannuation | The Guardian</a></li>
										
                    	<li><a href="https://therecord.media/australia-pulls-95-company-licenses-scam-crackdown">Australian regulator pulls licenses of 95 companies in effort to crack down on investment scams | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/everest-ransomware-site-offline-following-defacement">Everest ransomware group’s darknet site offline following defacement | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/PRODAFT/status/1909342469617053720">On March 28, 2025, a threat actor leaked internal data from Medialand, a major bulletproof hosting (BPH) provider long linked to Yalishanda (LARVA-34).</a></li>
										
                    	<li><a href="https://bsky.app/profile/campuscodi.risky.biz/post/3lm42jfxi5c2k">There&#39;s a ransomware group named DragonForce going around hacking its rivals. After Mamona and BlackLock, the group has now hacked RansomHub</a></li>
										
                    	<li><a href="https://bsky.app/profile/campuscodi.risky.biz/post/3lleoxqyvz22l">The DragonForce ransomware group hacked two rivals this month</a></li>
										
                    	<li><a href="https://therecord.media/crushftp-vulnerability-exploited">CISA, experts warn of Crush file transfer attacks as ransomware gang makes threats | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/ido_cohen2/status/1909268775653753166">Kill Security Campaign Targets CrushFTP Servers</a></li>
										
                    	<li><a href="https://www.nist.gov/itl/nvd">National Vulnerability Database | NIST</a></li>
										
                    	<li><a href="https://cyberscoop.com/microsoft-patch-tuesday-april-2025/">Microsoft patches zero-day actively exploited in string of ransomware attacks | CyberScoop</a></li>
										
                    	<li><a href="https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/">Exploitation of CLFS zero-day leads to ransomware activity | Microsoft Security Blog</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/is-the-sofistication-in-the-room-with-us-x-forwarded-for-and-ivanti-connect-secure-cve-2025-22457/">Is The Sofistication In The Room With Us? - X-Forwarded-For and Ivanti Connect Secure (CVE-2025-22457)</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #786 -- Oracle is lying</title>
            <pubDate>Wed, 02 Apr 2025 14:40:25 +1100</pubDate>
            <link>https://risky.biz/RB786/</link>
            <guid isPermaLink="true">https://risky.biz/RB786/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB786.mp3" length="53045753" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3314</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Yes, Oracle Health and Oracle Cloud did get hacked
  The fallout from Signalgate continues
  North Korean IT workers pivot to Europe
  Honeypot data suggests a storm is brewing for Palo Alto VPNs
  Canadian Anon gets arrested for hacking Texas GOP


This week’s episode is sponsored by Trail of Bits. Tjaden Hess, a Principal Security Engineer at Trail of Bits who specialises in cryptography, joins the show this week to talk about what a responsible crypto-currency exchange cold wallet setup looks like, and … contrasts that with Bybit.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Yes, Oracle Health and Oracle Cloud did get hacked</li>
  <li>The fallout from Signalgate continues</li>
  <li>North Korean IT workers pivot to Europe</li>
  <li>Honeypot data suggests a storm is brewing for Palo Alto VPNs</li>
  <li>Canadian Anon gets arrested for hacking Texas GOP</li>
</ul>

<p>This week’s episode is sponsored by Trail of Bits. Tjaden Hess, a Principal Security Engineer at Trail of Bits who specialises in cryptography, joins the show this week to talk about what a responsible crypto-currency exchange cold wallet setup looks like, and … contrasts that with Bybit.</p>

<p>This episode is also available on <a href="https://youtu.be/DNAOwukOQi4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/">Oracle Health breach compromises patient data at US hospitals</a></li>
										
                    	<li><a href="https://www.beckershospitalreview.com/cybersecurity/fbi-probes-oracle-hack-tied-to-healthcare-extortion-report/">FBI probes Oracle hack tied to healthcare extortion: Report - Becker&#39;s Hospital Review | Healthcare News &amp; Analysis</a></li>
										
                    	<li><a href="https://www.darkreading.com/cyberattacks-data-breaches/oracle-still-denies-breach-researchers-persist">Oracle Still Denies Breach as Researchers Persist</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/hacker-linked-to-oracle-cloud-intrusion-threatens-to-sell-stolen-data/743981/">Hacker linked to Oracle Cloud intrusion threatens to sell stolen data | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://x.com/OcrazioCornPop/status/1905233167272779893">Publius on X: &quot;🚨 SIGNAL SCANDAL: Katherine Maher, the leftist NPR CEO, is currently the Chair of the Board of Signal! WHAT ARE THE ODDS? https://t.co/jWNTeAt3Jz&quot; / X</a></li>
										
                    	<li><a href="https://www.wsj.com/politics/policy/mike-waltz-is-losing-support-inside-the-white-house-2b17459c">Mike Waltz Is Losing Support Inside the White House - WSJ</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/04/01/waltz-national-security-council-signal-gmail/">Waltz and staff used Gmail for government communications, officials say - The Washington Post</a></li>
										
                    	<li><a href="https://www.spiegel.de/international/world/pete-hegseth-mike-waltz-tulsi-gabbard-private-data-and-passwords-of-senior-u-s-security-officials-found-online-a-14221f90-e5c2-48e5-bc63-10b705521fb7?">Pete Hegseth, Mike Waltz, Tulsi Gabbard: Private Data and Passwords of Senior U.S. Security Officials Found Online - DER SPIEGEL</a></li>
										
                    	<li><a href="https://www.wired.com/story/even-more-venmo-accounts-tied-to-trump-officials-in-signal-group-chat-left-data-public/">Even More Venmo Accounts Tied to Trump Officials in Signal Group Chat Left Data Public | WIRED</a></li>
										
                    	<li><a href="https://www.404media.co/you-need-to-use-signals-nickname-feature/">You Need to Use Signal&#39;s Nickname Feature</a></li>
										
                    	<li><a href="https://www.wired.com/story/signalgate-is-driving-the-most-us-downloads-of-signal-ever/">SignalGate Is Driving the Most US Downloads of Signal Ever | WIRED</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/Wickr">Wickr - Wikipedia</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/03/when-getting-phished-puts-you-in-mortal-danger/">When Getting Phished Puts You in Mortal Danger – Krebs on Security</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/dprk-it-workers-expanding-scope-scale/">DPRK IT Workers Expanding in Scope and Scale | Google Cloud Blog</a></li>
										
                    	<li><a href="https://www.404media.co/how-the-fbi-tracked-and-froze-millions-sent-to-criminals-in-massive-caesars-casino-hack/">How the FBI Tracked, and Froze, Millions Sent to Criminals in Massive Caesars Casino Hack</a></li>
										
                    	<li><a href="https://therecord.media/defense-contractor-to-pay-millions-over-cyber-practices">Defense contractor to pay $4.6 million over third-party provider’s security weakness | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.greynoise.io/blog/surge-palo-alto-networks-scanner-activity">Surge in Palo Alto Networks Scanner Activity Indicates Possible Upcoming Threats</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-warns-malware-targeting-ivanti-zero-day/743967/">CISA warns new malware targeting Ivanti zero-day vulnerability | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/canadian-hacker-arrested-texas-gop">Canadian hacker arrested for allegedly stealing data from Texas Republican Party | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/british-intern-gchq-charged-smuggling">British intel intern pleads guilty to smuggling top secret data out of protected facility | The Record from Recorded Future News</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Soap Box: Knocknoc glues your SSO to your firewalls for Just-in-Time network access</title>
            <pubDate>Thu, 27 Mar 2025 10:48:45 +1100</pubDate>
            <link>https://risky.biz/soapbox94/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox94/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox94.mp3" length="44336996" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1846</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Soap Box edition of Risky Business host Patrick Gray talks to Knocknoc CEO Adam Pointon about how to easily rein in attack surface by glueing your single sign-on service to your network controls.

Do your Palo Alto and Fortinet devices really need to be discoverable by ransomware crews? Does your file transfer appliance need to be open to the whole world? What about your SSH and RDP? Your Citrix? Your (gasp) Exchange Online servers??

You can do a lot with IP allowlisting and simple Identity Aware Proxies (IAPs) to minimise your exposure.

Knocknoc is a bit of a “Risky Business special”, too. Pat helped Knocknoc to raise a seed round through Decibel Partners where he’s a founder advisor. He also serves on Knocknoc’s board of directors.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Soap Box edition of Risky Business host Patrick Gray talks to Knocknoc CEO Adam Pointon about how to easily rein in attack surface by glueing your single sign-on service to your network controls.</p>

<p>Do your Palo Alto and Fortinet devices really need to be discoverable by ransomware crews? Does your file transfer appliance need to be open to the whole world? What about your SSH and RDP? Your Citrix? Your (gasp) Exchange Online servers??</p>

<p>You can do a lot with IP allowlisting and simple Identity Aware Proxies (IAPs) to minimise your exposure.</p>

<p>Knocknoc is a bit of a “Risky Business special”, too. Pat helped Knocknoc to raise a seed round through Decibel Partners where he’s a founder advisor. He also serves on Knocknoc’s board of directors.</p>

<p>This episode is also available on <a href="https://youtu.be/kPd85kW09oE">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #785 -- Signal-gate is actually as bad as it looks</title>
            <pubDate>Wed, 26 Mar 2025 14:41:49 +1100</pubDate>
            <link>https://risky.biz/RB785/</link>
            <guid isPermaLink="true">https://risky.biz/RB785/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB785.mp3" length="56742111" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3545</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Yes, the Trump admin really did just add a journo to their Yemen-attack-planning Signal group
  The Github actions hack is smaller than we thought, but was targeting crypto
  Remote code exec in Kubernetes, ouch
  Oracle denies its cloud got owned, but that sure does look like customer keymat
  Taiwanese hardware maker Clevo packs its private keys into bios update zip
  US Treasury un-sanctions Tornado Cash, party time in Pyongyang?


This week’s episode is sponsored by runZero. Long time hackerman HD Moore joins to talk about how network vulnerability scanning has atrophied, and what he’s doing to bring it back en vogue. Do you miss early 2000s Nessus? HD knows it, he’s got you fam.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Yes, the Trump admin really did just add a journo to their Yemen-attack-planning Signal group</li>
  <li>The Github actions hack is smaller than we thought, but was targeting crypto</li>
  <li>Remote code exec in Kubernetes, ouch</li>
  <li>Oracle denies its cloud got owned, but that sure does look like customer keymat</li>
  <li>Taiwanese hardware maker Clevo packs its private keys into bios update zip</li>
  <li>US Treasury un-sanctions Tornado Cash, party time in Pyongyang?</li>
</ul>

<p>This week’s episode is sponsored by runZero. Long time hackerman HD Moore joins to talk about how network vulnerability scanning has atrophied, and what he’s doing to bring it back en vogue. Do you miss early 2000s Nessus? HD knows it, he’s got you fam.</p>

<p>This episode is also available on <a href="https://youtu.be/mzgqooN6PmM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/">The Trump Administration Accidentally Texted Me Its War Plans - The Atlantic</a></li>
										
                    	<li><a href="https://www.wired.com/story/white-house-starlink-wifi/">Using Starlink Wi-Fi in the White House Is a Slippery Slope for US Federal IT | WIRED</a></li>
										
                    	<li><a href="https://thehackernews.com/2025/03/github-supply-chain-breach-coinbase.html">Coinbase Initially Targeted in GitHub Actions Supply Chain Attack; 218 Repositories&#39; CI/CD Secrets Exposed</a></li>
										
                    	<li><a href="https://unit42.paloaltonetworks.com/github-actions-supply-chain-attack/">GitHub Actions Supply Chain Attack: A Targeted Attack on Coinbase Expanded to the Widespread tj-actions/changed-files Incident: Threat Assessment (Updated 3/21)</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-vulnerabilities-kubernetes-jeopardy/743448/">Critical vulnerabilities put Kubernetes environments in jeopardy | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/researchers-oracle-cloud-breach/743447/">Researchers back claim of Oracle Cloud breach despite company’s denials | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cloudsek.com/blog/the-biggest-supply-chain-hack-of-2025-6m-records-for-sale-exfiltrated-from-oracle-cloud-affecting-over-140k-tenants">The Biggest Supply Chain Hack Of 2025: 6M Records Exfiltrated from Oracle Cloud affecting over 140k Tenants | CloudSEK</a></li>
										
                    	<li><a href="https://cyberscoop.com/capital-one-hacker-paige-thompson-sentence-appeals-court/">Capital One hacker Paige Thompson got too light a sentence, appeals court rules | CyberScoop</a></li>
										
                    	<li><a href="https://www.reuters.com/business/finance/us-scraps-sanctions-tornado-cash-crypto-mixer-accused-laundering-north-korea-2025-03-21/">US scraps sanctions on Tornado Cash, crypto ‘mixer’ accused of laundering North Korea money | Reuters</a></li>
										
                    	<li><a href="https://home.treasury.gov/news/press-releases/sb0057">Tornado Cash Delisting | U.S. Department of the Treasury</a></li>
										
                    	<li><a href="https://therecord.media/russia-websites-dark-reported-cloudflare-block">Major web services go dark in Russia amid reported Cloudflare block | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.binarly.io/blog/clevo-boot-guard-keys-leaked-in-update-package">Clevo Boot Guard Keys Leaked in Update Package</a></li>
										
                    	<li><a href="https://cyberscoop.com/six-countries-suspected-paragon-spyware-customers/">Six additional countries identified as suspected Paragon spyware customers | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/ron-deibert-citizen-lab-spyware-interview">The Citizen Lab’s director dissects spyware and the ‘proliferating’ market for it | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/malaysia-pm-says-country-rejected-ransom-demand-airport-cyberattack">Malaysia PM says country rejected $10 million ransom demand after airport outages | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/hacker-nyu-website-admissions-race">Hacker defaces NYU website, exposing admissions data on 1 million students | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.abc.net.au/news/2025-03-20/notre-dame-uni-students-says-cyber-attack-playing-havoc/105075278">Notre Dame uni students say outage creating enrolment, graduation, assignment mayhem - ABC News</a></li>
										
                    	<li><a href="https://www.404media.co/dna-of-15-million-people-for-sale-in-23andme-bankruptcy/">DNA of 15 Million People for Sale in 23andMe Bankruptcy</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #784 -- GitHub supply chain attack steals secrets from 23k projects</title>
            <pubDate>Wed, 19 Mar 2025 14:58:07 +1100</pubDate>
            <link>https://risky.biz/RB784/</link>
            <guid isPermaLink="true">https://risky.biz/RB784/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB784.mp3" length="54719265" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3418</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  Github Actions supply chain attack loots keys and secrets from 23k projects
  Why a VC fund now owns a minority stake in Risky Business Media (!?!?)
  China doxes Taiwanese military hackers
  Microsoft thinks .lnk file whitespace trick isn’t worth patching but APTs sure love it
  CISA delivers government efficiency by re-hiring fired staff… to put them on paid leave
  …and Google acquires Wiz for $32bn


This week’s show is sponsored by Zero Networks, and they have sent along a happy customer to talk about their experience. Aaron Steinke is Head of Infrastructure at La Trobe Financial, an asset management firm in Australia. Aaron talks through bringing modern zero-trust goodness to the reality of a technology environment that’s been around 40 years.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>Github Actions supply chain attack loots keys and secrets from 23k projects</li>
  <li>Why a VC fund now owns a minority stake in Risky Business Media (!?!?)</li>
  <li>China doxes Taiwanese military hackers</li>
  <li>Microsoft thinks .lnk file whitespace trick isn’t worth patching but APTs sure love it</li>
  <li>CISA delivers government efficiency by re-hiring fired staff… to put them on paid leave</li>
  <li>…and Google acquires Wiz for $32bn</li>
</ul>

<p>This week’s show is sponsored by Zero Networks, and they have sent along a happy customer to talk about their experience. Aaron Steinke is Head of Infrastructure at La Trobe Financial, an asset management firm in Australia. Aaron talks through bringing modern zero-trust goodness to the reality of a technology environment that’s been around 40 years.</p>

<p>This episode is also available on <a href="https://youtu.be/19AMGS4cG8w">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-github-supply-chain-attack-prints-everyones-secrets-in-build-logs/">Risky Bulletin: GitHub supply chain attack prints everyone&#39;s secrets in build logs - Risky Business Media</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-china-says-taiwans-military-is-behind-poisonivy-apt/">China says Taiwan&#39;s military is behind PoisonIvy APT</a></li>
										
                    	<li><a href="https://therecord.media/china-taiwan-hacks-identify-cyber">China identifies Taiwanese hackers allegedly behind cyberattacks and espionage | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/crypto-okx-shuts-down-exchange">Crypto exchange OKX shuts down tool used by North Korean hackers to launder stolen funds | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/lazarus-group-north-korea-malicious-npm-packages-socket/">Lazarus Group deceives developers with 6 new malicious npm packages | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/windows-lnk-files-nation-state-hacking-campaigns">Poisoned Windows shortcuts found to be a favorite of Chinese, Russian, N. Korean state hackers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/mora001-ransomware-gang-exploiting-vulnerability-lockbit">&#39;Mora_001&#39; ransomware gang exploiting Fortinet bug spotlighted by CISA in January | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/black-basta-uses-brute-forcing-tool-to-attack-edge-devices/742672/">Black Basta uses brute-forcing tool to attack edge devices | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/lockbit-alleged-russian-developer-extradited-us-israel">Alleged Russian LockBit developer extradited from Israel, appears in New Jersey court | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nextgov.com/people/2025/03/cisa-works-contact-probationary-employees-reinstatement-after-court-order/403810/">CISA works to contact probationary employees for reinstatement after court order - Nextgov/FCW</a></li>
										
                    	<li><a href="https://www.wired.com/story/inside-cisa-under-trump/">‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge | WIRED</a></li>
										
                    	<li><a href="https://www.forbes.com/sites/thomasbrewster/2025/03/18/cisa-staff-are-cautiously-optimistic-about-trumps-pick-for-director/">The Wiretap: CISA Staff Are Cautiously Optimistic About Trump’s Pick For Director</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/white-house-instructs-agencies-avoid-firing-cybersecurity-staff-email-says-2025-03-13/">White House instructs agencies to avoid firing cybersecurity staff, email says | Reuters</a></li>
										
                    	<li><a href="https://therecord.media/signal-no-longer-cooperating-with-ukraine">Signal no longer cooperating with Ukraine on Russian cyberthreats, official says | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/tech-news/telegram-ceo-pavel-durov-allowed-leave-france-investigation-rcna196713">Telegram CEO Pavel Durov allowed to leave France amid investigation</a></li>
										
                    	<li><a href="https://therecord.media/joe-sullivan-former-uber-executive-conviction-upheld">Appellate court upholds sentence for former Uber cyber executive Joe Sullivan | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/google-buys-cloud-security-provider-wiz">Google buys cloud security provider Wiz for $32 billion | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.decibel.vc/articles/pat-gray-founder-of-risky-business-joins-decibel-as-founder-advisor">Pat Gray, Founder of Risky Business, Joins Decibel as Founder Advisor - Decibel</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #783 -- Evil webcam ransomwares entire Windows network</title>
            <pubDate>Wed, 12 Mar 2025 15:30:32 +1100</pubDate>
            <link>https://risky.biz/RB783/</link>
            <guid isPermaLink="true">https://risky.biz/RB783/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB783.mp3" length="61139613" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3820</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news with special guest Rob Joyce, a Former Special Assistant to the US President and Director of Cybersecurity for NSA.

They talk through:


  A realistic bluetooth-proximity phishing attack against Passkeys
  A very patient ransomware actor encrypts an entire enterprise with a puny linux webcam processor
  The ESP32 backdoor that is neither a door nor at the back
  The X DDoS that Elon said was Ukraine is claimed by pro-Palestinian hacktivists
  Years later, LastPass hackers are still emptying crypto-wallets
  …and it turns out North Korea nailed {Safe}Wallet with a malicious docker image. Nice!


Rob Joyce recently testified to the US House Select Committee on the Chinese Communist Party, and he explains why DOGE kicking probationary employees to the curb is “devastating” for the national security staff pipeline.

This week’s episode is sponsored by SpecterOps, makers of the BloodHound identity attack path mapping tool. Chief Product Officer Justin Kohler and Principal Security Researcher Lee Chagolla-Christensen discuss their pragmatic approach to disabling NTLM authentication in Active Directory using BloodHound’s insight.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news with special guest Rob Joyce, a Former Special Assistant to the US President and Director of Cybersecurity for NSA.</p>

<p>They talk through:</p>

<ul>
  <li>A realistic bluetooth-proximity phishing attack against Passkeys</li>
  <li>A very patient ransomware actor encrypts an entire enterprise with a puny linux webcam processor</li>
  <li>The ESP32 backdoor that is neither a door nor at the back</li>
  <li>The X DDoS that Elon said was Ukraine is claimed by pro-Palestinian hacktivists</li>
  <li>Years later, LastPass hackers are still emptying crypto-wallets</li>
  <li>…and it turns out North Korea nailed {Safe}Wallet with a malicious docker image. Nice!</li>
</ul>

<p>Rob Joyce recently testified to the US House Select Committee on the Chinese Communist Party, and he explains why DOGE kicking probationary employees to the curb is “devastating” for the national security staff pipeline.</p>

<p>This week’s episode is sponsored by SpecterOps, makers of the BloodHound identity attack path mapping tool. Chief Product Officer Justin Kohler and Principal Security Researcher Lee Chagolla-Christensen discuss their pragmatic approach to disabling NTLM authentication in Active Directory using BloodHound’s insight.</p>

<p>This episode is also available on <a href="https://youtu.be/28s8uURA6xM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://mastersplinter.work/research/passkey/">CVE-2024-9956 - PassKey Account Takeover in All Mobile Browsers | Tobia Righi - Security Researcher</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/">Feds Link $150M Cyberheist to 2022 LastPass Hacks – Krebs on Security</a></li>
										
                    	<li><a href="https://www.s-rminform.com/latest-thinking/camera-off-akira-deploys-ransomware-via-webcam">Camera off: Akira deploys ransomware via webcam</a></li>
										
                    	<li><a href="https://www.tarlogic.com/news/hidden-feature-esp32-chip-infect-ot-devices/">Tarlogic detects a hidden feature in the mass-market ESP32 chip that could infect millions of IoT devices</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/03/alleged-co-founder-of-garantex-arrested-in-india/">Alleged Co-Founder of Garantex Arrested in India – Krebs on Security</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/37k-vmware-esxi-instances-vulnerable-to-critical-zero-day/741749/">37K+ VMware ESXi instances vulnerable to critical zero-day | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/03/apple-patches-0-day-exploited-in-extremely-sophisticated-attack/">Apple patches 0-day exploited in “extremely sophisticated attack” - Ars Technica</a></li>
										
                    	<li><a href="https://www.wired.com/story/x-ddos-attack-march-2025/">What Really Happened With the DDoS Attacks That Took Down X | WIRED</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/eleven11bot-revised-downward-mirai/741923/">Eleven11bot estimates revised downward as researchers point to Mirai variant | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/ballista-botnet-tp-link-archer-routers">Previously unidentified botnet infects unpatched TP-Link Archer home routers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://x.com/safe/status/1897663514975649938">Safe.eth on X: &quot;Investigation Updates and Community Call to Action&quot; / X</a></li>
										
                    	<li><a href="https://help.safe.global/en/articles/276344-how-to-verify-safe-wallet-transactions-on-a-hardware-wallet">How to verify Safe{Wallet} transactions on a hardware wallet | Safe{Wallet} Help Center and Support.</a></li>
										
                    	<li><a href="https://therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury">US charges Chinese nationals in cyberattacks on Treasury, dissidents and more | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/joyce-china-probationary-firings-devastating-congress/">Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security | CyberScoop</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/03/05/us-ukraine-intelligence-sharing/">U.S. pauses intelligence sharing with Ukraine used to target Russian forces - The Washington Post</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #782 -- Are the USA and Russia cyber friends now?</title>
            <pubDate>Wed, 05 Mar 2025 14:25:31 +1100</pubDate>
            <link>https://risky.biz/RB782/</link>
            <guid isPermaLink="true">https://risky.biz/RB782/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB782.mp3" length="48209789" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3012</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:

  Did the US decide to stop caring about Russian cyber, or not?
  Adam stans hard for North Korea’s massive ByBit crypto-theft
  Cellebrite firing Serbia is an example of the system working
  Starlink keeps scam compounds in Myanmar running
  Biggest DDoS botnet yet pushes over 6Tbps


This week’s episode is sponsored by network visibility company Corelight. Vincent Stoffer, field CTO at Corelight joins to talk through where eyes on your network can spot attackers like Salt and Volt Typhoon.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>
<ul>
  <li>Did the US decide to stop caring about Russian cyber, or not?</li>
  <li>Adam stans hard for North Korea’s massive ByBit crypto-theft</li>
  <li>Cellebrite firing Serbia is an example of the system working</li>
  <li>Starlink keeps scam compounds in Myanmar running</li>
  <li>Biggest DDoS botnet yet pushes over 6Tbps</li>
</ul>

<p>This week’s episode is sponsored by network visibility company Corelight. Vincent Stoffer, field CTO at Corelight joins to talk through where eyes on your network can spot attackers like Salt and Volt Typhoon.</p>

<p>This episode is also available on <a href="https://youtu.be/nIw9BYzv3X4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://docsend.com/view/rmdi832mpt8u93s7/d/rwecw3rumhqtgs6a">Sygnia Preliminary Bybit Investigation Report</a></li>
										
                    	<li><a href="https://docsend.com/view/rmdi832mpt8u93s7/d/xc2rkprqm799pymq">Verichains Bybit Incident Investigation Preliminary Report</a></li>
										
                    	<li><a href="https://therecord.media/north-koreans-initial-laundering-bybit-hack">North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-trump-administration-stops-treating-russian-hackers-as-a-threat/">Risky Bulletin: Trump administration stops treating Russian hackers as a threat - Risky Business</a></li>
										
                    	<li><a href="https://www.zetter-zeroday.com/did-trump-admin-order-u-s-cyber-command-and-cisa-to-stand-down-on-russia/">Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Story updated)</a></li>
										
                    	<li><a href="https://therecord.media/finland-intelligence-report-russia-redeploy-resources-after-ukraine-war">Russia to redeploy resources freed up by end of war in Ukraine, warns Finnish intelligence | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/fbi-bybit-laundering-crypto-warning">FBI urges crypto community to avoid laundering funds from Bybit hack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-cellebrite-bans-bad-boy-serbia/">Risky Bulletin: Cellebrite bans bad boy Serbia - Risky Business</a></li>
										
                    	<li><a href="https://therecord.media/belgium-investigation-alleged-china-cyber-espionage-vsse">Belgium probes suspected Chinese hack of state security service | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/odni-gabbard-uk-apple-backdoor-request-grave-concern">Gabbard: UK demand to Apple for backdoor access is &#39;grave concern&#39; to US | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/starlink-scam-compounds/">Elon Musk’s Starlink Is Keeping Modern Slavery Compounds Online | WIRED</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/02/u-s-soldier-charged-in-att-hack-searched-can-hacking-be-treason/">U.S. Soldier Charged in AT&amp;T Hack Searched “Can Hacking Be Treason” – Krebs on Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/02/google-password-manager-finally-syncs-to-ios-heres-how/">Google Password Manager finally syncs to iOS—here’s how - Ars Technica</a></li>
										
                    	<li><a href="https://www.forbes.com/sites/daveywinder/2025/02/26/google-confirms-gmail-to-ditch-sms-code-authentication/">Gmail Security Alert: Google To Ditch SMS Codes For Billions Of Users</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/massive-iran-botnet-ddos-telecom/741359/">Massive Iran-linked botnet launches DDoS attacks against telecom, gaming platforms | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-signed-driver-used-in-ransomware-attacks/741372/">Microsoft-signed driver used in ransomware attacks | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/london-com-member-convicted">London member of ‘Com’ network convicted of making indecent images of children | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://corelight.com/blog/volt-typhoon-salt-typhoon-edr">Volt Typhoon &amp; Salt Typhoon Attackers Are Evading EDR: What Can You Do? | Corelight</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #781 -- How Bybit oopsied $1.4bn</title>
            <pubDate>Wed, 26 Feb 2025 15:20:33 +1100</pubDate>
            <link>https://risky.biz/RB781/</link>
            <guid isPermaLink="true">https://risky.biz/RB781/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB781.mp3" length="60187488" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3760</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:


  North Korea pulls off a 1.5 billion dollar crypto heist
  Apple pulls Advanced Data Protection from the UK
  Black Basta ransomware gang’s internal chats leak
  Russians snoop on Signal with QR codes
  And Myanmar ships thousands of freed scam compound workers to Thailand


Regular guest Lina Lau joins to discuss her work reading Chinese incident response reports on WeChat, and how that has people thinking that … she outed the NSA?

This week’s episode is sponsored by Airlock Digital, and allow-listing tragics Daniel Schell and David Cottingham are along with an amusing tale of using Windows’ own allow-listing software to block EDR from loading.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news:</p>

<ul>
  <li>North Korea pulls off a 1.5 billion dollar crypto heist</li>
  <li>Apple pulls Advanced Data Protection from the UK</li>
  <li>Black Basta ransomware gang’s internal chats leak</li>
  <li>Russians snoop on Signal with QR codes</li>
  <li>And Myanmar ships thousands of freed scam compound workers to Thailand</li>
</ul>

<p>Regular guest Lina Lau joins to discuss her work reading Chinese incident response reports on WeChat, and how that has people thinking that … she outed the NSA?</p>

<p>This week’s episode is sponsored by Airlock Digital, and allow-listing tragics Daniel Schell and David Cottingham are along with an amusing tale of using Windows’ own allow-listing software to block EDR from loading.</p>

<p>This episode is also available on <a href="https://youtu.be/dvSTj31CPcI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/hackers-drained-bybit-crypto-exchange-hack">Hackers drained $1.4 billion of cryptocurrency from Bybit exchange, CEO confirms | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.certik.com/resources/blog/3wI26AFKF1UtSDjJEXNEDM-bybit-incident-technical-analysis">CertiK - Bybit Incident Technical Analysis</a></li>
										
                    	<li><a href="https://therecord.media/hackers-use-macos-malware-to-steal-crypto">Hackers use ‘sophisticated’ macOS malware to steal cryptocurrency, Microsoft says | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/eu-sanctions-north-korea-ukraine-war-lazarus-group">EU sanctions North Korean tied to Lazarus group over involvement in Ukraine war | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.chainalysis.com/blog/crypto-crime-sanctions-2025/">Sanctions: Iranians Flock to Crypto; Int&#39;l Actions Target Russia - Chainalysis</a></li>
										
                    	<li><a href="https://therecord.media/apple-encryption-feature-off-britain">Apple turns off iCloud encryption feature in UK following reported government legal order | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/sweden-seeks-backdoor-access-to-messaging-apps">Swedish authorities seek backdoor to encrypted messaging apps | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/02/leaked-chat-logs-expose-inner-workings-of-secretive-ransomware-group/">Leaked chat logs expose inner workings of secretive ransomware group - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/russian-state-hackers-spy-on-ukraine-military-signal">Russian state hackers spy on Ukrainian military through Signal app | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.404media.co/meta-lawsuit-unlocked-4-life-idriss-qibaa-instagram-extortion/">Meta Sues Alleged Violent Extortionist For Holding Instagram Accounts Hostage</a></li>
										
                    	<li><a href="https://blog.talosintelligence.com/salt-typhoon-analysis/">Weathering the storm: In the midst of a Typhoon</a></li>
										
                    	<li><a href="https://therecord.media/thailand-to-take-in-7000-rescued-from-scam-hubs-myanmar">Thailand to take in 7,000 rescued from illegal cyber scam hubs in Myanmar | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.news.com.au/technology/online/hacking/genea-confirms-cyber-breach-after-unauthorised-third-party-accesses-data/news-story/dc3bc4a86d2be3e4895bc75582e41dea">Genea confirms cyber breach after ‘unauthorised third party’ accesses data | news.com.au — Australia’s leading news site</a></li>
										
                    	<li><a href="https://therecord.media/managed-health-tricare-false-claims">Managed healthcare defense contractor to pay $11 million over alleged cyber failings | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/botnet-credentials-microsoft-spraying-attack">Botnet looks for quiet ways to try stolen logins in Microsoft 365 environments | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.asio.gov.au/director-generals-annual-threat-assessment-2025">Director-General&#39;s Annual Threat Assessment 2025 | ASIO</a></li>
										
                    	<li><a href="https://www.inversecos.com/2025/02/an-inside-look-at-nsa-equation-group.html">An inside look at NSA (Equation Group) TTPs from China’s lense</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Wide World of Cyber: DeepSeek lobs an AI hand grenade</title>
            <pubDate>Fri, 21 Feb 2025 13:31:15 +1100</pubDate>
            <link>https://risky.biz/WWC7/</link>
            <guid isPermaLink="true">https://risky.biz/WWC7/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/WWC7.mp3" length="39431996" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2462</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this episode of the Wide World of Cyber podcast Risky Business host Patrick Gray chats with SentinelOne’s Chris Krebs and Alex Stamos about AI, DeepSeek, and regulation.

From its bad transport security to its Chinese ownership and the economic implications of China “entering the chat”, everyone’s freaking out over this new model. But should they be?

Pat, Alex and Chris dissect the model’s significance, the politics of it all and how AI regulation in Europe, the US and China will shape the future of LLMs.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this episode of the Wide World of Cyber podcast Risky Business host Patrick Gray chats with SentinelOne’s Chris Krebs and Alex Stamos about AI, DeepSeek, and regulation.</p>

<p>From its bad transport security to its Chinese ownership and the economic implications of China “entering the chat”, everyone’s freaking out over this new model. But should they be?</p>

<p>Pat, Alex and Chris dissect the model’s significance, the politics of it all and how AI regulation in Europe, the US and China will shape the future of LLMs.</p>

<p>This episode is also available on <a href="https://youtu.be/aniESrEgofI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #780 -- ASD torched Zservers data while admins were drunk</title>
            <pubDate>Wed, 19 Feb 2025 14:39:53 +1100</pubDate>
            <link>https://risky.biz/RB780/</link>
            <guid isPermaLink="true">https://risky.biz/RB780/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB780.mp3" length="58192307" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3635</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Australian spooks scrubbed Medibank data off Zservers bulletproof hosting
  Why device code phishing is the latest trick in confusing poor users about cloud authentication
  Cloudflare gets blocked in Spain, but only on weekends and because of… football?
  Palo Alto has yet another dumb bug
  Adam gushes about Qualys’ latest OpenSSH vulns


Enterprise browser maker Island is this week’s sponsor and Chief Customer Officer Bradon Rogers joins the show to talk about how the adoption of AI everywhere is causing headaches.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Australian spooks scrubbed Medibank data off Zservers bulletproof hosting</li>
  <li>Why device code phishing is the latest trick in confusing poor users about cloud authentication</li>
  <li>Cloudflare gets blocked in Spain, but only on weekends and because of… football?</li>
  <li>Palo Alto has yet another dumb bug</li>
  <li>Adam gushes about Qualys’ latest OpenSSH vulns</li>
</ul>

<p>Enterprise browser maker Island is this week’s sponsor and Chief Customer Officer Bradon Rogers joins the show to talk about how the adoption of AI everywhere is causing headaches.</p>

<p>This episode is also available on <a href="https://youtu.be/QB-ZXhdUJJE">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.smh.com.au/politics/federal/five-russians-went-out-drinking-when-they-got-back-australia-had-struck-20250212-p5lbfn.html">Five Russians went out drinking. When they got back, Australia had struck</a></li>
										
                    	<li><a href="https://therecord.media/dutch-police-take-down-127-servers-sanctioned-host">Dutch police say they took down 127 servers used by sanctioned hosting service | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.minister.defence.gov.au/media-releases/2025-02-12/further-cyber-sanctions-response-medibank-private-cyberattack#:~:text=The%20sanctions%20announced%20today%20make,the%20individuals%20from%20entering%20Australia.">Further cyber sanctions in response to Medibank Private cyberattack | Defence Ministers</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2025/02/russian-spies-use-device-code-phishing-to-hijack-microsoft-accounts/">What is device code phishing, and why are Russian spies so successful at it? - Ars Technica</a></li>
										
                    	<li><a href="https://www.404media.co/anyone-can-push-updates-to-the-doge-gov-website-2/">Anyone Can Push Updates to the DOGE.gov Website</a></li>
										
                    	<li><a href="https://torrentfreak.com/spain-piracy-crisis-cloudflare-says-laliga-knew-danger-blocked-ip-address-anyway-250211/">Piracy Crisis: Cloudflare Says LaLiga Knew Dangers, Blocked IP Address Anyway (Update) * TorrentFreak</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-firewall-exploitation/740193/">Palo Alto Networks warns firewall vulnerability is under active exploitation | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466">Qualys TRU Discovers Two Vulnerabilities in OpenSSH: CVE-2025-26465 &amp; CVE-2025-26466 | Qualys Security Blog</a></li>
										
                    	<li><a href="https://therecord.media/china-salt-typhoon-cisco-devices">China’s Salt Typhoon hackers targeting Cisco devices used by telcos, universities | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.recordedfuture.com/research/redmike-salt-typhoon-exploits-vulnerable-devices">RedMike Exploits Unpatched Cisco Devices in Global Telecommunications Campaign</a></li>
										
                    	<li><a href="https://www.wired.com/story/russia-sandworm-badpilot-cyberattacks-western-countries/">A Hacker Group Within Russia’s Notorious Sandworm Unit Is Breaching Western Networks | WIRED</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/02/how-phished-data-turns-into-apple-google-wallets/">How Phished Data Turns into Apple &amp; Google Wallets – Krebs on Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/02/new-hack-uses-prompt-injection-to-corrupt-geminis-long-term-memory/">New hack uses prompt injection to corrupt Gemini’s long-term memory</a></li>
										
                    	<li><a href="https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm">Arizona woman pleads guilty to running laptop farm for N. Korean IT workers, faces 9-year sentence | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/alexander-vinnik-reported-released-prisoner-swap-russia-us">US reportedly releases Russian cybercrime figure Alexander Vinnik in prisoner swap | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://hopenothate.org.uk/2025/02/10/exclusive-a-russia-linked-telegram-network-is-inciting-terrorism-and-is-behind-hate-crimes-in-the-uk/">EXCLUSIVE: A Russia-linked Telegram network is inciting terrorism and is behind hate crimes in the UK – HOPE not hate</a></li>
										
                    	<li><a href="https://www.mycause.com.au/p/365849/remembering-david-jorm-fundraising-for-mental-health-research">Remembering David Jorm - fundraising for Mental Health research</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Run your own open source IDP with Authentik</title>
            <pubDate>Fri, 14 Feb 2025 11:24:24 +1100</pubDate>
            <link>https://risky.biz/soapbox93/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox93/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox93.mp3" length="36542318" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2282</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this SoapBox edition of the show Patrick Gray chats to Fletcher Heisler, the CEO of open-source identity provider Authentik.

The whole idea of Authentik is you can take control of an essential IT and security function: identity. Because Authentik is open source it’s extremely flexible, and if you’re running it yourself, you get to decide where your IDP should sit in your architecture. You can run it on prem if you’re an emergency call centre or you’re operating an airgapped network, or you can spin it up in your cloud environment if you’re a typical enterprise.

Fletcher talks through the reasons Authentik users are decoupling themselves from the major SaaS Identity Providers, and the flexibility that comes from being able to assemble exactly what you need.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this SoapBox edition of the show Patrick Gray chats to Fletcher Heisler, the CEO of open-source identity provider Authentik.</p>

<p>The whole idea of Authentik is you can take control of an essential IT and security function: identity. Because Authentik is open source it’s extremely flexible, and if you’re running it yourself, you get to decide where your IDP should sit in your architecture. You can run it on prem if you’re an emergency call centre or you’re operating an airgapped network, or you can spin it up in your cloud environment if you’re a typical enterprise.</p>

<p>Fletcher talks through the reasons Authentik users are decoupling themselves from the major SaaS Identity Providers, and the flexibility that comes from being able to assemble exactly what you need.</p>

<p>This episode is also available on <a href="https://youtu.be/lvyZF2zBliQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #779 -- DOGE staffer linked to The Com</title>
            <pubDate>Wed, 12 Feb 2025 14:18:48 +1100</pubDate>
            <link>https://risky.biz/RB779/</link>
            <guid isPermaLink="true">https://risky.biz/RB779/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB779.mp3" length="56466889" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3528</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Musk’s DOGE kid has a history with The Com
  Paragon fires Italy as a spyware customer
  Thailand cuts power to scam compounds…
  … and arrests Phobos/8Base Russian cybercrims
  The CyberCX DFIR report shows non-U2F MFA is well and truly over
  And much, much more.


This week’s episode is sponsored by Dropzone.AI. They make an AI SOC analysis platform that relieves your analysts of the necessary but tedious work, so they can focus on the value of human insight. Dropzone’s founder and CEO Edward Wu joins to talk about how they approach the problem.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Musk’s DOGE kid has a history with The Com</li>
  <li>Paragon fires Italy as a spyware customer</li>
  <li>Thailand cuts power to scam compounds…</li>
  <li>… and arrests Phobos/8Base Russian cybercrims</li>
  <li>The CyberCX DFIR report shows non-U2F MFA is well and truly over</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by Dropzone.AI. They make an AI SOC analysis platform that relieves your analysts of the necessary but tedious work, so they can focus on the value of human insight. Dropzone’s founder and CEO Edward Wu joins to talk about how they approach the problem.</p>

<p>This episode is also available on <a href="https://youtu.be/4bzLaoCeS2I">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://krebsonsecurity.com/2025/02/teen-on-musks-doge-team-graduated-from-the-com/">Teen on Musk’s DOGE Team Graduated from ‘The Com’ – Krebs on Security</a></li>
										
                    	<li><a href="https://www.wired.com/story/aclu-doge-congress-musk-data/">ACLU Warns DOGE’s ‘Unchecked’ Access Could Violate Federal Law | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/doge-lawsuit-alleged-information-security-violations">Lawsuit accuses Trump administration of violating federal information security law | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/elon-musk-doge-recruiting-palantir/">The Recruitment Effort That Helped Build Elon Musk’s DOGE Army | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/doge-privacy-lawsuit-state-attorneys-general">States prepare privacy lawsuit against DOGE over access to federal data | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/union-groups-sue-treasury-over-giving-doge-access-to-data">Union groups sue Treasury over giving DOGE access to sensitive data | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/university-of-california-students-sue-education-department-doge">Student group sues Education Department over reported DOGE access to financial aid databases | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/hackers-exploiting-trimble-cityworks-bug-used-by-local-govs">Hackers exploiting bug in popular Trimble Cityworks tool used by local gov’ts | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/02/deepseek-ios-app-sends-data-unencrypted-to-bytedance-controlled-servers/">DeepSeek iOS app sends data unencrypted to ByteDance-controlled servers - Ars Technica</a></li>
										
                    	<li><a href="https://risky.biz/deepseek-is-a-win-for-chinese-hackers/">DeepSeek Is a Win for Chinese Hackers - Risky Business</a></li>
										
                    	<li><a href="https://www.theguardian.com/technology/2025/feb/06/owner-of-spyware-used-in-alleged-whatsapp-breach-ends-contract-with-italy">Owner of spyware used in alleged WhatsApp breach ends contract with Italy | WhatsApp | The Guardian</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/02/11/another-person-targeted-by-paragon-spyware-comes-forward/">Another person targeted by Paragon spyware comes forward | TechCrunch</a></li>
										
                    	<li><a href="https://therecord.media/apple-ios-vulnerability-citizen-lab">Apple fixes security flaw allowing third-party access to locked devices | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/zservers-bulletproof-hosting-sanctions-lockbit-ransomware/">U.S. sanctions bulletproof hosting provider for supplying LockBit infrastructure | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/thailand-cuts-power-scam-compounds-myanmar">Thailand cuts power supply to Myanmar scam hubs | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/8base-ransomware-site-taken-down-4-arrested">8Base ransomware site taken down as Thai authorities arrest 4 connected to operation | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/phobos-ransomware-takedown-arrests-russian-nationals">Two Russian nationals arrested in takedown of Phobos ransomware infrastructure | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/binance-exec-tigran-gambaryan-breaks-his-silence">The Company Man: Binance exec detained in Nigeria breaks his silence | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/deloitte-5m-rhode-social-services/739309/">Deloitte pays $5M in connection with breach of Rhode Island benefits site | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://cybercx.com.au/resource/dfir-threat-report-2025/">DFIR - Threat Report 2025 | CyberCX</a></li>
										
                    	<li><a href="https://www.dropzone.ai/request-a-demo?utm_campaign=7749659-2025-FQ1%20Risky%20Business&amp;utm_source=Sponsorship&amp;utm_medium=Podcast&amp;utm_content=Risky%20Business">Request a Demo | Dropzone AI</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #778 -- Musk&apos;s child soldiers seize control of FedGov IT systems</title>
            <pubDate>Wed, 05 Feb 2025 14:24:50 +1100</pubDate>
            <link>https://risky.biz/RB778/</link>
            <guid isPermaLink="true">https://risky.biz/RB778/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB778.mp3" length="54227623" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3388</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  DeepSeek leaves an unauthed database on the internet
  Russia hacked UK prime minister’s personal mail
  Australia sanctions a Telegram group… which is more sensible than it sounds
  Medical device backdoor turns out to be just poorly thought out upgrade feature
  Google abuses weak hashing to patch AMD CPU microcode
  And much, much more.


This week’s episode is sponsored by email security boffins Sublime. Their co-founder and CEO Josh Kamdjou joins to talk about how attackers’ abuse of legitimate services like Docusign is a challenge for email security vendors.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>DeepSeek leaves an unauthed database on the internet</li>
  <li>Russia hacked UK prime minister’s personal mail</li>
  <li>Australia sanctions a Telegram group… which is more sensible than it sounds</li>
  <li>Medical device backdoor turns out to be just poorly thought out upgrade feature</li>
  <li>Google abuses weak hashing to patch AMD CPU microcode</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by email security boffins Sublime. Their co-founder and CEO Josh Kamdjou joins to talk about how attackers’ abuse of legitimate services like Docusign is a challenge for email security vendors.</p>

<p>This episode is also available on <a href="https://youtu.be/A2SLP2LdAyA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.reuters.com/world/us/musk-aides-lock-government-workers-out-computer-systems-us-agency-sources-say-2025-01-31/">Exclusive: Musk aides lock workers out of OPM computer systems | Reuters</a></li>
										
                    	<li><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History | Wiz Blog</a></li>
										
                    	<li><a href="https://securelist.ru/sparkcat-stealer-in-app-store-and-google-play/111638/">Криптостилер SparkCat в магазинах Google Play и App Store | Securelist</a></li>
										
                    	<li><a href="https://therecord.media/keir-starmer-email-hack-russia-suspected">Russian hackers suspected of compromising British PM’s personal email account | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/powerschool-hack-data-breach-protect-student-school-teacher-safe-rcna189029">PowerSchool hack: missed basic security step resulted in data breach</a></li>
										
                    	<li><a href="https://therecord.media/australia-sanctions-terrorgram-online-hate-group">Australia sanctions ‘Terrorgram’ white supremacist online group | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.theguardian.com/australia-news/2025/jan/22/paid-actors-antisemitic-attacks-australia-pm-anthony-albanese-police-afp-ntwnfb">‘Paid actors’ could be behind some antisemitic attacks, Albanese says | Australian security and counter-terrorism | The Guardian</a></li>
										
                    	<li><a href="https://www.foreignminister.gov.au/minister/penny-wong/transcript/interview-james-glenday-abc-news-breakfast">Interview with James Glenday, ABC News Breakfast | Australian Minister for Foreign Affairs</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/whatsapp-says-spyware-company-paragon-solutions-targeted-journalists-rcna190227">WhatsApp says spyware company Paragon Solutions targeted journalists</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/02/04/spyware-maker-paragon-confirms-u-s-government-is-a-customer/?guccounter=1">Spyware maker Paragon confirms US government is a customer | TechCrunch</a></li>
										
                    	<li><a href="https://therecord.media/poland-spyware-former-justice-minister-arrested">Former Polish justice minister arrested in sprawling spyware probe | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/sweden-releases-ship-suspected-cable-sabotage">Sweden releases suspected ship, says cable break ‘clearly’ not sabotage | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/">Backdoor found in two healthcare patient monitors, linked to IP in China</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/exploit-zero-day-vulnerability--zyxel/738611/">Attackers exploit zero-day vulnerability in Zyxel CPE devices | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w">AMD: Microcode Signature Verification Vulnerability · Advisory · google/security-research · GitHub</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2025/02/man-indicted-for-two-alleged-defi-hacks-that-stole-65-million/">22-year-old math wiz indicted for alleged DeFI hack that stole $65M - Ars Technica</a></li>
										
                    	<li><a href="https://www.ncsc.gov.uk/report/a-method-to-assess-forgivable-vs-unforgivable-vulnerabilities">A method to assess &#39;forgivable&#39; vs &#39;unforgivable&#39;... - NCSC.GOV.UK</a></li>
										
                    	<li><a href="https://sublime.security/blog/living-off-the-land-credential-phishing-via-docusign-abuse/">Living Off the Land: Credential Phishing via Docusign abuse</a></li>
										
                    	<li><a href="https://sublime.security/blog/living-off-the-land-callback-phishing-via-docusign-comment/">Living Off the Land: Callback Phishing via Docusign comment</a></li>
										
                    	<li><a href="https://sublime.security/blog/b2b-freight-forwarding-scams-on-the-rise-to-evade-financial-fraud-crackdowns/">B2B freight-forwarding scams on the rise to evade financial fraud crackdowns</a></li>
										
                    	<li><a href="https://sublime.security/blog/callback-phishing-via-invoice-abuse-and-distribution-list-relays/">Callback phishing via invoice abuse and distribution list relays</a></li>
										
                    	<li><a href="https://sublime.security/blog/enhanced-message-groups-improving-efficiency-in-email-incident-response/">Enhanced message groups: Improving efficiency in email incident response</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #777 -- It&apos;s SonicWall&apos;s turn</title>
            <pubDate>Wed, 29 Jan 2025 14:29:48 +1100</pubDate>
            <link>https://risky.biz/RB777/</link>
            <guid isPermaLink="true">https://risky.biz/RB777/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB777.mp3" length="49396148" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3086</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Coming to you from the same room in Risky Business headquarters Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. They talk through:


  Sonicwall firewalls hand out remote code exec like candy
  Mastercard make a slapstick-grade mistake with their DNS
  The data breach at PowerSchool and other niche SaaS providers
  Academic research proposes taking down Europe’s power grid
  Apple CPUs get a new speculative execution side channel
  And much, much more.


This week’s episode is sponsored by Push Security, who make an identity security product that runs inside browsers. Luke Jennings joins to discuss some of the pitfalls of federated authentication, like attackers using unexpected identity providers to log in to your apps.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Coming to you from the same room in Risky Business headquarters Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. They talk through:</p>

<ul>
  <li>Sonicwall firewalls hand out remote code exec like candy</li>
  <li>Mastercard make a slapstick-grade mistake with their DNS</li>
  <li>The data breach at PowerSchool and other niche SaaS providers</li>
  <li>Academic research proposes taking down Europe’s power grid</li>
  <li>Apple CPUs get a new speculative execution side channel</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by Push Security, who make an identity security product that runs inside browsers. Luke Jennings joins to discuss some of the pitfalls of federated authentication, like attackers using unexpected identity providers to log in to your apps.</p>

<p>This episode is also available on <a href="https://youtu.be/AsjcZAqdNYw">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.cybersecuritydive.com/news/sonicwall-hackers-vulnerability-sma-1000/738333/">SonicWall warns hackers targeting critical vulnerability in SMA 1000 series appliances | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/">MasterCard DNS Error Went Unnoticed for Years – Krebs on Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/01/students-parents-and-teachers-still-smarting-from-breach-exposing-their-info/">Data breach hitting PowerSchool looks very, very bad - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/deepseek-limits-registration-blames-malicious-attacks">OpenAI rival DeepSeek limits registration after ‘large-scale malicious attacks’ | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/hacker-imitates-gamaredon-to-target-russia">Hackers imitate Kremlin-linked group to target Russian entities | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/britain-undersea-cables-russian-spy-ship">UK to examine undersea cable vulnerability as Russian spy ship spotted in British waters | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/finland-eagle-s-tanker-questions-over-alleged-sabotage">Questions grow over whether Baltic Sea cable damage was sabotage or accidental | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/01/could-hackers-use-new-attack-to-take-down-european-power-grid/">Researchers say new attack could take down the European power grid - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/69-million-stolen-cyberattack-crypto-platform-phemex">At least $69 million stolen from crypto platform Phemex in suspected cyberattack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/breachforums-resentenced-supervised-release-admin">BreachForums admin to be resentenced after appeals court slams supervised release | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/01/newly-discovered-flaws-in-apple-chips-leak-secrets-in-safari-and-chrome/">Apple chips can be hacked to leak secrets from Gmail, iCloud, and more - Ars Technica</a></li>
										
                    	<li><a href="https://techcrunch.com/2025/01/28/apple-fixes-zero-day-flaw-affecting-all-devices/">Apple fixes zero-day flaw affecting all devices | TechCrunch</a></li>
										
                    	<li><a href="https://eaton-works.com/2024/12/19/mcdelivery-india-hack/">I’m Lovin’ It: Exploiting McDonald’s APIs to hijack deliveries and order food for a penny</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/tech-news/government-websites-vanish-trump-constitution-dei-rcna188522">Government websites vanish under Trump, from the Constitution to DEI</a></li>
										
                    	<li><a href="https://apply.workable.com/trailofbits/j/B49EEE1191/">Trail of Bits: Director, Technical Marketing</a></li>
										
                    	<li><a href="https://pushsecurity.bamboohr.com/careers/74">Push Security: Security Researcher (remote in the USA)</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/a-new-class-of-phishing-verification-phishing-and-cross-idp-impersonation/">A new class of phishing: Verification phishing and cross-IdP impersonation</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #776 -- Trump will flex American cyber muscles</title>
            <pubDate>Wed, 22 Jan 2025 14:18:15 +1100</pubDate>
            <link>https://risky.biz/RB776/</link>
            <guid isPermaLink="true">https://risky.biz/RB776/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB776.mp3" length="61346738" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3833</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Risky Business returns for its 19th year! Patrick Gray and Adam Boileau discuss the week’s cybersecurity news and there is a whole bunch of it. They discuss:


  The incoming Trump administration guts the CSRB
  Biden’s last cyber Executive Order has sensible things in it
  China’s breach of the US Treasury gets our reluctant admiration
  Ross Ulbricht  - the Dread Pirate Roberts of Silk Road fame - gets his Trump pardon
  New year, same shameful comedy Forti- and Ivanti- bugs
  US soldier behind the Snowflake hacks faces charges after a solid Krebs-ing
  And much, much (much! after a month off) more.


This week’s episode is sponsored by Sandfly Security, who make a Linux EDR solution. Founder Craig Rowland joins to talk about how the Linux ecosystem struggles with its lack of standardised approaches to detection and response. If you’ve got a telco full of unix, and people are asking how much Salt Typhoon you’ve got in there… Sandfly’s tools are probably what you’re looking for.

If you like your Business like us… - Risky - then we’re hiring! We’re looking for someone to help with audio and video production for our work, manage our socials, and if you’re also into the Cybers… even better. Position is remote, with a preference for timezones amenable to Australia/NZ. Drop us a line: editorial at risky.biz.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Risky Business returns for its 19th year! Patrick Gray and Adam Boileau discuss the week’s cybersecurity news and there is a whole bunch of it. They discuss:</p>

<ul>
  <li>The incoming Trump administration guts the CSRB</li>
  <li>Biden’s last cyber Executive Order has sensible things in it</li>
  <li>China’s breach of the US Treasury gets our reluctant admiration</li>
  <li>Ross Ulbricht  - the Dread Pirate Roberts of Silk Road fame - gets his Trump pardon</li>
  <li>New year, same shameful comedy Forti- and Ivanti- bugs</li>
  <li>US soldier behind the Snowflake hacks faces charges after a solid Krebs-ing</li>
  <li>And much, much (much! after a month off) more.</li>
</ul>

<p>This week’s episode is sponsored by Sandfly Security, who make a Linux EDR solution. Founder Craig Rowland joins to talk about how the Linux ecosystem struggles with its lack of standardised approaches to detection and response. If you’ve got a telco full of unix, and people are asking how much Salt Typhoon you’ve got in there… Sandfly’s tools are probably what you’re looking for.</p>

<p>If you like your Business like us… - Risky - then we’re hiring! We’re looking for someone to help with audio and video production for our work, manage our socials, and if you’re also into the Cybers… even better. Position is remote, with a preference for timezones amenable to Australia/NZ. Drop us a line: editorial at risky.biz.</p>

<p>This episode is also available on <a href="https://www.youtube.com/watch?v=pJr2K9mCW-s">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://subscriber.politicopro.com/article/2025/01/acting-dhs-chief-ousts-csrb-experts-other-department-advisers-00199722">POLITICO Pro | Article | Acting DHS chief ousts CSRB experts, other department advisers</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2025/01/01/treasury-hack-china/">Treasury’s sanctions office hacked by Chinese government, officials say </a></li>
										
                    	<li><a href="https://www.cisa.gov/news-events/news/strengthening-americas-resilience-against-prc-cyber-threats">Strengthening America’s Resilience Against the PRC Cyber Threats | CISA</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/att-verizon-salt-typhoon/736680/">AT&amp;T, Verizon say they evicted Salt Typhoon from their networks</a></li>
										
                    	<li><a href="https://risky.biz/risky-bulletin-looking-at-bidens-last-cyber-executive-order/">Risky Bulletin: Looking at Biden&#39;s last cyber executive order - Risky Business</a></li>
										
                    	<li><a href="https://www.reuters.com/technology/cybersecurity/internet-connected-devices-can-now-have-label-that-rates-their-security-2025-01-07/">Internet-connected devices can now have a label that rates their security | Reuters</a></li>
										
                    	<li><a href="https://therecord.media/us-sanctions-chinas-integrity-cyber-company-flax-typhoon">US sanctions prominent Chinese cyber company for role in Flax Typhoon attacks</a></li>
										
                    	<li><a href="https://therecord.media/fcc-rip-and-replace-china-tech-tops-ndaa">FCC ‘rip and replace’ provision for Chinese tech tops cyber provisions in defense bill</a></li>
										
                    	<li><a href="https://cyberscoop.com/cia-nominee-john-ratcliffe-cyber-offense/">CIA nominee tells Senate he, too, wants to go on cyber offense | CyberScoop</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/tech-news/trump-tells-justice-department-not-enforce-tiktok-ban-75-days-rcna188377">Trump tells Justice Department not to enforce TikTok ban for 75 days</a></li>
										
                    	<li><a href="https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users">Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.lawfaremedia.org/article/unpacking-whatsapp-s-legal-triumph-over-nso-group">Unpacking WhatsApp’s Legal Triumph Over NSO Group | Lawfare</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/01/dozens-of-backdoored-chrome-extensions-discovered-on-2-6-million-devices/">Time to check if you ran any of these 33 malicious Chrome extensions</a></li>
										
                    	<li><a href="https://arcticwolf.com/resources/blog/console-chaos-targets-fortinet-fortigate-firewalls/">Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls - Arctic Wolf</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2025/01/ivanti-vpn-users-are-getting-hacked-by-actors-exploiting-a-critical-vulnerability/">Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/active-exploitation-apache-struts-2-flaw/736199/">Researchers warn of active exploitation of critical Apache Struts 2 flaw </a></li>
										
                    	<li><a href="https://therecord.media/doj-deletes-china-linked-plugx-malware">DOJ deletes China-linked PlugX malware off more than 4,200 US computers</a></li>
										
                    	<li><a href="https://therecord.media/russian-internet-provider-says-network-destroyed-cyberattack">Russian internet provider confirms its network was ‘destroyed’ following attack claimed by Ukrainian hackers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/ukraine-restores-registers-after-cyberattack">Ukraine restores state registers after suspected Russian cyberattack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/hackers-claim-to-breach-russian-state-agency-land-records">Hackers claim to breach Russian state agency managing property, land records | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2024/12/u-s-army-soldier-arrested-in-att-verizon-extortions/">U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions – Krebs on Security</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Cool compliance tricks with the Island enterprise browser</title>
            <pubDate>Fri, 20 Dec 2024 14:16:53 +1100</pubDate>
            <link>https://risky.biz/soapbox92/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox92/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox92.mp3" length="25609408" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1600</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored Soap Box edition of the show Patrick Gray talks to Island CEO Michael Fey about some of the cool tricks in the Island enterprise browser. You can use it to tick off so many compliance boxes, and not just cybersecurity boxes.

This is largely a conversation about compliance, but it’s actually interesting and fun. These are words we never thought we’d type!

You can find Island at https://island.io/

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored Soap Box edition of the show Patrick Gray talks to Island CEO Michael Fey about some of the cool tricks in the Island enterprise browser. You can use it to tick off so many compliance boxes, and not just cybersecurity boxes.</p>

<p>This is largely a conversation about compliance, but it’s actually interesting and fun. These are words we never thought we’d type!</p>

<p>You can find Island at https://island.io/</p>

<p>This episode is also available on <a href="https://youtu.be/1tOecvkpPWU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #775 -- Cl0p is back, SEC hack disclosures disappoint</title>
            <pubDate>Wed, 18 Dec 2024 12:37:09 +1100</pubDate>
            <link>https://risky.biz/RB775/</link>
            <guid isPermaLink="true">https://risky.biz/RB775/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB775.mp3" length="58687243" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3666</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  The SEC’s cyber incident reporting isn’t very exciting after all
  China Telecom on the way to being thrown out of the US
  The NSA/Cybercom might get two separate hats
  The Cl0p ransomware crew are back and taking responsibility for the Cleo hacks
  (Yet another) File upload bug in Struts makes Java admins weep
  And much, much more.


This episode is sponsored by SpecterOps, who run a pretty top notch offsec/pentest team when they’re not busy making the Bloodhound Enterprise identity attack path enumeration software. SpecterOps’ Robby Winchester joins to talk about how pentest has changed, and how their customers get value from their testing.

This episode is also available Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>The SEC’s cyber incident reporting isn’t very exciting after all</li>
  <li>China Telecom on the way to being thrown out of the US</li>
  <li>The NSA/Cybercom might get two separate hats</li>
  <li>The Cl0p ransomware crew are back and taking responsibility for the Cleo hacks</li>
  <li>(Yet another) File upload bug in Struts makes Java admins weep</li>
  <li>And much, much more.</li>
</ul>

<p>This episode is sponsored by SpecterOps, who run a pretty top notch offsec/pentest team when they’re not busy making the Bloodhound Enterprise identity attack path enumeration software. SpecterOps’ Robby Winchester joins to talk about how pentest has changed, and how their customers get value from their testing.</p>

<p>This episode is also available <a href="https://youtu.be/RquLQQyrP-I">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.cybersecuritydive.com/news/sec-cyber-rule-one-year/735249/">SEC cyber incident reporting rule generates 71 filings in 11 months | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.reuters.com/business/energy/us-senators-green-groups-call-accountability-over-hacking-exxon-critics-2024-12-12/">US senators, green groups call for accountability over hacking of Exxon critics | Reuters</a></li>
										
                    	<li><a href="https://www.nytimes.com/2024/12/16/us/politics/biden-administration-retaliation-china-hack.html">Biden Administration Takes First Step to Retaliate Against China Over Hack - The New York Times</a></li>
										
                    	<li><a href="https://therecord.media/cyber-command-nsa-dual-hat-trump">Unfinished business for Trump: Ending the Cyber Command and NSA &#39;dual hat&#39; | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.politico.eu/article/eu-opens-investigation-into-tiktok-over-romanian-election/">EU opens investigation into TikTok and the Romanian election – POLITICO</a></li>
										
                    	<li><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/">Clop ransomware claims responsibility for Cleo data theft attacks</a></li>
										
                    	<li><a href="https://therecord.media/cisa-ransomware-cleo-cyberpanel-bugs">CISA warns of ransomware gangs exploiting Cleo, CyberPanel bugs | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://attackerkb.com/topics/geR0H8dgrE/cve-2024-55956/rapid7-analysis">CVE-2024-55956 | AttackerKB</a></li>
										
                    	<li><a href="https://www.theregister.com/2024/12/12/apache_struts_2_vuln/">Apache issues patches for critical Struts 2 RCE bug • The Register</a></li>
										
                    	<li><a href="https://therecord.media/kadokawa-japan-reported-ransomware-payment">Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.reuters.com/markets/deals/israeli-spyware-firm-paragon-acquired-by-us-investment-group-report-says-2024-12-16/">Israeli spyware firm Paragon acquired by US investment group, report says | Reuters</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2024/12/how-cryptocurrency-turns-to-cash-in-russian-banks/">How Cryptocurrency Turns to Cash in Russian Banks – Krebs on Security</a></li>
										
                    	<li><a href="https://cyberscoop.com/baron-martin-arrested-for-child-abuse-material-cyberstalking-764-cvlt-networks/">Arizona man arrested for alleged involvement in violent online terror networks | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/russia-bans-viber-terrorism-trafficking">Russia bans Viber, claiming app facilitates terrorism and drug trafficking | The Record from Recorded Future News</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Wide World of Cyber: SentinelOne&apos;s Chris Krebs on Chinese cyber operations</title>
            <pubDate>Fri, 13 Dec 2024 14:56:26 +1100</pubDate>
            <link>https://risky.biz/WWC6/</link>
            <guid isPermaLink="true">https://risky.biz/WWC6/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/WWC6.mp3" length="48082328" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3004</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Wild World of Cyber podcast Patrick Gray sits down with SentinelOne’s Chief Intelligence and Public Policy Officer Chris Krebs to talk all about Chinese cyber operations.

They look at the Salt Typhoon and Volt Typhoon campaigns, the last 20 years of Chinese operations, and the evolution of the cyber roles of China’s Ministry of State Security and People’s Liberation Army.

It’s a very dense hour of conversation!

This podcast was recorded in front of an audience at the Museum of Contemporary Art in Sydney.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Wild World of Cyber podcast Patrick Gray sits down with SentinelOne’s Chief Intelligence and Public Policy Officer Chris Krebs to talk all about Chinese cyber operations.</p>

<p>They look at the Salt Typhoon and Volt Typhoon campaigns, the last 20 years of Chinese operations, and the evolution of the cyber roles of China’s Ministry of State Security and People’s Liberation Army.</p>

<p>It’s a very dense hour of conversation!</p>

<p>This podcast was recorded in front of an audience at the Museum of Contemporary Art in Sydney.</p>

<p>This episode is also available on <a href="https://youtu.be/MQaVx9vpvQg">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #774 -- Cleo file transfer appliances under widespread attack</title>
            <pubDate>Wed, 11 Dec 2024 14:08:26 +1100</pubDate>
            <link>https://risky.biz/RB774/</link>
            <guid isPermaLink="true">https://risky.biz/RB774/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB774.mp3" length="59974053" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Snowflake kills username and password-based auth…</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3748</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Cleo file transfer products have a remote code exec, here we go again!
  Snowflake phases out password-based auth
  Chinese Sophos-exploit-dev company gets sanctioned
  Romania’s election gets rolled back after Tiktok changed the outcome
  AMD’s encrypted VM tech bamboozled by RAM with one extra address bit
  Some cool OpenWRT research
  And much, much more.


This week’s episode is sponsored by Thinkst, who love sneaky canary token traps. Jacob Torrey previews an upcoming Blackhat talk filled with interesting operating system tricks you can use to trigger canaries in your environment. You wont believe the third trick! Attackers hate him!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Cleo file transfer products have a remote code exec, here we go again!</li>
  <li>Snowflake phases out password-based auth</li>
  <li>Chinese Sophos-exploit-dev company gets sanctioned</li>
  <li>Romania’s election gets rolled back after Tiktok changed the outcome</li>
  <li>AMD’s encrypted VM tech bamboozled by RAM with one extra address bit</li>
  <li>Some cool OpenWRT research</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by Thinkst, who love sneaky canary token traps. Jacob Torrey previews an upcoming Blackhat talk filled with interesting operating system tricks you can use to trigger canaries in your environment. You wont believe the third trick! Attackers hate him!</p>

<p>This episode is also available on <a href="https://youtu.be/5AMukehBDiA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild">Cleo Software Actively Being Exploited in the Wild CVE-2024-50623 | Huntress</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/blue-yonder-data-leak-ransomware/734987/">Blue Yonder investigating data leak claim following ransomware attack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/snowflake-authentication-policy-change/735099/">Snowflake to phase out single-factor authentication by late 2025 | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://home.treasury.gov/news/press-releases/jy2742">Treasury Sanctions Cybersecurity Company Involved in Compromise of Firewall Products and Attempted Ransomware Attacks | U.S. Department of the Treasury</a></li>
										
                    	<li><a href="https://therecord.media/another-hacker-scattered-spider-charged">Another teenage hacker charged as feds continue Scattered Spider crackdown | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/germany-crimenetwork-arrest">Germany arrests suspected admin of country’s largest criminal marketplace | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://cyberscoop.com/fcc-cybersecurity-rules-wiretapping-law-salt-typhoon/">FCC, for first time, proposes cybersecurity rules tied to wiretapping law | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/russian-state-hackers-abuse-cloudflare-tunnels-spy-on-ukraine">Russian state hackers abuse Cloudflare services to spy on Ukrainian targets | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.fortra.com/blog/cloudflare-pages-workers-domains-increasingly-abused-for-phishing">Cloudflare’s pages.dev and workers.dev Domains Increasingly Abused for</a></li>
										
                    	<li><a href="https://therecord.media/romania-annuls-presidential-election-over-interference">Romania annuls presidential election over alleged Russian interference | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/romania-elections-eu-tiktok-freeze-data-russia-interference">EU demands TikTok &#39;freeze and preserve data&#39; over alleged Russian interference in Romanian elections | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://checkfirst.network/research-note-metas-role-in-romanias-2024-presidential-election/">Research Note: Meta’s Role in Romania’s 2024 Presidential Election - CheckFirst</a></li>
										
                    	<li><a href="https://therecord.media/electric-distributor-cyberattack-romania">Key electricity distributor in Romania warns of ‘cyber attack in progress’ | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2024/12/backdoor-slips-into-popular-code-library-drains-155k-from-digital-wallets/">Backdoor slipped into popular code library, drains ~$155k from digital wallets - Ars Technica</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2024/12/new-badram-attack-neuters-security-assurances-in-amd-epyc-processors/">AMD’s trusted execution environment blown wide open by new BadRAM attack - Ars Technica</a></li>
										
                    	<li><a href="https://swarm.ptsecurity.com/new-dog-old-tricks-damagecard-attack-targets-memory-directly-thru-sd-card-reader/">New dog, old tricks: DaMAgeCard attack targets memory directly thru SD card reader – PT SWARM</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/tech-news/telegram-partners-child-safety-group-scan-content-sexual-abuse-materia-rcna182596">Telegram partners with child safety group to scan content for sexual abuse material</a></li>
										
                    	<li><a href="https://arstechnica.com/tech-policy/2024/12/thousands-of-child-sex-abuse-victims-sue-apple-for-lax-csam-reporting/">Apple hit with $1.2B lawsuit after killing controversial CSAM-detecting tool - Ars Technica</a></li>
										
                    	<li><a href="https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/">Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research</a></li>
										
                    	<li><a href="https://support.mozilla.org/en-US/kb/how-do-i-turn-do-not-track-feature">How do I turn on the Do Not Track feature? | Firefox Help</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soapbox: Enterprise Yubikeys can now be pre-registered</title>
            <pubDate>Mon, 09 Dec 2024 09:49:27 +1100</pubDate>
            <link>https://risky.biz/soapbox91/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox91/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox91.mp3" length="28677715" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Cybersecurity in energy critical infrastructure</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1796</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this interview Patrick Gray talks to Yubico’s COO and President Jerrod Chong about a new Yubikey feature: pre-registration.

You can now ship pre-registered Yubikeys to your staff so you don’t need to rely on your staff to enrol them. They’ve achieved this with really slick Okta and Entra ID integrations.

Jerrod also talks about a recent trip to Singapore and concerns he has about the cybersecurity of critical infrastructure in the energy sector.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this interview Patrick Gray talks to Yubico’s COO and President Jerrod Chong about a new Yubikey feature: pre-registration.</p>

<p>You can now ship pre-registered Yubikeys to your staff so you don’t need to rely on your staff to enrol them. They’ve achieved this with really slick Okta and Entra ID integrations.</p>

<p>Jerrod also talks about a recent trip to Singapore and concerns he has about the cybersecurity of critical infrastructure in the energy sector.</p>

                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #773 -- Cybercriminals are dropping like flies in Russia</title>
            <pubDate>Wed, 04 Dec 2024 12:54:12 +1100</pubDate>
            <link>https://risky.biz/RB773/</link>
            <guid isPermaLink="true">https://risky.biz/RB773/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB773.mp3" length="54761615" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Would you buy shares in Microsoft&apos;s cybersecurity business?</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3422</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  The FTC decides its time to take another look at Microsoft
  Exxon’s opponents targeted by hackers
  Russian hackers keep getting sentenced and it confuses us
  The Feds recommend Signal, because throwing hackers out of telcos ain’t gonna happen
  A South Korean set-top-box manufacturer shipped a DDoS client for corpo-combat
  And much, much more.


This week’s sponsor interview with Vijit Nair from Corelight. We talk to him about doing detection in cloud environments, and how the varied nature of cloud systems makes the old ways - network monitoring - useful in new and interesting ways.

If you’re in Sydney, Pat is recording a live episode of the Wide World of Cyber with Chris Krebs on 5 December. There might still be tickets left!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>The FTC decides its time to take another look at Microsoft</li>
  <li>Exxon’s opponents targeted by hackers</li>
  <li>Russian hackers keep getting sentenced and it confuses us</li>
  <li>The Feds recommend Signal, because throwing hackers out of telcos ain’t gonna happen</li>
  <li>A South Korean set-top-box manufacturer shipped a DDoS client for corpo-combat</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s sponsor interview with Vijit Nair from Corelight. We talk to him about doing detection in cloud environments, and how the varied nature of cloud systems makes the old ways - network monitoring - useful in new and interesting ways.</p>

<p>If you’re in Sydney, Pat is recording a live episode of the Wide World of Cyber with Chris Krebs on 5 December. There might still be <a href="https://go.sentinelone.com/risky-business-live-apj-sydney-en.html">tickets left</a>!</p>

<p>This episode is also available on <a href="https://youtu.be/cstfm5FbRFI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://go.sentinelone.com/risky-business-live-apj-sydney-en.html">SentinelOne: Risky Business LIVE</a></li>
										
                    	<li><a href="https://apnews.com/article/microsoft-ftc-antitrust-lina-khan-trump-biden-1b8983bec2ad1b2e943fb25c5b27619b">FTC opens Microsoft antitrust investigation | AP News</a></li>
										
                    	<li><a href="https://www.reuters.com/business/energy/exxon-lobbyist-investigated-over-hack-and-leak-environmentalist-emails-sources-2024-11-27/">Exclusive: Exxon lobbyist investigated over hack-and-leak of environmentalist emails, sources say | Reuters</a></li>
										
                    	<li><a href="https://therecord.media/costa-rica-state-energy-company-ransomware">Costa Rica state energy company calls in US experts to help with ransomware attack | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.upguard.com/security-report/blue-yonder">Blue Yonder Security Rating, Vendor Risk Report, and Data Breaches</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/englobal-ransomware-attack/734462/">ENGlobal IT systems impacted by ransomware attack | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/wazawaka-mikhail-matveev-reportedly-arrested-russia">Ransomware suspect Wazawaka reportedly arrested by Russia | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/hyrda-darknet-drug-marketplace-kingpin-sentenced-life-russia">Russia delivers historic life sentence to suspected founder of darknet marketplace | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://therecord.media/stoli-group-usa-bankruptcy-filing-ransomware">Vodka maker Stoli says August ransomware attack contributed to bankruptcy filing | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2024/11/hacker-in-snowflake-extortions-may-be-a-u-s-soldier/">Hacker in Snowflake Extortions May Be a U.S. Soldier – Krebs on Security</a></li>
										
                    	<li><a href="https://therecord.media/uganda-cyberattack-central-bank">Uganda confirms cyberattack on central bank but minimizes extent of breach | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.police.go.kr/user/bbs/BD_selectBbs.do?q_bbsCode=1002&amp;q_bbscttSn=20241128120629043">Press Release: HOME &gt; Announcements/News &gt; Announcements &gt; Press Release</a></li>
										
                    	<li><a href="https://www.nbcnews.com/tech/security/us-officials-urge-americans-use-encrypted-apps-cyberattack-rcna182694">U.S. officials urge Americans to use encrypted apps amid cyberattack</a></li>
										
                    	<li><a href="https://www.wired.com/story/big-interview-meredith-whittaker-signal-2024/">With Threats to Encryption Looming, Signal’s Meredith Whittaker Says ‘We’re Not Changing’ | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/japanese-crypto-service-shuts-down">Japanese crypto service shuts down after theft of bitcoin worth $308 million | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.wired.com/story/x-delete-posts-cyd-micah-lee/">He Got Banned From X. Now He Wants to Help You Escape, Too | WIRED</a></li>
										
                    	<li><a href="https://x.com/cyberfeeddigest/status/1861512772090986971">cyberundergroundfeed on X: &quot;🚨 Pro-Russian Group Allegedly Hacks #Australia #Melbourne Sewage System 🚨 Hackers claim to have compromised the Riversdale sewage pumping station in #Melbourne, #Australia, switching it to manual control and placing it in emergency mode.&quot;</a></li>
										
                    	<li><a href="https://www.nzherald.co.nz/nz/pump-station-fears-rebuffed/7JESZCUMB2KO7OZJDCJCGSHF6I/#google_vignette">Pump station fears rebuffed - New Zealand News - NZ Herald</a></li>
										
                    	<li><a href="https://www.rnz.co.nz/news/national/529935/nz-navy-ship-runs-aground-off-samoa-catches-fire-and-sinks">NZ Navy ship runs aground off Samoa, catches fire and sinks</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #772 -- Salt Typhoon is truly a national security disaster</title>
            <pubDate>Wed, 27 Nov 2024 14:02:05 +1100</pubDate>
            <link>https://risky.biz/RB772/</link>
            <guid isPermaLink="true">https://risky.biz/RB772/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB772.mp3" length="58652087" type="audio/mpeg" />
            <itunes:subtitle>PLUS: The bad old days return with Blue Yonder ransomware attack...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3665</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  A ransomware attack has crippled US supply chain software provider Blue Yonder
  Russian spies hack nearby wifi to get to their targets, but that doesn’t seem surprising?
  Salt Typhoon’s attacks on telcos are hard to solve and big on impact
  China’s surveillance state workers sell their access at home
  Palo Alto is bad and should feel bad
  And much, much more.


In this week’s sponsor interview Patrick Gray chats with Matt Muller from Tines about Gartner’s “spicy take” that the SOAR category is dead. SOAR is dead! Long live SOAR!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>A ransomware attack has crippled US supply chain software provider Blue Yonder</li>
  <li>Russian spies hack nearby wifi to get to their targets, but that doesn’t seem surprising?</li>
  <li>Salt Typhoon’s attacks on telcos are hard to solve and big on impact</li>
  <li>China’s surveillance state workers sell their access at home</li>
  <li>Palo Alto is bad and should feel bad</li>
  <li>And much, much more.</li>
</ul>

<p>In this week’s sponsor interview Patrick Gray chats with Matt Muller from Tines about Gartner’s “spicy take” that the SOAR category is dead. SOAR is dead! Long live SOAR!</p>

<p>This episode is also available on <a href="https://youtu.be/toR7pBeOUnc">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/retailers-struggle-after-ransomware-attack-on-supply-chain-tech-company">Retailers struggle after ransomware attack on supply chain tech provider Blue Yonder | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://blueyonder.com/customer-update">Customer Update</a></li>
										
                    	<li><a href="https://www.wired.com/story/russia-gru-apt28-wifi-daisy-chain-breach/">Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/china-salt-typhoon-targets-southeast-asia-telecom">China’s Salt Typhoon hackers target telecom firms in Southeast Asia with new malware | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.nytimes.com/2024/11/22/us/politics/chinese-hack-telecom-white-house.html">Emerging Details of Chinese Hack Leave U.S. Officials Increasingly Concerned</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2024/11/21/salt-typhoon-china-hack-telecom/">Top senator calls Salt Typhoon “worst telecom hack in our nation’s history” - The Washington Post</a></li>
										
                    	<li><a href="https://cyberscoop.com/cape-phone-privacy-calea-tracking/">Privacy-focused mobile phone launches for high-risk individuals | CyberScoop</a></li>
										
                    	<li><a href="https://www.wired.com/story/chineses-surveillance-state-is-selling-citizens-data-as-a-side-hustle/">China’s Surveillance State Is Selling Citizen Data as a Side Hustle | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/former-verizon-worker-sentenced-china">Former Verizon employee gets four-year sentence for sharing cyber secrets with Chinese government | The Record from Recorded Future News</a></li>
										
                    	<li><a href="https://www.aph.gov.au/Parliamentary_Business/Bills_Legislation/Bills_Search_Results/Result?bId=r7294">Surveillance Legislation (Confirmation of Application) Bill 2024 – Parliament of Australia</a></li>
										
                    	<li><a href="https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22chamber%2Fhansardr%2F28041%2F0066%22">ParlInfo - BILLS : Surveillance Legislation (Confirmation of Application) Bill 2024 : Second Reading</a></li>
										
                    	<li><a href="https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22legislation%2Fems%2Fr7294_ems_f25e7d76-b990-4f10-87e2-600b54a11636%22">ParlInfo - Surveillance Legislation (Confirmation of Application) Bill 2024</a></li>
										
                    	<li><a href="https://parlinfo.aph.gov.au/parlInfo/search/display/display.w3p;query=Id%3A%22legislation%2Fems%2Fr7294_ems_6a0cc7be-6a80-4ccf-9e9a-1e298f6d417c%22">ParlInfo - Surveillance Legislation (Confirmation of Application) Bill 2024</a></li>
										
                    	<li><a href="https://bsky.app/profile/chrisbing.bsky.social/post/3lbfgssdlpx24">Chris Bing: &quot;Regarding the reported hack of the Gaetz-ethics committee report, the file storage platform (FileShare) that held the document said they weren&#39;t hacked. But rather: &quot;this file was shared anonymously which allowed anyone to download. This was not a breach&quot;&quot; — Bluesky</a></li>
										
                    	<li><a href="https://www.404media.co/tether-has-become-a-massive-money-laundering-tool-for-mexican-drug-traffickers-feds-say/">Tether Has Become a Massive Money Laundering Tool for Mexican Drug Traffickers, Feds Say</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-consolidation-momentum/733612/">Palo Alto Networks boasts as customers coalesce on its platforms | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-disputes-shadowserver-firewall-exploit-scans/733728/">Palo Alto Networks pushes back as Shadowserver spots 2K of its firewalls exploited | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://rsf.org/en/rsf-investigation-indian-cyber-security-giant-silencing-media-outlets-worldwide">RSF investigation: the Indian cyber-security giant silencing media outlets worldwide | RSF</a></li>
										
                    	<li><a href="https://bsky.app/profile/patrick.risky.biz">Patrick Gray (@patrick.risky.biz) — Bluesky</a></li>
										
                    	<li><a href="https://bsky.app/profile/metlstorm.risky.biz">metlstorm (@metlstorm.risky.biz) — Bluesky</a></li>
										
                    	<li><a href="https://bsky.app/profile/campuscodi.risky.biz">Catalin Cimpanu (@campuscodi.risky.biz) — Bluesky</a></li>
										
                    	<li><a href="https://app.bsky.cz/profile/tom.risky.biz">Tom Uren (@tom.risky.biz) — Bluesky</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business  #771 -- Palo Alto&apos;s firewall 0days are very, very stupid</title>
            <pubDate>Wed, 20 Nov 2024 14:31:18 +1100</pubDate>
            <link>https://risky.biz/RB771/</link>
            <guid isPermaLink="true">https://risky.biz/RB771/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB771.mp3" length="58760319" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Microsoft teases some plausibly good post-Crowdstrike ideas...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3672</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Microsoft introduces some sensible sounding post-Crowdstrike changes
  Palo Alto patches hella-stupid bugs in its firewall management webapp
  CISA head Jen Easterly to depart as Trump arrives
  AI grandma tarpits phone scammers in family-tech-support hell
  Academic research supports your gut-reaction; phishing training doesn’t work
  And much, much more.


This week’s episode is sponsored by Greynoise. The always excitable Andrew Morris joins to remind us that the edge-device vulnerabilities Pat and Adam complain about on the show are in fact actually even worse than we make them out to be. Andrew also tells us about a zero-day Greynoise’ AI system truffle-pigged out of their data set.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Microsoft introduces some sensible sounding post-Crowdstrike changes</li>
  <li>Palo Alto patches hella-stupid bugs in its firewall management webapp</li>
  <li>CISA head Jen Easterly to depart as Trump arrives</li>
  <li>AI grandma tarpits phone scammers in family-tech-support hell</li>
  <li>Academic research supports your gut-reaction; phishing training doesn’t work</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by Greynoise. The always excitable Andrew Morris joins to remind us that the edge-device vulnerabilities Pat and Adam complain about on the show are in fact actually even worse than we make them out to be. Andrew also tells us about a zero-day Greynoise’ AI system truffle-pigged out of their data set.</p>

<p>This episode is also available on <a href="https://youtu.be/RxyemwE4XBo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://blogs.windows.com/windowsexperience/2024/11/19/windows-security-and-resiliency-protecting-your-business/">Windows security and resiliency: Protecting your business | Windows Experience Blog</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-disclose-vulnerabilities-CSAF/733063/">Microsoft revamps how it will disclose vulnerabilities | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/nist-vulnerability-backlog-cleared-cisa">NIST says exploited vulnerability backlog cleared but end-of-year goal for full list unlikely</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/">Pots and Pans, AKA an SSLVPN - Palo Alto PAN-OS CVE-2024-0012 and CVE-2024-9474</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-pan-os-firewall-zero-day/733336/">Palo Alto Networks customers grapple with another actively exploited zero-day | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://news.risky.biz/risky-biz-news-unpatched-zero-day-in-palo-alto-networks-is-in-the-wild/">Unpatched zero-days in Fortinet and Palo Alto Networks software</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/palo-alto-networks-migration-tool-exploits/733072/">Palo Alto Networks’ customer migration tool hit by trio of CVE exploits | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2024/11/16/readout-of-president-joe-bidens-meeting-with-president-xi-jinping-of-the-peoples-republic-of-china-3/">Readout of President Joe Biden’s Meeting with President Xi Jinping of the People’s Republic of China | The White House</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/easterly-step-down-cisa-director-inauguration/733199/">Easterly to step down from CISA director role on Inauguration Day | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/neuberger-urges-trump-admin-focus-china-ransomware">Top White House cyber official urges Trump to focus on ransomware, China</a></li>
										
                    	<li><a href="https://therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data">Ransomware gang Akira leaks unprecedented number of victims’ data in one day</a></li>
										
                    	<li><a href="https://www.nytimes.com/2024/11/19/us/politics/matt-gaetz-hack-testimony.html">Hacker Is Said to Have Gained Access to File With Damaging Testimony About Gaetz</a></li>
										
                    	<li><a href="https://therecord.media/pegasus-spyware-infections-detailed-whatsapp-lawsuit">1,400 Pegasus spyware infections detailed in WhatsApp’s lawsuit filings</a></li>
										
                    	<li><a href="https://techcrunch.com/2024/11/15/nso-group-admits-cutting-off-10-customers-because-they-abused-its-pegasus-spyware-say-unsealed-court-documents/?guccounter=1">NSO Group admits cutting off 10 customers because they abused its Pegasus spyware, say unsealed court documents | TechCrunch</a></li>
										
                    	<li><a href="https://therecord.media/akira-ransomware-group-publishes-unprecedented-leak-data">Ransomware gang Akira leaks unprecedented number of victims’ data in one day</a></li>
										
                    	<li><a href="https://therecord.media/ohio-man-helix-crypto-sentenced">Ohio man behind Helix cryptocurrency mixer gets 3-year sentence</a></li>
										
                    	<li><a href="https://news.virginmediao2.co.uk/o2-unveils-daisy-the-ai-granny-wasting-scammers-time/">O2 unveils Daisy, the AI granny wasting scammers’ time - Virgin Media O2</a></li>
										
                    	<li><a href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600a076/21B7RjYyG9q">Understanding the Efficacy of Phishing Training in Practice</a></li>
										
                    	<li><a href="https://www.news.com.au/finance/business/retail/bunnings-facial-recognition-cameras-breach-privacy-act-retailer-to-challenge-ruling/news-story/11e6f81c75e2da32384936f66bc0ce60">Bunnings facial recognition cameras breach Privacy Act, retailer to challenge ruling | news.com.au — Australia’s leading news site</a></li>
										
                    	<li><a href="https://www.news.com.au/lifestyle/real-life/news-life/nudity-punches-in-newly-released-bunnings-cctv-as-company-found-to-breach-privacy-act/news-story/6c488d41706d87df2e5d2ca9393764aa">Nudity, punches in newly released Bunnings CCTV as company found to breach Privacy Act | news.com.au — Australia’s leading news site</a></li>
										
                    	<li><a href="https://www.coindesk.com/policy/2024/11/18/bitfinex-hack-launderer-heather-razzlekhan-morgan-sentenced-to-18-months-in-prison/">Bitfinex Hack Launderer Heather &#39;Razzlekhan&#39; Morgan Sentenced to 18 Months in Prison</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #770 -- A Russian IR guy discovers extremely cool spookware</title>
            <pubDate>Wed, 13 Nov 2024 15:31:56 +1100</pubDate>
            <link>https://risky.biz/RB770/</link>
            <guid isPermaLink="true">https://risky.biz/RB770/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB770.mp3" length="60950731" type="audio/mpeg" />
            <itunes:subtitle>PLUS: The FBI agent who arrested Ross Ulbricht joins the show...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3809</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Apple frustrates law enforcement with iOS auto-reboot
  CISA says most KEV vulnerabilities in 2023 were first used as zero days
  Russians roll incident response on some sweet Linux spookware
  Regular users can create mailboxes in M365?
  Tor tracks down the source of its joe-job abuse complaints
  And much, much more.


This week’s feature guest is former FBI agent Chris Tarbell, who arrested Silk Road operator Ross Ulbricht way back in 2013. As suggestions swirl that an incoming Trump administration might release Ulbricht, Chris talks about the reality of the Dread Pirate Roberts.

This episode is sponsored by software supply chain security firm Socket.dev. Founder Feross Aboukhadijeh thinks that we need a CVE-like catalogue for supply-chain attacks, and he makes a solid argument.

The show is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Apple frustrates law enforcement with iOS auto-reboot</li>
  <li>CISA says most KEV vulnerabilities in 2023 were first used as zero days</li>
  <li>Russians roll incident response on some sweet Linux spookware</li>
  <li>Regular users can create mailboxes in M365?</li>
  <li>Tor tracks down the source of its joe-job abuse complaints</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s feature guest is former FBI agent Chris Tarbell, who arrested Silk Road operator Ross Ulbricht way back in 2013. As suggestions swirl that an incoming Trump administration might release Ulbricht, Chris talks about the reality of the Dread Pirate Roberts.</p>

<p>This episode is sponsored by software supply chain security firm Socket.dev. Founder Feross Aboukhadijeh thinks that we need a CVE-like catalogue for supply-chain attacks, and he makes a solid argument.</p>

<p>The show is also available on <a href="https://youtu.be/s7iPp5QaHmI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://bsky.app/profile/jasonkoebler.bsky.social/post/3lai6by2ica23">Jason Koebler: &quot;New: We’ve confirmed Apple quietly introduced a feature in the new iOS that is preventing cops from hacking iPhones that they have confiscated as evidence. Apple really did say ACAB www.404media.co/apple-quietl...&quot; — Bluesky</a></li>
										
                    	<li><a href="https://www.404media.co/apple-quietly-introduced-iphone-reboot-code-which-is-locking-out-cops/">Apple Quietly Introduced iPhone Reboot Code Which is Locking Out Cops</a></li>
										
                    	<li><a href="https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273">Exclusive | U.S. Agency Warns Employees About Phone Use Amid Ongoing China Hack - WSJ</a></li>
										
                    	<li><a href="https://therecord.media/surge-zero-day-exploits-five-eyes-report">Surge in exploits of zero-day vulnerabilities is ‘new normal’ warns Five Eyes alliance</a></li>
										
                    	<li><a href="https://rt-solar.ru/solar-4rays/blog/4861/">The Elusive GoblinRAT: How a Linux Backdoor Infiltrated Government Infrastructures</a></li>
										
                    	<li><a href="https://www.cyberis.com/article/microsoft-bookings-facilitating-impersonation">Microsoft Bookings – Facilitating Impersonation | Cyberis Limited</a></li>
										
                    	<li><a href="https://trustedsec.com/blog/ekuwu-not-just-another-ad-cs-esc">TrustedSec | EKUwu: Not just another AD CS ESC</a></li>
										
                    	<li><a href="https://therecord.media/russia-blocks-thousands-of-websites-that-use-cloudflare-service">Russia’s internet watchdog blocks thousands of websites that use Cloudflare&#39;s privacy service</a></li>
										
                    	<li><a href="https://blog.torproject.org/defending-tor-mitigating-IP-spoofing/">Defending the Tor network: Mitigating IP spoofing against Tor | The Tor Project</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2024/11/law-enforcement-operation-takes-down-22000-malicious-ip-addresses-worldwide/">Law enforcement operation takes down 22,000 malicious IP addresses worldwide - Ars Technica</a></li>
										
                    	<li><a href="https://www.pm.gov.au/media/press-conference-parliament-house-canberra-31">Press Conference - Parliament House, Canberra | Prime Minister of Australia</a></li>
										
                    	<li><a href="https://cyberscoop.com/dhs-nominee-kristi-noem-cyber-grants-trump-admin/">DHS nominee Kristi Noem stood alone for rejecting department cyber grants to state, local governments | CyberScoop</a></li>
										
                    	<li><a href="https://bsky.app/profile/did:plc:xlqjvnxhociz3kwmvpxj6edm/post/3laprztdoqc2b">Patrick Gray: &quot;Allies will feel comfortable until these guys get fired in their first 100 days for opposing Trump’s proposed annexation of Iceland or something. People have forgotten… Trump is out of his gourd&quot; — Bluesky</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Why black box email security is dead</title>
            <pubDate>Mon, 11 Nov 2024 13:14:53 +1100</pubDate>
            <link>https://risky.biz/soapbox90/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox90/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox90.mp3" length="34746976" type="audio/mpeg" />
            <itunes:subtitle>Sublime Security co-founder Josh Kamdjou on building an email security platform from scratch... </itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2172</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of the Risky Business Soap Box we’re talking all about email security with Sublime Security co-founder Josh Kamdjou.

Email security is one of the oldest product categories in security, but as you’ll hear, Josh thinks the incumbents are just doing it wrong. He joins Risky Business host Patrick Gray for this interview about Sublime’s origin story and its new approach to email security.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of the Risky Business Soap Box we’re talking all about email security with Sublime Security co-founder Josh Kamdjou.</p>

<p>Email security is one of the oldest product categories in security, but as you’ll hear, Josh thinks the incumbents are just doing it wrong. He joins Risky Business host Patrick Gray for this interview about Sublime’s origin story and its new approach to email security.</p>

                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #769 -- Sophos drops implants on Chinese exploit devs</title>
            <pubDate>Wed, 06 Nov 2024 15:47:43 +1100</pubDate>
            <link>https://risky.biz/RB769/</link>
            <guid isPermaLink="true">https://risky.biz/RB769/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB769.mp3" length="54582177" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Okta&apos;s password boo boo...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3411</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  Sophos drops implants on Chinese firewall exploit devs
  Microsoft workshops better just-in-time Windows admin privileges
  Snowflake hacker arrested in Canada
  Okta has a fun, but not very impactful auth-bypass bug
  Russians bring dumb-but-smart RDP client attacks
  And much, much more.


Special guest Sophos CISO Ross McKerchar joined us to talk about its “hacking back” campaign. The full interview is
available on Youtube for those who want to really live vicariously through Sophos doing what every vendor probably wants to do.

This week’s episode is sponsored by attack surface mapping vendor runZero. Founder and CEO HD Moore joins to talk about marrying up the outside and inside views of your network.

You can also watch this episode on Youtube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>Sophos drops implants on Chinese firewall exploit devs</li>
  <li>Microsoft workshops better just-in-time Windows admin privileges</li>
  <li>Snowflake hacker arrested in Canada</li>
  <li>Okta has a fun, but not very impactful auth-bypass bug</li>
  <li>Russians bring dumb-but-smart RDP client attacks</li>
  <li>And much, much more.</li>
</ul>

<p>Special guest Sophos CISO Ross McKerchar joined us to talk about its “hacking back” campaign. The full interview is
<a href="https://www.youtube.com/watch?v=QDh5-ZL3nis">available on Youtube</a> for those who want to really live vicariously through Sophos doing what every vendor probably wants to do.</p>

<p>This week’s episode is sponsored by attack surface mapping vendor runZero. Founder and CEO HD Moore joins to talk about marrying up the outside and inside views of your network.</p>

<p>You can also watch this episode <a href="https://www.youtube.com/watch?v=GpQu3mza8PM">on Youtube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://trust.okta.com/security-advisories/okta-ad-ldap-delegated-authentication-username/">Okta AD/LDAP Delegated Authentication - Username Above 52 Characters Security Advisory</a></li>
										
                    	<li><a href="https://security.stackexchange.com/questions/39849/does-bcrypt-have-a-maximum-password-length">Does bcrypt have a maximum password length? - Information Security Stack Exchange</a></li>
										
                    	<li><a href="https://call4cloud.nl/local-administrator-protection-privilege-protection/">Local Administrator Protection | Privilege Protection</a></li>
										
                    	<li><a href="https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/">Inside Sophos&#39; 5-Year War With the Chinese Hackers Hijacking Its Devices | WIRED</a></li>
										
                    	<li><a href="https://bishopfox.com/blog/a-look-at-fortijump-cve-2024-47575">A Deeper Look at FortiJump (FortiManager CVE-2024-47575) | Bishop Fox</a></li>
										
                    	<li><a href="https://www.wired.com/story/connor-moucka-snowflake-hack-arrest-extradition/">Man Arrested for Snowflake Hacking Spree Faces US Extradition | WIRED</a></li>
										
                    	<li><a href="https://therecord.media/google-llm-sqlite-vulnerability-artificial-intelligence">Google uses large language model to discover real-world vulnerability</a></li>
										
                    	<li><a href="https://www.greynoise.io/press/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai">GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI</a></li>
										
                    	<li><a href="https://arstechnica.com/information-technology/2024/11/microsoft-warns-of-8000-strong-botnet-used-in-password-spraying-attacks/#gsc.tab=0">Thousands of hacked TP-Link routers used in yearslong account takeover attacks - Ars Technica</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisa-threat-group-spearphishing/731737/">CISA warns of foreign threat group launching spearphishing campaign using malicious RDP files | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/canada-20-government-agencies-hacked-china-last-four-years">Chinese state-backed hackers breached 20 Canadian government networks over four years, agency warns</a></li>
										
                    	<li><a href="https://www.indiatoday.in/world/canada-news/story/canadian-officials-confess-leaking-intelligence-sensitive-information-against-india-washington-post-2625379-2024-10-30">India-Canada row: Canadian officials confess to leaking &#39;intel&#39; against India to Washington Post - India Today</a></li>
										
                    	<li><a href="https://indianexpress.com/article/world/canada-india-cyberthreat-adversary-list-9650375/">Amid diplomatic row, Canada names India in ‘cyberthreat adversary’ list, accuses it of ‘likely spying’ | World News - The Indian Express</a></li>
										
                    	<li><a href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/">The Untold Story of Trump&#39;s Failed Attempt to Overthrow Venezuela&#39;s President | WIRED</a></li>
										
                    	<li><a href="https://news.risky.biz/risky-biz-news-the-mystery-at-mango-park-and-the-cambodian-governments-shady-reaction/">Risky Biz News: The mystery at Mango Park</a></li>
										
                    	<li><a href="https://therecord.media/north-korean-hackers-collaborate-with-play-ransomware">North Korean hackers seen collaborating with Play ransomware group, researchers say</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #768 -- CSRB will investigate China&apos;s Wiretap Hacks</title>
            <pubDate>Wed, 30 Oct 2024 14:32:59 +1100</pubDate>
            <link>https://risky.biz/RB768/</link>
            <guid isPermaLink="true">https://risky.biz/RB768/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB768.mp3" length="49549711" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Crypto thieves return stolen US government crypto-booty...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3097</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  CSRB to investigate China’s telco-wiretapping hacks
  Euro law enforcement takes down the Redline infostealer
  Someone steals Fed crypto… and then tries to quietly sneak it back in
  Russia sentences REvil guys to … jail? Really?
  Apple private cloud compute gets a proper bug bounty program
  And much, much more.


This week’s episode is sponsored by Material Security, who help navigate the mess of cloud productivity data security. Daniel Ayala - Chief Security and Trust Officer at Dotmatics - is a Material customer, and joins Pat and Material Security’s Rajan Kapoor to talk about how to wrangle securing data that ends up in corporate cloud email and file stores.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>CSRB to investigate China’s telco-wiretapping hacks</li>
  <li>Euro law enforcement takes down the Redline infostealer</li>
  <li>Someone steals Fed crypto… and then tries to quietly sneak it back in</li>
  <li>Russia sentences REvil guys to … jail? Really?</li>
  <li>Apple private cloud compute gets a proper bug bounty program</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by Material Security, who help navigate the mess of cloud productivity data security. Daniel Ayala - Chief Security and Trust Officer at Dotmatics - is a Material customer, and joins Pat and Material Security’s Rajan Kapoor to talk about how to wrangle securing data that ends up in corporate cloud email and file stores.</p>

<p>This episode is also available on <a href="https://youtu.be/wrFcfU1z_Qo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://infosec.exchange/@riskybusiness/113359448462584804">Apple 10 day certificates</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2024/10/27/chinese-hackers-cellphones-trump/">Chinese hackers said to have collected audio of American calls</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/national-security/2024/10/27/chinese-hackers-cellphones-trump/">U.S. Panel to Probe Cyber Failures in Massive Chinese Hack of Telecoms</a></li>
										
                    	<li><a href="https://techcrunch.com/2024/10/29/how-a-series-of-opsec-failures-led-us-authorities-to-the-alleged-developer-of-the-redline-password-stealing-malware/">How a series of opsec failures led US authorities to the alleged developer of the Redline password-stealing malware</a></li>
										
                    	<li><a href="https://www.operation-magnus.com/">Operation Magnus</a></li>
										
                    	<li><a href="https://decrypt.co/288296/hacker-returns-millions-drained-us-government-crypto-wallet">Hacker Returns $19.3 Million to Drained US Government Crypto Wallet</a></li>
										
                    	<li><a href="https://www.wired.com/story/meet-zachxbt-243-million-crypto-theft/">Meet ZachXBT, the Masked Vigilante Tracking Down Billions in Crypto Scams and Thefts | WIRED</a></li>
										
                    	<li><a href="https://www.jpost.com/breaking-news/article-826414">Radar systems in Iran breached prior to Israel&#39;s Saturday counter-strike - report</a></li>
										
                    	<li><a href="https://www.cnbc.com/2024/10/25/delta-suit-against-crowdstrike-after-it-outage-caused-cancellations.html">Delta sues CrowdStrike after widespread IT outage that caused thousands of cancellations</a></li>
										
                    	<li><a href="https://www.cbc.ca/news/canada/canada-revenue-agency-taxpayer-accounts-hacked-1.7363440">Tens of thousands of taxpayer accounts hacked as CRA repeatedly paid out millions in bogus refunds</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-ceo-nadella-cut-pay-security/731070/">Microsoft CEO asked board to cut pay in connection with security overhaul | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://therecord.media/four-revil-ransomware-gang-members-sentenced-prison-russia">Four REvil members sentenced to more than four years in prison</a></li>
										
                    	<li><a href="https://therecord.media/russia-separate-linux-community-kernel-maintainers-delisted">Russia says it might build its own Linux community after removal of several kernel maintainers</a></li>
										
                    	<li><a href="https://therecord.media/nigerian-court-drops-charges-tigran-gambaryan-binance-executive">Nigerian court drops charges against detained Binance executive Tigran Gambaryan</a></li>
										
                    	<li><a href="https://techcrunch.com/2024/10/24/apple-will-pay-security-researchers-up-to-1-million-to-hack-its-private-ai-cloud/">Apple will pay security researchers up to $1 million to hack its private AI cloud | TechCrunch</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/ransomware-sonicwall-firewalls/731036/">SonicWall firewalls the common access point in spreading ransomware campaign | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/fortinet-zero-day-attack-spree/730894/">Fortinet zero-day attack spree hits at least 50 customers | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/cisco-exploited-cve-vpn/731216/">Cisco warns actively exploited CVE can lead to DoS attacks against VPN services | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/chinese-influence-operation-targets-us-down-ballot-races-microsoft-says-2024-10-23/">Chinese influence operation targets US down-ballot races, Microsoft says | Reuters</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/accused-iranian-hackers-successfully-peddle-stolen-trump-emails-2024-10-25/">Exclusive: Accused Iranian hackers successfully peddle stolen Trump emails | Reuters</a></li>
										
                    	<li><a href="https://www.nbcnews.com/politics/2024-election/viral-video-ripped-pennsylvania-ballots-fake-russian-made-intelligence-rcna177404">Viral video of ripped-up Pennsylvania ballots is fake and Russian-made, intelligence agencies say</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=sOab1RSBq20">Product Demo: Securing M365 and Google Workspace with Material Security</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Biz Soap Box: Thinkst Canary&apos;s decade of deception</title>
            <pubDate>Mon, 28 Oct 2024 13:36:08 +1100</pubDate>
            <link>https://risky.biz/soapbox89/</link>
            <guid isPermaLink="true">https://risky.biz/soapbox89/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/soapbox89.mp3" length="36418796" type="audio/mpeg" />
            <itunes:subtitle>A long chat with Thinkst&apos;s founder Haroon Meer...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2276</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Soap Box edition of the podcast Patrick Gray chats with Thinkst Canary founder Haroon Meer about his “decade of deception”, including:


  A history of Thinkst Canary including a recap of what they actually do
  A look at why they’re still really the only major player in the deception game
  A look at what companies like Microsoft are doing with deception
  Why security startups should have conference booths


                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Soap Box edition of the podcast Patrick Gray chats with Thinkst Canary founder Haroon Meer about his “decade of deception”, including:</p>

<ul>
  <li>A history of Thinkst Canary including a recap of what they actually do</li>
  <li>A look at why they’re still really the only major player in the deception game</li>
  <li>A look at what companies like Microsoft are doing with deception</li>
  <li>Why security startups should have conference booths</li>
</ul>

                
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #767 – SEC fines Check Point, Mimecast, Avaya and Unisys over hacks</title>
            <pubDate>Wed, 23 Oct 2024 13:40:07 +1100</pubDate>
            <link>https://risky.biz/RB767/</link>
            <guid isPermaLink="true">https://risky.biz/RB767/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB767.mp3" length="59871115" type="audio/mpeg" />
            <itunes:subtitle>PLUS: We gotta hand it to &apos;em. North Korea has game.</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3741</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:


  SEC fines tech firms for downplaying the Solarwinds hacks
  Anonymous Sudan still looks and quacks like a Russian duck
  Apple proposes max 10 day TLS certificate life
  Oopsie! Microsoft loses a bunch of cloud logs
  Veeam and Fortinet are bad and should feel bad
  North Koreans are good (at hacking)
  And much, much more.


This week’s episode is sponsored by Proofpoint. Chief Strategy Officer Ryan Kalember joins to talk about their work keeping up with prolific threat actor SocGholish.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:</p>

<ul>
  <li>SEC fines tech firms for downplaying the Solarwinds hacks</li>
  <li>Anonymous Sudan still looks and quacks like a Russian duck</li>
  <li>Apple proposes max 10 day TLS certificate life</li>
  <li>Oopsie! Microsoft loses a bunch of cloud logs</li>
  <li>Veeam and Fortinet are bad and should feel bad</li>
  <li>North Koreans are good (at hacking)</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by Proofpoint. Chief Strategy Officer Ryan Kalember joins to talk about their work keeping up with prolific threat actor SocGholish.</p>

<p>This episode is also available on <a href="https://youtu.be/C7DkZwPiqyI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/sec-fines-companies-solarwinds-disclosures">Four cyber companies fined for SolarWinds disclosure failures</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/technology/2024/10/16/sudanese-charged-cyberattack-gang/">U.S. charges Sudanese men with running powerful cyberattack-for-hire gang</a></li>
										
                    	<li><a href="https://www.wired.com/story/anonymous-sudan-ddos-indictment-takedown/">Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals | WIRED</a></li>
										
                    	<li><a href="https://news.risky.biz/risky-biz-news-the-feds-secretly-disrupted-anonymous-sudan-back-in-march/">Risky Biz News: Anonymous Sudan&#39;s Russia Links Are (Still) Obvious</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/microsoft-loss-security-log-data/730285/">Microsoft confirms partial loss of security log data on multiple platforms | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://news.risky.biz/risky-biz-news-apple-wants-to-reduce-lifespan-of-tls-certificates-to-only-10-days/">Risky Biz News: Apple wants to reduce the lifespan of TLS certificates to 10 days</a></li>
										
                    	<li><a href="https://www.404media.co/encrypted-chat-app-session-leaves-australia-after-visit-from-police-2/">Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police</a></li>
										
                    	<li><a href="https://therecord.media/crypto-platform-radiant-capital-50-million-stolen">Crypto platform Radiant Capital says $50 million in digital coins stolen following account compromises</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2024/10/north-korean-hackers-use-newly-discovered-linux-malware-to-raid-atms/">North Korean hackers use newly discovered Linux malware to raid ATMs - Ars Technica</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2024/10/brazil-arrests-usdod-hacker-in-fbi-infragard-breach/">Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach – Krebs on Security</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2024/10/how-alleged-sim-swap-and-hacked-x-account-drove-up-price-of-bitcoin-by-1k/">Here’s how SIM swap in alleged bitcoin pump-and-dump scheme worked - Ars Technica</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/veeam-critical-cve-exploits-ransomware/730570/">Critical Veeam CVE actively exploited in ransomware attacks | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2024/10/fortinet-stays-mum-on-critical-0-day-reportedly-under-active-exploitation/">FortiGate admins report active exploitation 0-day. Vendor isn’t talking. - Ars Technica</a></li>
										
                    	<li><a href="https://therecord.media/hackers-impersonate-eset-wiper-malware">Hackers reportedly impersonate cyber firm ESET to target organizations in Israel</a></li>
										
                    	<li><a href="https://therecord.media/north-korean-fake-it-workers-extorting-employers">The latest in North Korea’s fake IT worker scheme: Extorting the employers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Business #766 – China hacks America&apos;s lawful intercept systems</title>
            <pubDate>Wed, 16 Oct 2024 14:14:25 +1100</pubDate>
            <link>https://risky.biz/RB766/</link>
            <guid isPermaLink="true">https://risky.biz/RB766/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RB766.mp3" length="51803659" type="audio/mpeg" />
            <itunes:subtitle>PLUS: Microsoft&apos;s chart crimes...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>3237</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                On this week’s show Patrick Gray and Adam Boileau discuss the week’s infosec news, including:


  Chinese spooks all up in western telco lawful intercept
  Jerks ruin the Internet Archive’s day
  Microsoft drops a great report with a bad chart
  The feds make their own crypto currency and get it pumped
  Forti-, Palo- and Ivanti-fail
  And much, much more.


This week’s episode is sponsored by detection-as-code vendor Panther. Casey Hill, Panther’s Director Product Management joins to discuss why the old “just bung it all in a data lake and… ???… “ approach hasn’t worked out, and what smart teams do to handle their logs.

This episode is also available on [Youtube].(https://youtu.be/86zy6DcwtbE)

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>On this week’s show Patrick Gray and Adam Boileau discuss the week’s infosec news, including:</p>

<ul>
  <li>Chinese spooks all up in western telco lawful intercept</li>
  <li>Jerks ruin the Internet Archive’s day</li>
  <li>Microsoft drops a great report with a bad chart</li>
  <li>The feds make their own crypto currency and get it pumped</li>
  <li>Forti-, Palo- and Ivanti-fail</li>
  <li>And much, much more.</li>
</ul>

<p>This week’s episode is sponsored by detection-as-code vendor Panther. Casey Hill, Panther’s Director Product Management joins to discuss why the old “just bung it all in a data lake and… ???… “ approach hasn’t worked out, and what smart teams do to handle their logs.</p>

<p>This episode is also available on [Youtube].(https://youtu.be/86zy6DcwtbE)</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://archive.md/Jk9yj">White House forms emergency team to deal with China espionage hack - The Washington Post</a></li>
										
                    	<li><a href="https://therecord.media/internet-archive-data-breach-ddos-defacement">DDoS attacks on Internet Archive continue after data breach impacting 31 million</a></li>
										
                    	<li><a href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/Microsoft%20Digital%20Defense%20Report%202024%20%281%29.pdf">Microsoft Digital Defense Report 2024</a></li>
										
                    	<li><a href="https://cyberscoop.com/ransomware-encryption-down-attacks-up-nation-state-crime/">Ransomware encryption down amid surge of attacks, Microsoft says | CyberScoop</a></li>
										
                    	<li><a href="https://therecord.media/russian-court-websites-down-attack-claimed-pro-ukraine-group">Russian court websites down after breach claimed by pro-Ukraine hackers</a></li>
										
                    	<li><a href="https://therecord.media/illia-vitiuk-ukraine-investigation-anti-corruption-agency">Ukrainian anti-corruption agency reportedly finds no violations in disclosures of top cyber official</a></li>
										
                    	<li><a href="https://www.reuters.com/world/us/trump-campaign-turns-secure-hardware-after-hacking-incident-2024-10-11/">Trump campaign turns to secure hardware after hacking incident | Reuters</a></li>
										
                    	<li><a href="https://www.ft.com/content/fca21775-f94d-4af4-b778-c1b72cc119f4">FBI creates its own crypto token to nab suspects in alleged fraud scheme</a></li>
										
                    	<li><a href="https://www.justice.gov/usao-ma/pr/eighteen-individuals-and-entities-charged-international-operation-targeting-widespread">District of Massachusetts | Eighteen Individuals and Entities Charged in International Operation Targeting Widespread Fraud and Manipulation in the Cryptocurrency Markets | United States Department of Justice</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/critical-cve-fortinet-exploited/729736/">Critical CVE in 4 Fortinet products actively exploited | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secure-appliance-in-2024/">Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024</a></li>
										
                    	<li><a href="https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/">Palo Alto Expedition: From N-Day to Full Compromise</a></li>
										
                    	<li><a href="https://www.cybersecuritydive.com/news/ivanti-endpoint-manager-hackers-attack/728814/">Ivanti up against another attack spree as hackers target its endpoint manager | Cybersecurity Dive</a></li>
										
                    	<li><a href="https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52">1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies · GitHub</a></li>
										
                    	<li><a href="https://therecord.media/recently-patched-firefox-bug-being-used-against-tor-browser-users">Recently-patched Firefox bug exploited against Tor browser users</a></li>
										
                    	<li><a href="https://arstechnica.com/security/2024/10/two-never-before-seen-tools-from-same-group-infect-air-gapped-devices/">Two never-before-seen tools, from same group, infect air-gapped devices - Ars Technica</a></li>
										
                    	<li><a href="https://krebsonsecurity.com/2024/10/a-single-cloud-compromise-can-feed-an-army-of-ai-sex-bots/">A Single Cloud Compromise Can Feed an Army of AI Sex Bots – Krebs on Security</a></li>
										
                    	<li><a href="https://www.washingtonpost.com/opinions/interactive/2024/cyber-sleuth/">Opinion | The Cyber Sleuth - Washington Post</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Snake Oilers: Sandfly Security, Permiso and Wiz</title>
            <pubDate>Wed, 02 Oct 2024 09:40:57 +1000</pubDate>
            <link>https://risky.biz/snakeoilers20pt2/</link>
            <guid isPermaLink="true">https://risky.biz/snakeoilers20pt2/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/snakeoilers20pt2.mp3" length="38760264" type="audio/mpeg" />
            <itunes:subtitle>Linux security, more identity security and Wiz moves on code scanning...</itunes:subtitle>
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2422</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Snake Oilers we hear pitches from three security vendors:


  Sandfly Security: An agentless Linux security platform that actually sounds very cool
  Permiso: An identity security platform founded by ex FireEye folks
  Wiz: The cloud security giant is getting in on code security scanning


You can watch this edition of Snake Oilers on YouTube here.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Snake Oilers we hear pitches from three security vendors:</p>

<ul>
  <li><a href="https://sandflysecurity.com/">Sandfly Security</a>: An agentless Linux security platform that actually sounds very cool</li>
  <li><a href="https://permiso.io/">Permiso</a>: An identity security platform founded by ex FireEye folks</li>
  <li><a href="https://wiz.io/rb">Wiz</a>: The cloud security giant is getting in on code security scanning</li>
</ul>

<p>You can watch this edition of Snake Oilers on YouTube <a href="https://youtu.be/hVlqUjF-sms">here</a>.</p>

                
                
                ]]>
            </description>
        </item>
            
        
    </channel>
</rss>
