<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xml:base="https://risky.biz/feeds/risky-business-news" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"  xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Risky Bulletin</title>
        <description>Regular cybersecurity news updates from the Risky Business team...</description>
        <link>https://risky.biz/</link>
        <copyright>Copyright Risky Business Media 2007-2026</copyright>
        <language>en</language>
        <atom:link href="https://risky.biz/feeds/risky-business-news" rel="self" type="application/rss+xml" />
        <pubDate>Fri, 10 Apr 2026 15:47:01 +1000</pubDate>
        <lastBuildDate>Fri, 10 Apr 2026 15:47:01 +1000</lastBuildDate>
        <itunes:image href="https://risky.biz/static/img/rb-feed-bulletin.png" />
        <itunes:author>Risky Business Media</itunes:author>
	<itunes:category text="News"> <itunes:category text="Tech News" /> </itunes:category> <itunes:category text="Technology"/>
        <itunes:owner>
            <itunes:name>Risky.biz</itunes:name>
            <itunes:email>editorial@risky.biz</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
        <generator>Jekyll v4.2.2</generator>
        
        
        
            
        
        <item>
            <title>Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs</title>
            <pubDate>Fri, 10 Apr 2026 15:09:41 +1000</pubDate>
            <link>https://risky.biz/RBNEWS549/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS549/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS549.mp3" length="10186012" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>409</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The FBI extracted Signal chats from iPhone notifications logs, Los Angeles police data was leaked online, a former Meta employee is under investigation for downloading private photos, and an Adobe Reader zero-day is being exploited in the wild.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The FBI extracted Signal chats from iPhone notifications logs, Los Angeles police data was leaked online, a former Meta employee is under investigation for downloading private photos, and an Adobe Reader zero-day is being exploited in the wild.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-fbi-extracted-signal-chats-from-an-iphones-notifications-log/">Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: American diplomats to fight foreign propaganda... on X</title>
            <pubDate>Thu, 09 Apr 2026 11:34:40 +1000</pubDate>
            <link>https://risky.biz/SRB162/</link>
            <guid isPermaLink="true">https://risky.biz/SRB162/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB162.mp3" length="18550178" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1157</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the State Department taking to X to counter foreign propaganda. US Secretary of State Marco Rubio dismantled the State Department’s counter-propaganda office when he took charge, but it turns out that giving adversary states free reign online is a bad idea.

They also discuss how America’s lawful intercept systems are high value targets for Chinese hackers. It’s a big deal that part of the FBI’s lawful intercept system has been breached and it is high time that the security of these systems was reviewed.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the State Department taking to X to counter foreign propaganda. US Secretary of State Marco Rubio dismantled the State Department’s counter-propaganda office when he took charge, but it turns out that giving adversary states free reign online is a bad idea.</p>

<p>They also discuss how America’s lawful intercept systems are high value targets for Chinese hackers. It’s a big deal that part of the FBI’s lawful intercept system has been breached and it is high time that the security of these systems was reviewed.</p>

<p>This episode is also available on <a href="https://youtu.be/oO0v1kry_BU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cybercrime losses passed $20 billion last year</title>
            <pubDate>Wed, 08 Apr 2026 15:19:51 +1000</pubDate>
            <link>https://risky.biz/RBNEWS548/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS548/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS548.mp3" length="8250586" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>492</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Cybercrime losses surpassed $20 billion last year, authorities disrupt a Russian router botnet that intercepted email logins, Iran hacks PLCs across the US, and exploitation hits ComfyUI and Flowise-AI-servers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Cybercrime losses surpassed $20 billion last year, authorities disrupt a Russian router botnet that intercepted email logins, Iran hacks PLCs across the US, and exploitation hits ComfyUI and Flowise-AI-servers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-cybercrime-losses-passed-20-billion-last-year/">Risky Bulletin: Cybercrime losses passed $20 billion last year</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Make cyber, not war</title>
            <pubDate>Tue, 07 Apr 2026 06:10:19 +1000</pubDate>
            <link>https://risky.biz/BTN161/</link>
            <guid isPermaLink="true">https://risky.biz/BTN161/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN161.mp3" length="25317877" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1581</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how Iran’s cyber forces have been used during the ongoing war so far.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how Iran’s cyber forces have been used during the ongoing war so far.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.ft.com/content/bf998c69-ab46-4fa3-aae4-8f18f7387836">The Financial Times on the plan to kill Ali Khamenei</a></li>
										
                    	<li><a href="https://www.israelnationalnews.com/news/424483">Israel National News, 50 companies wiped</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: New Cambodian law will put scam compound operators in prison for life</title>
            <pubDate>Mon, 06 Apr 2026 12:58:48 +1000</pubDate>
            <link>https://risky.biz/RBNEWS547/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS547/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS547.mp3" length="11209694" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>452</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Cambodia prepares harsher prison terms for scam compound operators,
an Italian museum moves valuables into a bank vault after a cyberattack, hackers exploit a bug in Vite-based apps and sites, and a supply chain attack hits an e-learning platform.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Cambodia prepares harsher prison terms for scam compound operators,
an Italian museum moves valuables into a bank vault after a cyberattack, hackers exploit a bug in Vite-based apps and sites, and a supply chain attack hits an e-learning platform.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-new-cambodian-law-will-put-scam-compound-operators-in-prison-for-life/">Risky Bulletin: New Cambodian law will put scam compound operators in prison for life</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Application allowlisting, but not as you know it</title>
            <pubDate>Mon, 06 Apr 2026 05:26:21 +1000</pubDate>
            <link>https://risky.biz/RBNEWSSI122/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI122/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI122.mp3" length="24740628" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1030</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, James Wilson chats with Airlock Digital co-founders, David Cottingham and Daniel Schell, about how they’re moving up the stack from file-based allowlisting to application-based allowlisting. David and Daniel explain how they’re making a seamless and quite logical move into application allowlisting, but with a new take on the technique.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, James Wilson chats with Airlock Digital co-founders, David Cottingham and Daniel Schell, about how they’re moving up the stack from file-based allowlisting to application-based allowlisting. David and Daniel explain how they’re making a seamless and quite logical move into application allowlisting, but with a new take on the technique.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia will revoke licenses for unruly ISPs</title>
            <pubDate>Fri, 03 Apr 2026 11:12:55 +1100</pubDate>
            <link>https://risky.biz/RBNEWS546/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS546/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS546.mp3" length="8275527" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>495</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia wants to revoke small ISP licenses, a cyberattack has disrupted access to US newspaper archives, Node.js pauses bug bounty program after its funding lapses and Apple backports patches for DarkSword.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia wants to revoke small ISP licenses, a cyberattack has disrupted access to US newspaper archives, Node.js pauses bug bounty program after its funding lapses and Apple backports patches for DarkSword.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russia-will-revoke-licenses-for-unruly-isps/">Risky Bulletin: Russia will revoke licenses for unruly ISPs</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: America&apos;s next top (cyber) model</title>
            <pubDate>Thu, 02 Apr 2026 14:02:48 +1100</pubDate>
            <link>https://risky.biz/SRB161/</link>
            <guid isPermaLink="true">https://risky.biz/SRB161/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB161.mp3" length="18550376" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1158</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about how incredibly good AI models have gotten at finding and exploiting vulnerabilities. That will upend the cyber security industry and it has implications for state cyber organisations such as NSA and Cyber Command.

They also discuss how broadband wireless communications links are critical in the war in Ukraine. After losing access to Starlink, Russian forces are doubling down on using equipment from American company Ubiquiti.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about how incredibly good AI models have gotten at finding and exploiting vulnerabilities. That will upend the cyber security industry and it has implications for state cyber organisations such as NSA and Cyber Command.</p>

<p>They also discuss how broadband wireless communications links are critical in the war in Ukraine. After losing access to Starlink, Russian forces are doubling down on using equipment from American company Ubiquiti.</p>

<p>This episode is also available on <a href="https://youtu.be/hyj2XrwlsWc">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Iranian password sprays came first, then came the missiles</title>
            <pubDate>Wed, 01 Apr 2026 15:45:10 +1100</pubDate>
            <link>https://risky.biz/RBNEWS545/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS545/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS545.mp3" length="12771739" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>517</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Iranian password spraying targets Israel ahead of missile strikes, a major npm package gets hacked, Iran says it will bomb US tech firms in the Middle East, and Flint24 hackers are sentenced to prison in Russia.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Iranian password spraying targets Israel ahead of missile strikes, a major npm package gets hacked, Iran says it will bomb US tech firms in the Middle East, and Flint24 hackers are sentenced to prison in Russia.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-iranian-password-sprays-came-first-then-came-the-missiles">Risky Bulletin: Iranian password sprays came first, then came the missiles</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: More secure but less safe</title>
            <pubDate>Tue, 31 Mar 2026 06:57:38 +1100</pubDate>
            <link>https://risky.biz/BTN160/</link>
            <guid isPermaLink="true">https://risky.biz/BTN160/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN160.mp3" length="25391995" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1586</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about hacking and scams. While hacking is disappearing as a threat for most people, it is a new golden age for scammers. Even Tom has been scammed!

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about hacking and scams. While hacking is disappearing as a threat for most people, it is a new golden age for scammers. Even Tom has been scammed!</p>

<p>This episode is also available on <a href="https://youtu.be/QBlv7wWPzXs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.hachettebookgroup.com/titles/matt-potter/we-are-all-targets/9780306925733/?lens=grand-central-publishing">We Are All Targets, How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos</a></li>
										
                    	<li><a href="https://x.com/smilingerik/status/1961439631653617983?s=61">The $1.25 million scam</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Apple adds ClickFix warning to macOS terminal</title>
            <pubDate>Mon, 30 Mar 2026 14:15:01 +1100</pubDate>
            <link>https://risky.biz/RBNEWS544/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS544/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS544.mp3" length="6701409" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>417</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Apple adds a ClickFix warning to macOS, Handala hacks Kash Patel’s personal email, Balancer crypto platform shuts down after last year’s hack, and the EU proposes a ban on AI nudify apps.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Apple adds a ClickFix warning to macOS, Handala hacks Kash Patel’s personal email, Balancer crypto platform shuts down after last year’s hack, and the EU proposes a ban on AI nudify apps.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-apple-adds-clickfix-warning-to-macos-terminal/">Risky Bulletin: Apple adds ClickFix warning to macOS terminal</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: AI is making old school prevention cool again</title>
            <pubDate>Mon, 30 Mar 2026 06:17:38 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI121/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI121/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI121.mp3" length="15662730" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>977</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, James Wilson chats with Adam Pointon, CEO of Knocknoc, about how AI is making old school security controls and paradigms like deny-by-default cool again.

Today, patches are being reversed by AI systems into exploits in a matter of hours. The days of being able to rely on timely patching as a primary control are over. James talks to Adam about this new reality and how Knocknoc can help.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, James Wilson chats with Adam Pointon, CEO of Knocknoc, about how AI is making old school security controls and paradigms like deny-by-default cool again.</p>

<p>Today, patches are being reversed by AI systems into exploits in a matter of hours. The days of being able to rely on timely patching as a primary control are over. James talks to Adam about this new reality and how Knocknoc can help.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network</title>
            <pubDate>Fri, 27 Mar 2026 13:51:04 +1100</pubDate>
            <link>https://risky.biz/RBNEWS543/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS543/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS543.mp3" length="6627985" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>413</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia will use a custom crypto-algorithm for its 5G network, the Hungarian opposition accuses the government of using spyware, Kaspersky says it tied Coruna to the “Operation Triangulation” attacks, and malware was deployed on thousands of Luxembourg government phones.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia will use a custom crypto-algorithm for its 5G network, the Hungarian opposition accuses the government of using spyware, Kaspersky says it tied Coruna to the “Operation Triangulation” attacks, and malware was deployed on thousands of Luxembourg government phones.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russia-to-use-custom-crypto-algorithm-for-its-5g-network/">Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Why get a warrant when you have Kash?</title>
            <pubDate>Thu, 26 Mar 2026 13:07:57 +1100</pubDate>
            <link>https://risky.biz/SRB160/</link>
            <guid isPermaLink="true">https://risky.biz/SRB160/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB160.mp3" length="20569846" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1272</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about FBI Director Kash Patel admitting to Congress that the Bureau is buying American’s location data and using it to generate valuable intelligence. That’s concerning, because commercially available information can be used in tremendously invasive ways and the FBI can buy it without needing a warrant.

They also discuss the FCC’s surprising move to ban foreign-made consumer routers. It’s not about security, it is just about reshoring manufacturing.

And finally they discuss the Trump administration’s plan for unleashing the private sector.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about FBI Director Kash Patel admitting to Congress that the Bureau is buying American’s location data and using it to generate valuable intelligence. That’s concerning, because commercially available information can be used in tremendously invasive ways and the FBI can buy it without needing a warrant.</p>

<p>They also discuss the FCC’s surprising move to ban foreign-made consumer routers. It’s not about security, it is just about reshoring manufacturing.</p>

<p>And finally they discuss the Trump administration’s plan for unleashing the private sector.</p>

<p>This episode is also available on <a href="https://youtu.be/0WSdjDSjGrs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: The CEO of Intellexa is big mad at Greece</title>
            <pubDate>Wed, 25 Mar 2026 14:09:30 +1100</pubDate>
            <link>https://risky.biz/RBNEWS542/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS542/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS542.mp3" length="6345533" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>395</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Intellexa’s CEO is angry with Greek authorities, the FTC bans new foreign-made routers, Google launches a threat disruption unit, and German police warned companies about software bugs… in the middle of the night.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Intellexa’s CEO is angry with Greek authorities, the FTC bans new foreign-made routers, Google launches a threat disruption unit, and German police warned companies about software bugs… in the middle of the night.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-the-intellexa-ceo-is-pissed/">Risky Bulletin: The Intellexa CEO is pissed!!!</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Its raining iOS exploit kits!</title>
            <pubDate>Mon, 23 Mar 2026 19:08:21 +1100</pubDate>
            <link>https://risky.biz/BTN159/</link>
            <guid isPermaLink="true">https://risky.biz/BTN159/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN159.mp3" length="22741247" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1420</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how Google just keeps on finding iOS exploit kits. Is iPhone security busted? And why are Russian state hackers after crypto?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how Google just keeps on finding iOS exploit kits. Is iPhone security busted? And why are Russian state hackers after crypto?</p>

<p>This episode is also available on <a href="https://youtu.be/0R-XMJnDw-I">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Google on Coruna</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">Google on DarkSword</a></li>
										
                    	<li><a href="https://iverify.io/blog/darksword-ios-exploit-kit-explained">iVerify on DarkSword</a></li>
										
                    	<li><a href="https://www.lookout.com/threat-intelligence/article/darksword">Lookout on DarkSword</a></li>
										
                    	<li><a href="https://risky.biz/RBFEATURES5/">Coruna deep dive</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia&apos;s Signal phishing nets thousands of accounts</title>
            <pubDate>Mon, 23 Mar 2026 14:45:11 +1100</pubDate>
            <link>https://risky.biz/RBNEWS541/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS541/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS541.mp3" length="7101227" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>421</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russian intelligence services compromised thousands of Signal accounts, the Trivy vulnerability scanner is abused in a supply chain attack, Oracle issues an out-of-band patch for its Fusion Middleware, and the FBI takes down the Aisuru and Kimwolf botnets.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russian intelligence services compromised thousands of Signal accounts, the Trivy vulnerability scanner is abused in a supply chain attack, Oracle issues an out-of-band patch for its Fusion Middleware, and the FBI takes down the Aisuru and Kimwolf botnets.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-github-is-starting-to-have-a-real-malware-problem/">Risky Bulletin: GitHub is starting to have a real malware problem</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: What is Extended Identity Access Management?</title>
            <pubDate>Mon, 23 Mar 2026 06:58:22 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI120/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI120/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI120.mp3" length="20473628" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>639</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, Casey Ellis chats to Fletcher Heisler, founder and CEO of open source identity provider, Authentik. They chat about Extended Identity Access Management (XIAM), the company’s new acronym that has been seven years in the making.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, Casey Ellis chats to Fletcher Heisler, founder and CEO of open source identity provider, Authentik. They chat about Extended Identity Access Management (XIAM), the company’s new acronym that has been seven years in the making.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Second iOS hacking framework found in the wild</title>
            <pubDate>Fri, 20 Mar 2026 13:12:16 +1100</pubDate>
            <link>https://risky.biz/RBNEWS540/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS540/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS540.mp3" length="7095372" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>421</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A second iOS hacking framework has been found in the wild, Belgium launches its own government communications app, AWS kills S3 bucketsquatting and a cyberattack cripples car breathalyzers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A second iOS hacking framework has been found in the wild, Belgium launches its own government communications app, AWS kills S3 bucketsquatting and a cyberattack cripples car breathalyzers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-aws-kills-bucketsquatting/">Risky Bulletin: AWS kills bucketsquatting</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Successful war leaves Iran with one option, its cyber forces</title>
            <pubDate>Thu, 19 Mar 2026 12:14:02 +1100</pubDate>
            <link>https://risky.biz/SRB159/</link>
            <guid isPermaLink="true">https://risky.biz/SRB159/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB159.mp3" length="18621336" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1151</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about how successfully achieving America’s war goals could force Iran to double down on cyber power. It’s resilient to bombing and is the cheapest, quickest way for the regime to get some wins post-war.

They also discuss Meta stepping back from end-to-end encryption on Instagram’s direct messages. There is a time and place for E2EE messages, so good riddance.

Finally, they discuss the one weird trick President Trump uses to make his smartphone conversations useless for foreign intelligence services.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about how successfully achieving America’s war goals could force Iran to double down on cyber power. It’s resilient to bombing and is the cheapest, quickest way for the regime to get some wins post-war.</p>

<p>They also discuss Meta stepping back from end-to-end encryption on Instagram’s direct messages. There is a time and place for E2EE messages, so good riddance.</p>

<p>Finally, they discuss the one weird trick President Trump uses to make his smartphone conversations useless for foreign intelligence services.</p>

<p>This episode is also available on <a href="https://youtu.be/uCB6hrol244">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: EU finally imposes more cyber sanctions</title>
            <pubDate>Wed, 18 Mar 2026 12:39:47 +1100</pubDate>
            <link>https://risky.biz/RBNEWS539/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS539/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS539.mp3" length="6684633" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>387</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The EU imposes cyber sanctions, an Iranian cyber chief was killed by US-Israeli strikes, the UK fixes a major bug in its company registry, and a US man phishes celebrity athletes while on home detention… for phishing.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The EU imposes cyber sanctions, an Iranian cyber chief was killed by US-Israeli strikes, the UK fixes a major bug in its company registry, and a US man phishes celebrity athletes while on home detention… for phishing.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-eu-finally-imposes-more-cyber-sanctions/">Risky Bulletin: EU finally imposes more cyber sanctions</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Unleashing Iran&apos;s hackers </title>
            <pubDate>Tue, 17 Mar 2026 08:27:49 +1100</pubDate>
            <link>https://risky.biz/BTN158/</link>
            <guid isPermaLink="true">https://risky.biz/BTN158/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN158.mp3" length="26590076" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1661</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how bombing Iran changes incentives for Iranian hacker groups. Destroying other ways that Iran might project power could force it to double down on cyber capabilities.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how bombing Iran changes incentives for Iranian hacker groups. Destroying other ways that Iran might project power could force it to double down on cyber capabilities.</p>

<p>This episode is also available on <a href="https://youtu.be/pN1duJyrhLs">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.zetter-zeroday.com/r/f1bb1d17">Zetter Zero Day on the Stryker hack</a></li>
										
                    	<li><a href="https://risky.biz/BTN148/">BTN on the evolution of Iranian hackers with Hamid Kashfi</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Meta disrupts Mexican cartels</title>
            <pubDate>Mon, 16 Mar 2026 13:58:40 +1100</pubDate>
            <link>https://risky.biz/RBNEWS538/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS538/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS538.mp3" length="6310303" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>372</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Meta suspends Mexican cartel accounts, multiple vulnerabilities have been found in Linux AppArmour,
Instagram will disable support for end-to-end encrypted messaging and a supply chain attack hits AppsFlyer.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Meta suspends Mexican cartel accounts, multiple vulnerabilities have been found in Linux AppArmour,
Instagram will disable support for end-to-end encrypted messaging and a supply chain attack hits AppsFlyer.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/risky-bulletin-meta-disrupts-mexican-cartels/">Risky Bulletin: Meta disrupts Mexican cartels</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Sublime Security on Zoom attacks</title>
            <pubDate>Mon, 16 Mar 2026 06:11:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI119/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI119/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI119.mp3" length="11403086" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>857</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsor interview, Catalin Cimpanu talks with Alex Orleans, Head of Threat Intelligence at Sublime Security, about the increase in email attacks leveraging Zoom invites and other video conferencing tools.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsor interview, Catalin Cimpanu talks with Alex Orleans, Head of Threat Intelligence at Sublime Security, about the increase in email attacks leveraging Zoom invites and other video conferencing tools.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://sublime.security/blog/key-findings-from-the-2026-sublime-email-threat-research-report/">Key findings from the 2026 Sublime Email Threat Research Report</a></li>
										
                    	<li><a href="https://sublime.security/blog/scammers-actively-targeting-real-estate-agents-with-remote-access-attacks/">Scammers actively targeting real estate agents with remote access attacks</a></li>
										
                    	<li><a href="https://sublime.security/blog/fake-google-meet-invitation-fake-microsoft-store-real-malware-attack/">Fake Google Meet invitation, fake Microsoft Store, real malware attack</a></li>
										
                    	<li><a href="">Alex Orleans on LinkedIn</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Another residential proxy provider falls</title>
            <pubDate>Fri, 13 Mar 2026 12:34:38 +1100</pubDate>
            <link>https://risky.biz/RBNEWS537/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS537/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS537.mp3" length="7859249" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>460</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Authorities take down a residential proxy service, Iranian hackers wipe the network of a US medical device maker, Apple patches unsupported iOS against Coruna, and CISA asks for Cisco SD-WAN device logs.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Authorities take down a residential proxy service, Iranian hackers wipe the network of a US medical device maker, Apple patches unsupported iOS against Coruna, and CISA asks for Cisco SD-WAN device logs.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-another-residential-proxy-provider-falls-as-authorities-continue-crackdowns/">Risky Bulletin: Another residential proxy provider falls as authorities continue crackdowns</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: President Trump&apos;s best ever cyber strategy</title>
            <pubDate>Thu, 12 Mar 2026 13:55:40 +1100</pubDate>
            <link>https://risky.biz/SRB158/</link>
            <guid isPermaLink="true">https://risky.biz/SRB158/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB158.mp3" length="18260362" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1128</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the newly released Trump Cyber Strategy for America. The ideas in it are fine and occasionally even game-changing, but many of its goals have been undercut by the administration’s actions to date.

They also discuss the Coruna exploit kit, which is now known to have leaked from a US defence contractor. Exploits are so valuable that it is unrealistic to expect they can be kept secret.

This episode is also available on Youtube.


                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the newly released Trump Cyber Strategy for America. The ideas in it are fine and occasionally even game-changing, but many of its goals have been undercut by the administration’s actions to date.</p>

<p>They also discuss the Coruna exploit kit, which is now known to have leaked from a US defence contractor. Exploits are so valuable that it is unrealistic to expect they can be kept secret.</p>

<p>This episode is also available on <a href="https://youtu.be/Arg6CINsbCQ">Youtube</a>.</p>


                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Gen. Joshua Rudd confirmed as next CyberCom and NSA head</title>
            <pubDate>Wed, 11 Mar 2026 09:50:44 +1100</pubDate>
            <link>https://risky.biz/RBNEWS536/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS536/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS536.mp3" length="6883293" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>399</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The Senate confirms a new CyberCom and NSA chief, the US will establish an inter-agency cyber unit, the UK’s Online Crime Centre will launch in April, and the Coruna iOS hacking kit was the work of L3Harris.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The Senate confirms a new CyberCom and NSA chief, the US will establish an inter-agency cyber unit, the UK’s Online Crime Centre will launch in April, and the Coruna iOS hacking kit was the work of L3Harris.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-gen-joshua-rudd-confirmed-as-next-cybercom-and-nsa-head/">Risky Bulletin: Gen. Joshua Rudd confirmed as next CyberCom and NSA head</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: An internet blackout won&apos;t stop NSA in Iran</title>
            <pubDate>Tue, 10 Mar 2026 06:36:38 +1100</pubDate>
            <link>https://risky.biz/BTN157/</link>
            <guid isPermaLink="true">https://risky.biz/BTN157/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN157.mp3" length="24949261" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1558</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about why an internet shutdown won’t stop US cyber operations in Iran.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about why an internet shutdown won’t stop US cyber operations in Iran.</p>

<p>This episode is also available on <a href="https://youtu.be/RZHiQDZzlpk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/srsly-risky-biz-the-four-hour-cyber-war-on-iran/">Srsly Risky Biz: The Four Hour Cyber War on Iran</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/The_Thing_(listening_device)">The Thing listening device</a></li>
										
                    	<li><a href="https://www.cryptomuseum.com/covert/bugs/selectric/">IBM Selectric bug</a></li>
										
                    	<li><a href="https://www.yahoo.com/news/cias-communications-suffered-catastrophic-compromise-started-iran-090018710.html">CIA compromise in Iran</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime</title>
            <pubDate>Mon, 09 Mar 2026 12:13:44 +1100</pubDate>
            <link>https://risky.biz/RBNEWS535/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS535/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS535.mp3" length="8863753" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>523</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                US federal agencies told to crack down on scams and cybercrime, the White House releases its new Cyber Strategy, suspected Chinese hackers breach the FBI’s wiretap network, and Romania’s largest meat exporter is insolvent after a ransomware attack.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>US federal agencies told to crack down on scams and cybercrime, the White House releases its new Cyber Strategy, suspected Chinese hackers breach the FBI’s wiretap network, and Romania’s largest meat exporter is insolvent after a ransomware attack.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-new-white-house-eo-prioritizes-fight-against-scams-and-cybercrime/">Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: What it means to be a learning organisation</title>
            <pubDate>Mon, 09 Mar 2026 07:06:57 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI118/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI118/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI118.mp3" length="14097029" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>880</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsor interview, Marco Slaviero, CTO of Thinkst, talks to Tom Uren about how the company ensures that it is a learning organisation.

The pair discuss the company’s investment in its Thinkst Labs, how it differs from other security research labs, and how it helps grow products and people.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsor interview, Marco Slaviero, CTO of Thinkst, talks to Tom Uren about how the company ensures that it is a learning organisation.</p>

<p>The pair discuss the company’s investment in its Thinkst Labs, how it differs from other security research labs, and how it helps grow products and people.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes</title>
            <pubDate>Fri, 06 Mar 2026 13:32:10 +1100</pubDate>
            <link>https://risky.biz/RBNEWS534/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS534/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS534.mp3" length="7006411" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>407</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-iranian-hackers-are-scanning-for-security-cameras-to-aid-missile-strikes/">Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: The four hour cyber war on Iran</title>
            <pubDate>Thu, 05 Mar 2026 13:58:16 +1100</pubDate>
            <link>https://risky.biz/SRB157/</link>
            <guid isPermaLink="true">https://risky.biz/SRB157/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB157.mp3" length="20288344" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1256</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about how cyber operations were used in the first hours of the US-Israeli attack on Iran. They were instrumental in the attack on Iranian Supreme Leader Ali Khamenei, but they didn’t last long. The Iranian regime implemented an internet blackout within four hours of the first bombs.

They also discuss how threat actors are using AI. It’s not game-changing so far, but it is very much altering the balance between attack and defence.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about how cyber operations were used in the first hours of the US-Israeli attack on Iran. They were instrumental in the attack on Iranian Supreme Leader Ali Khamenei, but they didn’t last long. The Iranian regime implemented an internet blackout within four hours of the first bombs.</p>

<p>They also discuss how threat actors are using AI. It’s not game-changing so far, but it is very much altering the balance between attack and defence.</p>

<p>This episode is also available on <a href="https://youtu.be/UHoaIi9Ai1E">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes</title>
            <pubDate>Wed, 04 Mar 2026 10:00:00 +1100</pubDate>
            <link>https://risky.biz/RBNEWS533/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS533/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS533.mp3" length="7392569" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>432</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-cyber-command-conducted-cyberattacks-ahead-of-iran-strikes/">Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: The evolution of cyber ops in Ukraine</title>
            <pubDate>Tue, 03 Mar 2026 07:37:58 +1100</pubDate>
            <link>https://risky.biz/BTN156/</link>
            <guid isPermaLink="true">https://risky.biz/BTN156/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN156a.mp3" length="26710279" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1668</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq how the use of cyber operations in the war in Ukraine has evolved over time.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq how the use of cyber operations in the war in Ukraine has evolved over time.</p>

<p>This episode is also available on <a href="https://youtu.be/CUL4YC8xh0w">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes">Russia using cyber espionage to direct grid missile strikes</a></li>
										
                    	<li><a href="https://spectator.com/article/has-it-all-gone-wrong-between-trump-and-starmer/">The Spectator article on US-UK relations</a></li>
										
                    	<li><a href="https://risky.biz/BTN72/">BTN72 on the Taurus missile leak</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: LLMs can deanonymize internet users based on their comments</title>
            <pubDate>Mon, 02 Mar 2026 12:17:26 +1100</pubDate>
            <link>https://risky.biz/RBNEWS532/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS532/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS532.mp3" length="9105659" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>539</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-llms-can-deanonymize-internet-users-based-on-their-comments/">Risky Bulletin: LLMs can deanonymize internet users based on their past comments</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: AI Agents need distinct identities</title>
            <pubDate>Mon, 02 Mar 2026 06:47:24 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI117/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI117/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI117.mp3" length="14642138" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>914</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis chats to Harish Peri, SVP and general manager for AI security at Okta, a cloud-based identity and access management company. The pair chat about the fact that AI is forcing enterprises to relearn the basics around identity security, and how Okta for AI Agents can help.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis chats to Harish Peri, SVP and general manager for AI security at Okta, a cloud-based identity and access management company. The pair chat about the fact that AI is forcing enterprises to relearn the basics around identity security, and how Okta for AI Agents can help.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russian man extorts Conti ransomware group</title>
            <pubDate>Fri, 27 Feb 2026 13:42:24 +1100</pubDate>
            <link>https://risky.biz/RBNEWS531/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS531/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS531.mp3" length="8785747" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>519</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russian-man-investigated-for-extorting-conti-ransomware-group/">Risky Bulletin: Russian man investigated for extorting Conti ransomware group</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Is Claude too woke for war?</title>
            <pubDate>Thu, 26 Feb 2026 11:59:10 +1100</pubDate>
            <link>https://risky.biz/SRB156/</link>
            <guid isPermaLink="true">https://risky.biz/SRB156/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB156.mp3" length="15940946" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>985</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and use in lethal autonomous weapons.

They also discuss the return of Volt Typhoon, the Chinese hacker group prepositioning in critical infrastructure for sabotage in the event of a conflict over Taiwan. The group is still around, even though the US government declared victory against it last July.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and use in lethal autonomous weapons.</p>

<p>They also discuss the return of Volt Typhoon, the Chinese hacker group prepositioning in critical infrastructure for sabotage in the event of a conflict over Taiwan. The group is still around, even though the US government declared victory against it last July.</p>

<p>This episode is also available on <a href="https://youtu.be/XBFQXi61O_E">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov</title>
            <pubDate>Wed, 25 Feb 2026 12:29:58 +1100</pubDate>
            <link>https://risky.biz/RBNEWS530/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS530/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS530.mp3" length="7400619" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>432</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia launches a criminal probe into Telegram’s founder, two teenagers arrested for a South Korean bike share hack, Anthropic accuses Chinese AI firms of distillation attacks, and the US Treasury sanctions a Russian exploit broker.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia launches a criminal probe into Telegram’s founder, two teenagers arrested for a South Korean bike share hack, Anthropic accuses Chinese AI firms of distillation attacks, and the US Treasury sanctions a Russian exploit broker.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russia-starts-criminal-probe-of-telegram-founder-pavel-durov/">Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: How NSA will use AI</title>
            <pubDate>Tue, 24 Feb 2026 08:13:02 +1100</pubDate>
            <link>https://risky.biz/BTN155/</link>
            <guid isPermaLink="true">https://risky.biz/BTN155/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN155.mp3" length="26349799" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1646</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI.

This episode is available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI.</p>

<p>This episode is available on <a href="https://youtu.be/w7sTC9GcL8A">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/ai-powered-espionage-will-favor-china/">How AI-powered espionage will favour China</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">Google&#39;s AI threat tracker, February 2026</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices</title>
            <pubDate>Mon, 23 Feb 2026 11:48:53 +1100</pubDate>
            <link>https://risky.biz/RBNEWS529/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS529/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS529.mp3" length="6644801" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>385</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                An AI-driven hacking campaign breached 600 Fortinet devices, Ivanti was hacked via its own product, Wikipedia bans Archive-dot-Today for DDoS attacks, and Chinese hackers breached Italy’s police force.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>An AI-driven hacking campaign breached 600 Fortinet devices, Ivanti was hacked via its own product, Wikipedia bans Archive-dot-Today for DDoS attacks, and Chinese hackers breached Italy’s police force.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-ai-driven-hacking-campaign-breaches-600-fortinet-devices/">Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: The smouldering trashfire of AI and open source</title>
            <pubDate>Mon, 23 Feb 2026 06:42:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI116/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI116/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI116.mp3" length="24011308" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1499</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsor interview, Casey Ellis and Feross Aboukhadijeh discuss how AI is affecting open source, chat about a few attacks the company has seen in the wild and introduce Socket’s answer to the smouldering trashfire: Socket Firewall.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsor interview, Casey Ellis and Feross Aboukhadijeh discuss how AI is affecting open source, chat about a few attacks the company has seen in the wild and introduce Socket’s answer to the smouldering trashfire: Socket Firewall.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: RPKI infrastructure sits on shaky ground</title>
            <pubDate>Fri, 20 Feb 2026 13:00:06 +1100</pubDate>
            <link>https://risky.biz/RBNEWS528/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS528/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS528.mp3" length="8736621" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>516</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-rpki-infrastructure-sits-on-shaky-ground/">Risky Bulletin: RPKI infrastructure sits on shaky ground</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Cyber bullets can&apos;t replace political will</title>
            <pubDate>Thu, 19 Feb 2026 12:55:11 +1100</pubDate>
            <link>https://risky.biz/SRB155/</link>
            <guid isPermaLink="true">https://risky.biz/SRB155/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB155.mp3" length="18965488" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1174</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about a groundswell of calls from European officials to build cyber capabilities to strike back against adversaries. There are good reasons that countries should have their own cyber capabilities, but if you don’t have the political will to strike back, having a magic cyber weapon doesn’t really make a difference.

They also talk about ‘distillation attacks’. They are a way that AI developers can steal the secret sauce of advanced models just by asking questions. It looks like American companies need government assistance if the US wants to keep its AI lead.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about a groundswell of calls from European officials to build cyber capabilities to strike back against adversaries. There are good reasons that countries should have their own cyber capabilities, but if you don’t have the political will to strike back, having a magic cyber weapon doesn’t really make a difference.</p>

<p>They also talk about ‘distillation attacks’. They are a way that AI developers can steal the secret sauce of advanced models just by asking questions. It looks like American companies need government assistance if the US wants to keep its AI lead.</p>

<p>This episode is also available on <a href="https://youtu.be/5gh2PqEWMKo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Supply chain attack plants backdoor on Android tablets</title>
            <pubDate>Wed, 18 Feb 2026 14:24:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWS527/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS527/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS527.mp3" length="8440345" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>498</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-supply-chain-attack-plants-backdoor-on-android-tablets/">Risky Bulletin: Supply chain attack plants backdoor on Android tablets</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Buying the magic weapon</title>
            <pubDate>Tue, 17 Feb 2026 07:24:23 +1100</pubDate>
            <link>https://risky.biz/BTN154/</link>
            <guid isPermaLink="true">https://risky.biz/BTN154/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN154.mp3" length="27182585" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1698</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.

This episode is also available on Youtube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.</p>

<p>This episode is also available on <a href="https://youtu.be/kC_x8niABrw">Youtube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/iran-nuclear-cyber-strikes-us">The Record on Iranian air defences</a></li>
										
                    	<li><a href="https://www.hurstpublishers.com/book/no-shortcuts/">Max Smeets No Shortcuts</a></li>
										
                    	<li><a href="https://risky.biz/RBNEWSSI115/">RunZero sponsor interview</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cambodia promises to dismantle scam compounds by April</title>
            <pubDate>Mon, 16 Feb 2026 14:14:00 +1100</pubDate>
            <link>https://risky.biz/RBNEWS526/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS526/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS526.mp3" length="8985691" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>532</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/risky-bulletin-cambodia-promises-to-dismantle-scam-networks-by-april/">Risky Bulletin: Cambodia promises to dismantle scam networks by April</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Filtering the KEV was really hard … Until now!</title>
            <pubDate>Mon, 16 Feb 2026 06:42:21 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI115/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI115/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI115.mp3" length="23035384" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1438</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis chats to Tod Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis chats to Tod Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.runzero.com/resources/kevology/">KEVology: An analysis of exploits, scores, &amp; timelines on the CISA KEV</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI</title>
            <pubDate>Fri, 13 Feb 2026 13:07:45 +1100</pubDate>
            <link>https://risky.biz/RBNEWS525/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS525/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS525.mp3" length="7381405" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>431</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A Malware developer faked his own death to evade the FBI, Apple patches a zero-day used in a targeted attack, the Tianfu Cup quietly returns, and researchers spot the first malicious Outlook add-in.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A Malware developer faked his own death to evade the FBI, Apple patches a zero-day used in a targeted attack, the Tianfu Cup quietly returns, and researchers spot the first malicious Outlook add-in.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-icedid-malware-developer-fakes-his-own-death-to-escape-the-fbi/">Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Microsoft forgoes its secure future</title>
            <pubDate>Thu, 12 Feb 2026 11:46:20 +1100</pubDate>
            <link>https://risky.biz/SRB154/</link>
            <guid isPermaLink="true">https://risky.biz/SRB154/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB154.mp3" length="19214186" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1190</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Microsoft CEO Satya Nadella’s messaging around personnel changes at the top of its security organisation. These signal a focus on selling security products rather than on making secure products.

They also discuss Expedition Cloud, a Chinese cyber range that replicated the critical infrastructure of neighbouring countries, apparently to develop and fine-tune cyber disruption operations.

Finally, they talk about what we’ve learnt about the role of cyber operations in the US bombing of Iranian nuclear facilities. It was far bigger than we previously thought.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Microsoft CEO Satya Nadella’s messaging around personnel changes at the top of its security organisation. These signal a focus on selling security products rather than on making secure products.</p>

<p>They also discuss Expedition Cloud, a Chinese cyber range that replicated the critical infrastructure of neighbouring countries, apparently to develop and fine-tune cyber disruption operations.</p>

<p>Finally, they talk about what we’ve learnt about the role of cyber operations in the US bombing of Iranian nuclear facilities. It was far bigger than we previously thought.</p>

<p>This episode is also available on <a href="https://youtu.be/fJ8N2BjhVzM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Chinese cyber-spies breached all of Singapore&apos;s telcos</title>
            <pubDate>Wed, 11 Feb 2026 14:02:28 +1100</pubDate>
            <link>https://risky.biz/RBNEWS524/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS524/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS524.mp3" length="7008885" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>408</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                China has breached all of Singapore’s major telcos, Microsoft announces two new security features, a hacktivist leaks data from a stalkerware provider, and researchers map out “GRU information warfare units” based on their insignia.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>China has breached all of Singapore’s major telcos, Microsoft announces two new security features, a hacktivist leaks data from a stalkerware provider, and researchers map out “GRU information warfare units” based on their insignia.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-chinese-cyber-spies-breached-all-of-singapores-telcos/">Risky Bulletin: Chinese cyber-spies breached all of Singapore&#39;s telcos</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Why we are doomed to insecurity</title>
            <pubDate>Tue, 10 Feb 2026 07:59:19 +1100</pubDate>
            <link>https://risky.biz/BTN153/</link>
            <guid isPermaLink="true">https://risky.biz/BTN153/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN153.mp3" length="26186113" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1635</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about why the world is destined to be perpetually insecure.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about why the world is destined to be perpetually insecure.</p>

<p>This episode is also available on <a href="https://youtu.be/aiXF18q5Vsk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://hntrbrk.com/ubiquiti/">Hunterbrook&#39;s Ubiquiti investigation</a></li>
										
                    	<li><a href="https://risky.biz/RBNEWSSI114/">Trail of Bits sponsor interview</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: SmarterTools hacked via its own product</title>
            <pubDate>Mon, 09 Feb 2026 13:45:08 +1100</pubDate>
            <link>https://risky.biz/RBNEWS523/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS523/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS523.mp3" length="6359607" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>368</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A software company gets hacked through vulnerabilities in its own product, European agencies are hacked via recent Ivanti zero-days, Senegal is being extorted by hackers, and a state actor is behind a Signal phishing campaign in Germany.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A software company gets hacked through vulnerabilities in its own product, European agencies are hacked via recent Ivanti zero-days, Senegal is being extorted by hackers, and a state actor is behind a Signal phishing campaign in Germany.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-smartertools-hacked-via-its-own-product/">Risky Bulletin: SmarterTools hacked via its own product</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Trail of Bits going all-in on AI</title>
            <pubDate>Mon, 09 Feb 2026 05:59:39 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI114/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI114/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI114.mp3" length="18000762" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1124</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, Tom Uren talks to Trail of Bits CEO Dan Guido about how Trail of Bits is reworking its business processes to take advantage of AI. Dan talks about what it takes to make AI agents reliable and trustworthy and how that will give the company an edge by making its work both better and faster.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, Tom Uren talks to Trail of Bits CEO Dan Guido about how Trail of Bits is reworking its business processes to take advantage of AI. Dan talks about what it takes to make AI agents reliable and trustworthy and how that will give the company an edge by making its work both better and faster.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://github.com/trailofbits/skills">Trail of Bits Skills Marketplace</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Denmark recruits hackers for offensive cyber operations</title>
            <pubDate>Fri, 06 Feb 2026 11:13:49 +1100</pubDate>
            <link>https://risky.biz/RBNEWS522/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS522/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS522.mp3" length="6537187" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>379</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Denmark recruits hackers for offensive cyber operations, CISA tells agencies to remove old edge devices, Coinbase has another insider breach, and Microsoft appoints a new security chief.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Denmark recruits hackers for offensive cyber operations, CISA tells agencies to remove old edge devices, Coinbase has another insider breach, and Microsoft appoints a new security chief.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations/">Risky Bulletin: Denmark recruits hackers for offensive cyber operations</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Google&apos;s cyber disruption unit kicks its first goal</title>
            <pubDate>Thu, 05 Feb 2026 13:41:10 +1100</pubDate>
            <link>https://risky.biz/SRB153/</link>
            <guid isPermaLink="true">https://risky.biz/SRB153/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB153.mp3" length="17231394" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1067</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Google’s cyber disruption unit taking aim at the IPIDEA residential proxy network. The network was a cybercrime enabler that was used by hundreds of threat actors for crime and espionage. More of this kind of disruption please.

They also discuss SpaceX’s rapid action to stop the Russian military using Starlink terminals to guide drones deep into Ukrainian territory.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Google’s cyber disruption unit taking aim at the IPIDEA residential proxy network. The network was a cybercrime enabler that was used by hundreds of threat actors for crime and espionage. More of this kind of disruption please.</p>

<p>They also discuss SpaceX’s rapid action to stop the Russian military using Starlink terminals to guide drones deep into Ukrainian territory.</p>

<p>This episode is also available on <a href="https://youtu.be/N7TusSygxEg">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Plone CMS stops supply-chain attack</title>
            <pubDate>Wed, 04 Feb 2026 12:32:12 +1100</pubDate>
            <link>https://risky.biz/RBNEWS521/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS521/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS521.mp3" length="8376785" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>494</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The Plone CMS stops a supply-chain attack, French cops raid the X Paris office;
the number of malicious OpenClaw skills grows, and a Chinese APT hacked Notepad++ servers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The Plone CMS stops a supply-chain attack, French cops raid the X Paris office;
the number of malicious OpenClaw skills grows, and a Chinese APT hacked Notepad++ servers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-plone-cms-stops-supply-chain-attack/">Risky Bulletin: Plone CMS stops supply-chain attack</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds:  The internal logic of Russian power grid attacks</title>
            <pubDate>Tue, 03 Feb 2026 07:31:56 +1100</pubDate>
            <link>https://risky.biz/BTN152/</link>
            <guid isPermaLink="true">https://risky.biz/BTN152/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN152.mp3" length="31414291" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1962</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss the recent Russian attack on Polish electricity infrastructure.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss the recent Russian attack on Polish electricity infrastructure.</p>

<p>This episode is also available on <a href="https://youtu.be/IqLHE-lIP4s">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/">ESET&#39;s first report</a></li>
										
                    	<li><a href="https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/">ESET&#39;s update report</a></li>
										
                    	<li><a href="https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/">CERT-PL report</a></li>
										
                    	<li><a href="https://www.dragos.com/blog/poland-power-grid-attack-electrum-targets-distributed-energy-2025">Dragos report</a></li>
										
                    	<li><a href="https://theins.ru/en/inv/281731">The Insider &#39;Hidden Bear&#39; investigation</a></li>
										
                    	<li><a href="https://risky.biz/BTN124/">BTN 124, How Russia&#39;s sabotage team got into hacking</a></li>
										
                    	<li><a href="https://risky.biz/BTN145/">BTN 145, Russia&#39;s cyber war on wheat</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: StopICE blames hack on &quot;a CBP agent here in SoCal&quot;</title>
            <pubDate>Mon, 02 Feb 2026 13:26:42 +1100</pubDate>
            <link>https://risky.biz/RBNEWS520/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS520/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS520.mp3" length="7978153" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>469</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                ICE tracking app blames a recent hack on a government agent, Microsoft will disable NTLM in the next release of Windows, Poland bans Chinese cars from military bases, and Ivanti patches two new zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>ICE tracking app blames a recent hack on a government agent, Microsoft will disable NTLM in the next release of Windows, Poland bans Chinese cars from military bases, and Ivanti patches two new zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-stopice-blames-hack-on-a-cbp-agent-here-in-socal/">Risky Bulletin: StopICE blames hack on &quot;a CBP agent here in SoCal&quot;</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: AI is critical to the future of cyber defence</title>
            <pubDate>Mon, 02 Feb 2026 07:03:08 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI113/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI113/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI113.mp3" length="17525201" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1094</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview, Casey Ellis chats to Edward Wu, founder of Dropzone AI about a recent Vanderbilt University report that reveals that foreign adversaries’ resources  are growing. Edward says AI capabilities are critical to the future of cyber defence, because the west can’t hire itself out of the shortfall.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview, Casey Ellis chats to Edward Wu, founder of Dropzone AI about a recent Vanderbilt University report that reveals that foreign adversaries’ resources  are growing. Edward says AI capabilities are critical to the future of cyber defence, because the west can’t hire itself out of the shortfall.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://cdn.vanderbilt.edu/vu-wpfsx/wp-content/uploads/sites/41/2025/12/Dominating-the-Digital-Space.pdf">Dominating the Digital Space: A Whole-of-Society Strategy for Securing the United States from Cyber Aggression</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack</title>
            <pubDate>Fri, 30 Jan 2026 09:58:47 +1100</pubDate>
            <link>https://risky.biz/RBNEWS519/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS519/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS519.mp3" length="7194753" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>421</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Hackers breach eScan antivirus and distribute a backdoor, Google takes down the IPIDEA proxy botnet, most GDPR fines remain uncollected, and the Poland wiper attack hit 30 locations.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Hackers breach eScan antivirus and distribute a backdoor, Google takes down the IPIDEA proxy botnet, most GDPR fines remain uncollected, and the Poland wiper attack hit 30 locations.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-escan-antivirus-distributes-backdoor-in-latest-supply-chain-attack/">Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Punish the wicked and reward the righteous</title>
            <pubDate>Thu, 29 Jan 2026 12:53:57 +1100</pubDate>
            <link>https://risky.biz/SRB152/</link>
            <guid isPermaLink="true">https://risky.biz/SRB152/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB152.mp3" length="16736324" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1037</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the Pall Mall Process, an international effort to reign in abusive spyware. Tom thinks the US has already stumbled into a viable carrots and sticks style strategy that will shape the industry more than coming up with standards will.

The pair also discuss news that Chinese Salt Typhoon hackers compromised the calls of senior UK officials in Downing Street. The UK has extensive telecommunications security regulations and the incident makes us wonder what that legislation is actually good for.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the Pall Mall Process, an international effort to reign in abusive spyware. Tom thinks the US has already stumbled into a viable carrots and sticks style strategy that will shape the industry more than coming up with standards will.</p>

<p>The pair also discuss news that Chinese Salt Typhoon hackers compromised the calls of senior UK officials in Downing Street. The UK has extensive telecommunications security regulations and the incident makes us wonder what that legislation is actually good for.</p>

<p>This episode is also available on <a href="https://youtu.be/vMGHuO4qQng">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cyberattack cripples cars across Russia</title>
            <pubDate>Wed, 28 Jan 2026 08:06:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWS518/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS518/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS518.mp3" length="7868461" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>463</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A cyberattack has crippled cars in Russia, Microsoft patches an Office zero-day, WhatsApp rolls out an account lockdown feature, and a handful of Chrome extensions steal ChatGPT auth tokens.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A cyberattack has crippled cars in Russia, Microsoft patches an Office zero-day, WhatsApp rolls out an account lockdown feature, and a handful of Chrome extensions steal ChatGPT auth tokens.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-cyberattack-cripples-cars-across-russia/">Risky Bulletin: Cyberattack cripples cars across Russia</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Getting pinged and the fog of war</title>
            <pubDate>Tue, 27 Jan 2026 07:26:51 +1100</pubDate>
            <link>https://risky.biz/BTN151/</link>
            <guid isPermaLink="true">https://risky.biz/BTN151/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN151.mp3" length="28852611" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1802</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how getting pinged hurts state hackers by introducing uncertainty. Publishing technical reports on the hack can actually improve the situation by removing uncertainty  about how  attackers were detected.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how getting pinged hurts state hackers by introducing uncertainty. Publishing technical reports on the hack can actually improve the situation by removing uncertainty  about how  attackers were detected.</p>

<p>This episode is also available on <a href="https://youtu.be/988iMgzddqk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/BTN36b/">BTN 36, The culture of the Snake</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Push Security on ConsentFix attacks</title>
            <pubDate>Tue, 27 Jan 2026 06:20:19 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI112/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI112/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI112.mp3" length="12606672" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>786</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business News sponsor interview, Catalin Cimpanu talks with Luke Jennings, VP of Research &amp; Development at Push Security, about ConsentFix. It’s a new form of email-based social engineering attack used in the wild, an evolution of the ClickFix attack that goes after your identity.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business News sponsor interview, Catalin Cimpanu talks with Luke Jennings, VP of Research &amp; Development at Push Security, about ConsentFix. It’s a new form of email-based social engineering attack used in the wild, an evolution of the ClickFix attack that goes after your identity.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://pushsecurity.com/blog/consentfix">ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/consentfix-debrief">ConsentFix debrief: latest community insights, recommendations, and predictions</a></li>
										
                    	<li><a href="https://www.linkedin.com/feed/update/urn:li:activity:7407080879292059648/">Luke Jennings, ConsentFix LinkedIn post</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=Z3lXvXGfggs">Year in Review: How Phishing Attacks Evolved in 2025</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia deployed wipers on Poland&apos;s energy grid</title>
            <pubDate>Mon, 26 Jan 2026 10:04:28 +1100</pubDate>
            <link>https://risky.biz/RBNEWS517/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS517/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS517.mp3" length="6760859" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>394</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia deployed wipers against Poland’s energy grid, Microsoft shared BitLocker keys with the FBI, Romania dismantles a murder-for-hire portal, and the EU creates a new anti-spyware group.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia deployed wipers against Poland’s energy grid, Microsoft shared BitLocker keys with the FBI, Romania dismantles a murder-for-hire portal, and the EU creates a new anti-spyware group.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-eu-readies-new-anti-spyware-group-but-with-even-less-powers-than-pega/">Risky Bulletin: EU readies new anti-spyware group, but with even less powers than PEGA</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls</title>
            <pubDate>Fri, 23 Jan 2026 09:26:03 +1100</pubDate>
            <link>https://risky.biz/RBNEWS516/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS516/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS516.mp3" length="6852979" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>399</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-improperly-patched-bug-exploited-again-in-fortinet-firewalls/">Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: You can&apos;t block space internet</title>
            <pubDate>Thu, 22 Jan 2026 12:25:07 +1100</pubDate>
            <link>https://risky.biz/SRB151/</link>
            <guid isPermaLink="true">https://risky.biz/SRB151/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB151.mp3" length="19131834" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1187</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the rise of technologies that can undermine internet blackouts such as Starlink and its relatively new direct-to-cell service. Authoritarian internet shutdowns and disasters happen often enough that governments should think about how to take advantage of these new technologies rather than just reacting when crises arise.

They also discuss the nomination of General Joshua Rudd as head of NSA and US Cyber Command.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the rise of technologies that can undermine internet blackouts such as Starlink and its relatively new direct-to-cell service. Authoritarian internet shutdowns and disasters happen often enough that governments should think about how to take advantage of these new technologies rather than just reacting when crises arise.</p>

<p>They also discuss the nomination of General Joshua Rudd as head of NSA and US Cyber Command.</p>

<p>This episode is also available on <a href="https://youtu.be/UodJd3Cjv54">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Domain resurrection attacks come to Canonical&apos;s Snap Store</title>
            <pubDate>Wed, 21 Jan 2026 12:41:55 +1100</pubDate>
            <link>https://risky.biz/RBNEWS515/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS515/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS515.mp3" length="6438113" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>374</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Canonical’s Snap Store hit by domain resurrection attacks, Russia will use AI to detect VPN users, Iranian hackers switch to Starlink during internet outage, and Greece arrests SMS blasters… by dumb luck.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Canonical’s Snap Store hit by domain resurrection attacks, Russia will use AI to detect VPN users, Iranian hackers switch to Starlink during internet outage, and Greece arrests SMS blasters… by dumb luck.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-domain-resurrection-attacks-come-to-canonicals-snap-store/">Risky Bulletin: Domain resurrection attacks come to Canonical&#39;s Snap Store</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Why the West sucks at Information Warfare</title>
            <pubDate>Tue, 20 Jan 2026 06:52:53 +1100</pubDate>
            <link>https://risky.biz/BTN150/</link>
            <guid isPermaLink="true">https://risky.biz/BTN150/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN150.mp3" length="31311755" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1956</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about what information warfare even is, revisit a 30-year-old paper and examine why Western governments struggle with the concept.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about what information warfare even is, revisit a 30-year-old paper and examine why Western governments struggle with the concept.</p>

<p>This episode is also available on <a href="https://youtu.be/R3p12DTmE9A">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://apps.dtic.mil/sti/tr/pdf/ADA367662.pdf">What is Information Warfare by Martin Libicki</a></li>
										
                    	<li><a href="https://hrichina.substack.com/p/the-smear-campaign-against-guan-heng">Human Rights in China</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=rV7JFmz6Ca0">Leaked conversation on Youtube, in Mandarin</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=kfVsfOSbJY0">Rebecca Black, Friday</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Germany seeks more hacking and surveillance powers for its intel service</title>
            <pubDate>Mon, 19 Jan 2026 09:41:53 +1100</pubDate>
            <link>https://risky.biz/RBNEWS514/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS514/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS514.mp3" length="7460003" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>438</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Germany seeks more hacking and surveillance powers for its intelligence service, Finland intends to criminalize the spreading of false information, patriotic “French” social media goes quiet during Iran’s internet outage, and hackers are extorting GrubHub.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Germany seeks more hacking and surveillance powers for its intelligence service, Finland intends to criminalize the spreading of false information, patriotic “French” social media goes quiet during Iran’s internet outage, and hackers are extorting GrubHub.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-germany-seeks-more-hacking-and-surveillance-powers-for-its-intel-service/">Risky Bulletin: Germany seeks more hacking and surveillance powers for its intel service</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Seeing into the seams</title>
            <pubDate>Mon, 19 Jan 2026 06:10:26 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI111/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI111/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI111.mp3" length="13853935" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>865</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, Tom Uren talks to Justin Kohler, Chief Product Officer at SpecterOps, about how attack paths exist in the seams between different identity or permissions management domains.

In isolation, for example, both your Github and your AWS deployment could follow best practices. But bring them together and you’ve got problems. Bloodhound’s OpenGraph lets you find and fix these otherwise invisible attack paths.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, Tom Uren talks to Justin Kohler, Chief Product Officer at SpecterOps, about how attack paths exist in the seams between different identity or permissions management domains.</p>

<p>In isolation, for example, both your Github and your AWS deployment could follow best practices. But bring them together and you’ve got problems. Bloodhound’s OpenGraph lets you find and fix these otherwise invisible attack paths.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: China bans Israeli and US cybersecurity products</title>
            <pubDate>Fri, 16 Jan 2026 10:00:57 +1100</pubDate>
            <link>https://risky.biz/RBNEWS513/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS513/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS513.mp3" length="7363579" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>432</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                China bans Israeli and US cybersecurity products, Sean Plankey is re-nominated for CISA Director, RAM price hikes are likely to impact the cost of firewalls, and Lumen sinkholes the Kimwolf DDoS botnet.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>China bans Israeli and US cybersecurity products, Sean Plankey is re-nominated for CISA Director, RAM price hikes are likely to impact the cost of firewalls, and Lumen sinkholes the Kimwolf DDoS botnet.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-dram-price-hikes-set-to-impact-firewalls-too/">Risky Bulletin: DRAM price hikes set to impact firewalls too</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: China Fights Scam Compounds … For China</title>
            <pubDate>Thu, 15 Jan 2026 12:02:36 +1100</pubDate>
            <link>https://risky.biz/SRB150/</link>
            <guid isPermaLink="true">https://risky.biz/SRB150/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB150.mp3" length="18670106" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1159</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the Chinese government’s reactive approach to tackling scam compounds. It’s driven by bad news on domestic media and therefore focusses on the compounds that are targeting Chinese citizens. Rather than eliminating the industry, that may instead be shaping the industry to focus on other countries and particularly Americans.

They also discuss the role of disruptive cyber operations in the US’s raid to capture Venezuelan President Nicolás Maduro.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the Chinese government’s reactive approach to tackling scam compounds. It’s driven by bad news on domestic media and therefore focusses on the compounds that are targeting Chinese citizens. Rather than eliminating the industry, that may instead be shaping the industry to focus on other countries and particularly Americans.</p>

<p>They also discuss the role of disruptive cyber operations in the US’s raid to capture Venezuelan President Nicolás Maduro.</p>

<p>This episode is also available on <a href="https://youtu.be/3bNxh_XuvuA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia fines 33 telcos for surveillance non-compliance</title>
            <pubDate>Wed, 14 Jan 2026 14:22:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWS512/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS512/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS512.mp3" length="6491475" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>377</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia fines 33 telcos for surveillance non-compliance, AVCheck admin is arrested in Amsterdam, Poland repels an attack on its power grid, and voice cloning defenses can be bypassed.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia fines 33 telcos for surveillance non-compliance, AVCheck admin is arrested in Amsterdam, Poland repels an attack on its power grid, and voice cloning defenses can be bypassed.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-apex-legends-streamers-hacked-again/">Risky Bulletin: Voice cloning defenses still weak, can be bypassed</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Lights out!</title>
            <pubDate>Tue, 13 Jan 2026 07:32:35 +1100</pubDate>
            <link>https://risky.biz/BTN149/</link>
            <guid isPermaLink="true">https://risky.biz/BTN149/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN149.mp3" length="26863469" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1678</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq about the role of cyber operations in the US capture of Venezuela’s president Nicolas Maduro.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq about the role of cyber operations in the US capture of Venezuela’s president Nicolas Maduro.</p>

<p>This episode is also available on <a href="https://youtu.be/acaPlBDOQYI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.politico.com/newsletters/weekly-cybersecurity/2026/01/05/maduros-fall-puts-us-cyber-power-in-the-spotlight-00710452">Maduro&#39;s fall puts US cyber power in the spotlight</a></li>
										
                    	<li><a href="https://www.politico.com/news/2026/01/03/trump-venezuela-cyber-operation-maduro-00709816">Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</a></li>
										
                    	<li><a href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li>
										
                    	<li><a href="https://bsky.app/profile/shakirov2036.bsky.social/post/3mbocouzyvc2t">Power outages, but not cyber (from Oleg Shakirov)</a></li>
										
                    	<li><a href="https://www.nytimes.com/2026/01/03/us/politics/trump-capture-maduro-venezuela.html">NYTimes Inside &#39;Operation Absolute Resolve&#39;</a></li>
										
                    	<li><a href="https://www.penguin.com.au/books/spec-ops-9780307547231">Spec Ops by William McRaven</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Apex Legends streamers hacked again</title>
            <pubDate>Mon, 12 Jan 2026 09:32:41 +1100</pubDate>
            <link>https://risky.biz/RBNEWS511/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS511/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS511.mp3" length="6293397" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>365</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The Apex Legends game is hacked again, data about 17 million Instagram users put up for sale, Indonesia blocks X over pornographic content, and a ransomware attack hits major Chilean energy provider

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The Apex Legends game is hacked again, data about 17 million Instagram users put up for sale, Indonesia blocks X over pornographic content, and a ransomware attack hits major Chilean energy provider</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-apex-legends-streamers-hacked-again/">Risky Bulletin: Apex Legends streamers hacked again</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: What AI workloads mean for Cloud security</title>
            <pubDate>Mon, 12 Jan 2026 06:13:21 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI110/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI110/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI110.mp3" length="14685315" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>917</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business News sponsored interview the CEO and founder of Prowler, Toni de la Fuente, explains how implementing AI systems brings new security challenges that differ for traditional cloud workloads. Toni also talks about ‘attack paths’ in the context of cloud infrastructure and using them to minimise risk.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business News sponsored interview the CEO and founder of Prowler, Toni de la Fuente, explains how implementing AI systems brings new security challenges that differ for traditional cloud workloads. Toni also talks about ‘attack paths’ in the context of cloud infrastructure and using them to minimise risk.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Belarus deploys spyware on journalists&apos; phones</title>
            <pubDate>Fri, 19 Dec 2025 13:02:37 +1100</pubDate>
            <link>https://risky.biz/RBNEWS510/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS510/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS510.mp3" length="7134913" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>418</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Belarus deployed spyware on journalists’ phones, a man is arrested for installing malware on a ferry, France arrests the hacker behind an Interior Ministry email server breach, and new Cisco and SonicWall zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Belarus deployed spyware on journalists’ phones, a man is arrested for installing malware on a ferry, France arrests the hacker behind an Interior Ministry email server breach, and new Cisco and SonicWall zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-belarus-deploys-spyware-on-journalists-phones/">Risky Bulletin: Belarus deploys spyware on journalists&#39; phones</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Like Huawei, but for electricity</title>
            <pubDate>Thu, 18 Dec 2025 10:56:12 +1100</pubDate>
            <link>https://risky.biz/SRB149/</link>
            <guid isPermaLink="true">https://risky.biz/SRB149/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB149.mp3" length="18634128" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1157</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Patrick Gray talk about America’s increasing dependence on Chinese manufacturers for electrical sector equipment. This doesn’t seem like a good idea when China is hacking electric utilities for sabotage and PLA researchers are dreaming up ways to attack the grid.

They also discuss the possibility that the US was responsible for a cyber attack on Venezuela’s state oil company and how Russian state-backed hacktivism is so dumb.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Patrick Gray talk about America’s increasing dependence on Chinese manufacturers for electrical sector equipment. This doesn’t seem like a good idea when China is hacking electric utilities for sabotage and PLA researchers are dreaming up ways to attack the grid.</p>

<p>They also discuss the possibility that the US was responsible for a cyber attack on Venezuela’s state oil company and how Russian state-backed hacktivism is so dumb.</p>

<p>This episode is also available on <a href="https://youtu.be/5LlOvAxhg8w">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Most smart devices run outdated web browsers</title>
            <pubDate>Wed, 17 Dec 2025 11:39:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWS509/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS509/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS509.mp3" length="7788229" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>459</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Most smart devices run outdated web browsers, Ukrainian hacktivists breach a major Russian defense contractor, ransomware hits Venezuela’s state-owned oil company, and hackers are trying to extort PornHub with stolen user data.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Most smart devices run outdated web browsers, Ukrainian hacktivists breach a major Russian defense contractor, ransomware hits Venezuela’s state-owned oil company, and hackers are trying to extort PornHub with stolen user data.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-most-devices-run-outdated-web-browsers/">Risky Bulletin: Most smart devices run outdated web browsers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Three Nerds: The evolution of Iranian cyber espionage</title>
            <pubDate>Tue, 16 Dec 2025 07:37:39 +1100</pubDate>
            <link>https://risky.biz/BTN148/</link>
            <guid isPermaLink="true">https://risky.biz/BTN148/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN148.mp3" length="47958924" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2996</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk to Hamid Kashfi, CEO and founder of DarkCell, talk about the Iranian cyber espionage scene.

Kashfi talks about how the regime once forced people to hack and crushed the domestic security research scene. He describes how and why the government has changed its approach and is now reaping the rewards of improved Iranian capabilities.

This episode is available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk to Hamid Kashfi, CEO and founder of DarkCell, talk about the Iranian cyber espionage scene.</p>

<p>Kashfi talks about how the regime once forced people to hack and crushed the domestic security research scene. He describes how and why the government has changed its approach and is now reaping the rewards of improved Iranian capabilities.</p>

<p>This episode is available on <a href="https://youtu.be/0TlmD07DwwQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.usenix.org/system/files/1401_08-12_mickens.pdf">The &quot;Mossad or not&quot; threat model by James Mickens</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/Shamoon">Shamoon wiper</a></li>
										
                    	<li><a href="https://therecord.media/threat-actor-uses-hp-ilo-rootkit-to-wipe-servers">iLO rootkit</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: African freelancers behind anti-US and anti-French disinfo campaigns</title>
            <pubDate>Mon, 15 Dec 2025 12:56:14 +1100</pubDate>
            <link>https://risky.biz/RBNEWS508/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS508/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS508.mp3" length="7982109" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>471</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia is hiring African freelancers for disinformation campaigns, the US is preparing to let contractors run offensive cyber operations, Germany blames Russia for the hack of its air traffic control agency, and Apple patches two WebKit zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia is hiring African freelancers for disinformation campaigns, the US is preparing to let contractors run offensive cyber operations, Germany blames Russia for the hack of its air traffic control agency, and Apple patches two WebKit zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-african-freelancers-behind-anti-us-and-anti-french-disinfo-campaigns/">Risky Bulletin: African freelancers behind anti-US and anti-French disinfo campaigns</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: ConsentFix and Push Security&apos;s browser attack taxonomy</title>
            <pubDate>Mon, 15 Dec 2025 07:17:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI109/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI109/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI109.mp3" length="18835453" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1176</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis is joined by Push Security’s Field CTO, Mark Orlando. They chat about the ways that browser-based attacks are evolving and how Push Security is finding and cataloging them.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis is joined by Push Security’s Field CTO, Mark Orlando. They chat about the ways that browser-based attacks are evolving and how Push Security is finding and cataloging them.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://pushsecurity.com/blog/consentfix">ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/phishing-detection-evasion-launch/">Introducing our guide to phishing detection evasion techniques</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: EU has a problem attracting and retaining cyber talent</title>
            <pubDate>Fri, 12 Dec 2025 13:59:37 +1100</pubDate>
            <link>https://risky.biz/RBNEWS507/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS507/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS507.mp3" length="9435337" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>562</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The EU has a problem attracting and retaining cyber talent, the CEO of Coupang resigns following the company’s security breach, Microsoft expands its bug bounty program to cover third party code, and Chrome and Gogs patch zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The EU has a problem attracting and retaining cyber talent, the CEO of Coupang resigns following the company’s security breach, Microsoft expands its bug bounty program to cover third party code, and Chrome and Gogs patch zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-eu-has-a-problem-attracting-and-retaining-cyber-talent/">Risky Bulletin: EU has a problem attracting and retaining cyber talent</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers</title>
            <pubDate>Wed, 10 Dec 2025 11:12:01 +1100</pubDate>
            <link>https://risky.biz/RBNEWS506/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS506/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS506.mp3" length="4878475" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>277</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-linux-adds-pcie-encryption-to-help-secure-cloud-servers">Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: APTs go after the React2Shell vulnerability within hours</title>
            <pubDate>Mon, 08 Dec 2025 10:32:22 +1100</pubDate>
            <link>https://risky.biz/RBNEWS505/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS505/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS505.mp3" length="8401635" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>498</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: When cyber campaigns cross a line</title>
            <pubDate>Thu, 04 Dec 2025 11:02:51 +1100</pubDate>
            <link>https://risky.biz/SRB148/</link>
            <guid isPermaLink="true">https://risky.biz/SRB148/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB148.mp3" length="15772348" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>978</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Patrick Gray discuss a new report proposing a framework for deciding when cyber operations raise red flags. It suggests seven red flags and could help clarify thinking about how to respond to different operations.

They also discuss Anthropic testifying to Congress and Iran using cyber intelligence to target missile strikes including by sharing it with Houthi rebels who fired at a specific ship.

And finally, we are not reassured by China’s white paper about being a good cyber citizen.

This episode is also available of Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Patrick Gray discuss a new report proposing a framework for deciding when cyber operations raise red flags. It suggests seven red flags and could help clarify thinking about how to respond to different operations.</p>

<p>They also discuss Anthropic testifying to Congress and Iran using cyber intelligence to target missile strikes including by sharing it with Houthi rebels who fired at a specific ship.</p>

<p>And finally, we are not reassured by China’s white paper about being a good cyber citizen.</p>

<p>This episode is also available of <a href="https://youtu.be/q8j_NLZfYHM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.interface-eu.org/publications/cyber-red-flags#appendices">Assessing Irresponsibility in Cyber Operations</a></li>
										
                    	<li><a href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/">AWS on state actors bridging cyber and kinetic warfare </a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Beating back state espionage</title>
            <pubDate>Tue, 02 Dec 2025 06:56:47 +1100</pubDate>
            <link>https://risky.biz/BTN147/</link>
            <guid isPermaLink="true">https://risky.biz/BTN147/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN147.mp3" length="26752510" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1671</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq wonder whether it is possible to deter states from cyber espionage with doxxing and other disruption measures.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq wonder whether it is possible to deter states from cyber espionage with doxxing and other disruption measures.</p>

<p>This episode is also available on <a href="https://youtu.be/rg00Ku-UN6c">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://blog.narimangharib.com/posts/2025%2F11%2F1763938840948?lang=en">Department 40 exposed</a></li>
										
                    	<li><a href="https://content.iranintl.com/secret-spy-unit-leads-irans-intel-gathering-for-surveillance-deadly-plots/index.html">Charming Kitten exposed</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Why Mastercard got into threat intel</title>
            <pubDate>Mon, 01 Dec 2025 09:21:12 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI108/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI108/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI108.mp3" length="13540222" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>845</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business News sponsor interview, Mike Lashlee, CSO of Mastercard talks to Tom Uren about why the company got into threat intelligence.

Mike talks about bringing together payments insights with threat intel to get strong signals about fraud or crime, the benefits of international collaboration and when it makes sense for your CSO to also be the CISO.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business News sponsor interview, Mike Lashlee, CSO of Mastercard talks to Tom Uren about why the company got into threat intelligence.</p>

<p>Mike talks about bringing together payments insights with threat intel to get strong signals about fraud or crime, the benefits of international collaboration and when it makes sense for your CSO to also be the CISO.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: DeepSeek and Musk&apos;s Grok both toe the party line</title>
            <pubDate>Thu, 27 Nov 2025 13:07:43 +1100</pubDate>
            <link>https://risky.biz/SRB147/</link>
            <guid isPermaLink="true">https://risky.biz/SRB147/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB147.mp3" length="20676822" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1285</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about new research that shows the Chinese-made DeepSeek-R1 AI model produces insecure code when  prompts include topics that the Chinese Communist Party dislikes. It’s interesting research, but the CCP doesn’t have a monopoly on imposing AI bias.

They also discuss the complete doxxing of the Iranian cyber espionage group known as APT35 or Charming Kitten.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about new research that shows the Chinese-made DeepSeek-R1 AI model produces insecure code when  prompts include topics that the Chinese Communist Party dislikes. It’s interesting research, but the CCP doesn’t have a monopoly on imposing AI bias.</p>

<p>They also discuss the complete doxxing of the Iranian cyber espionage group known as APT35 or Charming Kitten.</p>

<p>This episode is also available on <a href="https://youtu.be/e8l6pe73AcQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Telcos bad, Cloud good.</title>
            <pubDate>Tue, 25 Nov 2025 07:36:52 +1100</pubDate>
            <link>https://risky.biz/BTN146/</link>
            <guid isPermaLink="true">https://risky.biz/BTN146/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN146.mp3" length="34039289" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2126</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about the differences between telcos and cloud companies. Does the nature of the business force cloud companies to be better at security?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about the differences between telcos and cloud companies. Does the nature of the business force cloud companies to be better at security?</p>

<p>This episode is also available on <a href="https://youtu.be/-xDzwi126Ug">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.theregister.com/2025/11/18/fcc_salt_typhoon_rules/">FCC looks to torch Biden-era cyber rules sparked by Salt Typhoon mess</a></li>
										
                    	<li><a href="https://github.com/Netflix/chaosmonkey">Netflix&#39;s Chaos Monkey</a></li>
										
                    	<li><a href="https://x.com/arekfurt/status/1990904718177317363">Brian in Pittsburgh</a></li>
										
                    	<li><a href="https://risky.biz/BTN145/">BTN145</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/Ultra_(cryptography)">Ultra</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: AI-Powered espionage will favor China</title>
            <pubDate>Thu, 20 Nov 2025 12:46:35 +1100</pubDate>
            <link>https://risky.biz/SRB146/</link>
            <guid isPermaLink="true">https://risky.biz/SRB146/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB146.mp3" length="20716876" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1288</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Anthropic’s discovery of an “AI-orchestrated” cyber espionage campaign. To Tom, it feels a research project, but it’s pretty clear it will be really useful for threat actors that aren’t focussed on specific high-priority targets. Think ransomware, Chinese intellectual property theft and North Korean hackers. But it won’t be so good for Western intelligence agencies.

They also discuss Google’s legal disruption of the China-based Lighthouse phishing as a service operation. Surprisingly, it seems to be working!

Finally, they talk about why the memory safe Rust language has been a triple win for Android.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Anthropic’s discovery of an “AI-orchestrated” cyber espionage campaign. To Tom, it feels a research project, but it’s pretty clear it will be really useful for threat actors that aren’t focussed on specific high-priority targets. Think ransomware, Chinese intellectual property theft and North Korean hackers. But it won’t be so good for Western intelligence agencies.</p>

<p>They also discuss Google’s legal disruption of the China-based Lighthouse phishing as a service operation. Surprisingly, it seems to be working!</p>

<p>Finally, they talk about why the memory safe Rust language has been a triple win for Android.</p>

<p>This episode is also available on <a href="https://youtu.be/6Wm5XcoECJo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Russia&apos;s cyber war on wheat</title>
            <pubDate>Tue, 18 Nov 2025 07:18:45 +1100</pubDate>
            <link>https://risky.biz/BTN145/</link>
            <guid isPermaLink="true">https://risky.biz/BTN145/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN145.mp3" length="29650941" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1852</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about the strategic “logic” of Russian wiper attacks on the Ukrainian grain sector.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about the strategic “logic” of Russian wiper attacks on the Ukrainian grain sector.</p>

<p>This episode is also available on <a href="https://youtu.be/UAeeWSiXHZ4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/">ESET report</a></li>
										
                    	<li><a href="https://www.lawfaremedia.org/article/offensive-cyber-operations-and-combat-effectiveness-after-ukraine">Soesanto and Gajos at Lawfare</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys</title>
            <pubDate>Fri, 14 Nov 2025 13:45:06 +1100</pubDate>
            <link>https://risky.biz/RBNEWS504/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS504/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS504.mp3" length="7933605" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>468</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Europol takes down servers behind three malware operations, the US sanctions another Burmese military group linked to scam compounds, Google backs down from mandatory Android developer registration, and Checkout-dot-com donates its ransom to cybercrime researchers instead of paying hackers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Europol takes down servers behind three malware operations, the US sanctions another Burmese military group linked to scam compounds, Google backs down from mandatory Android developer registration, and Checkout-dot-com donates its ransom to cybercrime researchers instead of paying hackers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-europol-takes-down-elysium-venomrat-and-rhadamanthys-infrastructure/">Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys infrastructure</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Meta&apos;s fraud profit scandal</title>
            <pubDate>Thu, 13 Nov 2025 12:35:03 +1100</pubDate>
            <link>https://risky.biz/SRB145/</link>
            <guid isPermaLink="true">https://risky.biz/SRB145/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB145.mp3" length="17745654" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1103</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about a new Reuters’ report that reveals how Meta is knowingly raking in cash from scam advertisements. It’s around $16 billion worth, and in documents Meta calculates that it outweighs the costs of possible regulatory action.

They also discuss recent state-backed supply chain attacks that have, so far, remained targeted and responsible. Finally they look at the UK’s decision to stop sharing intelligence with the US about suspected drug boats in the Caribbean.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about a new Reuters’ report that reveals how Meta is knowingly raking in cash from scam advertisements. It’s around $16 billion worth, and in documents Meta calculates that it outweighs the costs of possible regulatory action.</p>

<p>They also discuss recent state-backed supply chain attacks that have, so far, remained targeted and responsible. Finally they look at the UK’s decision to stop sharing intelligence with the US about suspected drug boats in the Caribbean.</p>

<p>This episode is also available on <a href="https://youtu.be/6G1xLJrU_oY">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Another Chinese security firm has its data leaked</title>
            <pubDate>Wed, 12 Nov 2025 10:13:15 +1100</pubDate>
            <link>https://risky.biz/RBNEWS503/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS503/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS503.mp3" length="5775591" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>334</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Internal data leaks from another Chinese security firm, a US Congressional Budget Office breach has not been contained, the Cyber infosharing act likely to be extended until January, and we have a new OWASP Top 10.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Internal data leaks from another Chinese security firm, a US Congressional Budget Office breach has not been contained, the Cyber infosharing act likely to be extended until January, and we have a new OWASP Top 10.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-another-chinese-security-firm-has-its-data-leaked/">Risky Bulletin: Another Chinese security firm has its data leaked</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Why AI in malware is lame</title>
            <pubDate>Tue, 11 Nov 2025 07:44:05 +1100</pubDate>
            <link>https://risky.biz/BTN144/</link>
            <guid isPermaLink="true">https://risky.biz/BTN144/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN144.mp3" length="28727803" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1794</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how cyber criminals and even state actors are being dumb about using AI.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how cyber criminals and even state actors are being dumb about using AI.</p>

<p>This episode is also available on <a href="https://youtu.be/E71VoECXKp4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools">Google&#39;s AI Threat Tracker</a></li>
										
                    	<li><a href="https://medium.com/@TalBeerySec/follow-the-script-why-attackers-are-winning-the-ai-arms-race-39de80748d09">Script framework</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Myanmar scam compound goes boom!</title>
            <pubDate>Mon, 10 Nov 2025 13:43:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWS502/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS502/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS502.mp3" length="8028969" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>474</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Myanmar starts demolishing the KK Park scam compound, the US Congressional Budget Office gets hacked by a foreign APT, Chrome will remove risky X-S-L-T support, and scammers in Singapore will get the cane.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Myanmar starts demolishing the KK Park scam compound, the US Congressional Budget Office gets hacked by a foreign APT, Chrome will remove risky X-S-L-T support, and scammers in Singapore will get the cane.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Prowler uses AI how AI works best</title>
            <pubDate>Mon, 10 Nov 2025 07:12:00 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI107/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI107/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI107.mp3" length="18525435" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1157</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis chats to Toni de la Fuente, founder and CEO of Prowler, an open source platform for cloud security. They chat about how and why Prowler selectively applies AI to ensure it adds value rather than just because they can.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis chats to Toni de la Fuente, founder and CEO of Prowler, an open source platform for cloud security. They chat about how and why Prowler selectively applies AI to ensure it adds value rather than just because they can.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
    </channel>
</rss>
