Risky Biz News: No jail time for Uber's Joe Sullivan

PLUS: Google accounts get Passkey support; MSI's private keys leak after ransomware attack; and the US takes down the Pay2Check card-checking service.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Snake Oilers: Resourcely, Panther and Island

Automagic Terraform, a practitioner-developed cloud-SIEM and a true enterprise browser…

In this edition of Snake Oilers:

  • Travis McPeak pitches Resourcely’s automagic Terraform cloud-provisioning technology
  • Ken Westin pitches Panther – a cloud-native SIEM developed by former practitioners
  • Brian Kenyon from Island talks about the company’s enterprise browser

Enjoy!

Srsly Risky Biz: Iran Fake’s It Till It Makes It

PLUS: the real significance of China's new counter-espionage law...

In this podcast Patrick Gray and Tom Uren take a whirlwind tour examining the different ways countries conduct cyber-enabled influence operations. Iran, China and the UK all have different approaches and we have our favourite.

China has a new counter-epsionage law and even though it hasn’t been formerly passed yet already foreign companies are getting in trouble for doing due diligence or corporate intelligence type work. The real point here is to tighten information control, and the wording is so broad that it leaves tremendous scope for the PRC to use the law whenever it wants to send a message.

Finally, the two discuss concrete examples of intelligence derived from Section 702 of the US FISA Act. 702 allows US intelligence agencies to compel service providers to help conduct targeted surveillance of foreigners outside the US and will expire at the end of the year unless Congress renews it.

Risky Biz News: Apple and Google partner to kill AirTag stalking

PLUS: US Marshals still recovering from February ransomware; Sandworm nukes another Ukrainian network; and Israel power outages were the result of technical issues, not cyberattacks.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Business #704 -- Why LLMs aren't an exploit bonanza

PLUS: Mysterious hacker doxes Russian intelligence bitcoin addresses, steals holdings…

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • Rob Joyce weighs in on AI and offsec
  • Mysterious hacker doxes Russian intelligence agency bitcoin wallets
  • Wired deep dives on SolarWinds
  • AmeriCold food logistics giant suffers incident
  • Iranian authorities roll low-tech spyware
  • Much, much more

This week’s show is brought to you by Greynoise. Its founder and CEO Andrew Morris is this week’s sponsor guest.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

Between Two Nerds: Cyber Deterrence part II

Even more about deterrence!

In this edition of Between Two Nerds Tom Uren and The Grugq dive further into deterrence based on both reader feedback and recent news about Iranian destructive operations. One of the requirements for effective deterrence is transparency and people sometimes assume that states have good information about what their cyber operators are doing. But we discuss the universal incentives that encourage state actors to exaggerate their current operations. If this is happening deterrence won’t work because leaders will think they are already getting away with murder.

Risky Biz News: Cl0p goes all-in on Papercut bug

PLUS: Google disrupts the CryptBot malware operation; Tencent software updates delivered APT malware; and Chinese security firms helped push Beijing's anti-US propaganda.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Srsly Risky Biz: North Korea's "Vibes-based" targeting

PLUS: Iran Cries Havoc and Lets Slip the Dogs of Cyber...

In this podcast Patrick Gray talks to Tom Uren about North Korea’s “double” or “threaded” supply chain attack via Trading Technologies and 3CX. This type of “access begets access” approach makes total sense and Tom thinks it will likely be a standard approach for North Korea. Microsoft has released a couple of reports over the month that indicate Iran is increasingly willing to launch destructive cyber attacks. One Iranian group, Mango Sandstorm, has been destroying on-prem and cloud environments. Another, Mint Sandstorm, has been targeting a wide swathe of US critical infrastructure. It’s a worry.

Finally, Tom and Pat discuss cyber security company Team Cyrmu’s sale of netflow to US government agencies, which has been controversial in the press because of potential privacy violations. Tom spoke to the company and based on what we learnt there isn’t a privacy concern here. But the broader principle that data purchases be examined for privacy risks still stands.

Risky Business #703 -- Russia whines about its tech dependence on China

PLUS: Yo dawg, I hear you like supply chain attacks so I put a supply chain attack in your supply chain attack...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • The supply chain attack in the supply chain attack
  • Russia has a China dependency problem
  • Recent research into TLS resumption flaws
  • Google and Intel team up on hardware hacking
  • DHS will hack enterprise kit
  • Much, much more

This week’s show is brought to you by Corelight. Brian Dye, Corelight’s CEO, is this week’s sponsor guest. He’s talking about the (actually sensible) ChatGPT-driven features Corelight has built into its NDR platform.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

Between Two Nerds: Cyber Deterrence

Deterrence is a real thing, but how does it apply in the cyber domain?

In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether cyber operations are any good at deterrence. Tom thinks that attributes of the domain mean that it is just no good for deterrence. The Grugq, however, thinks that it can be, although perhaps not in a state vs state context.

Snake Oilers: Socket, Teleport and Mandiant's Purple Team

Roll up roll up!

Snake Oilers isn’t our regular weekly podcast, it’s a wholly sponsored series we do at Risky.Biz where vendors come on to the show to pitch their products to you, the Risky Business listener. To be clear – everyone you hear in one of these editions, paid to be here.

We’ll hear from three vendors in this edition of Snake Oilers:

  • Socket.dev, a software supply chain product that currently deploys as a GitHub addon
  • Teleport, a company that makes a secure access gateway/single sign on product for engineers to securely access infrastructure
  • Mandiant joins us to pitch its Purple Team engagement product

Enjoy!

Srsly Risky Biz: After Viasat, Space Systems Get Scrutiny

PLUS: Cyber diplomacy and disaster relief take flight...

In this podcast Patrick Gray talks to Tom Uren about a report by CSC 2.0 that recommends the US government designate space systems as critical infrastructure. Lots of satellites systems are already covered under other critical infrastructure sectors such as communication or defence, but Tom agrees that there are some good reasons to carve out a space-specific critical infrastructure sector.

They also talk about the US State Department working on developing a portfolio of cyber diplomacy “offerings”, ranging from disaster relief funding, to technical capacity building, through to policy-level cyber education. This seems like a great idea.

Risky Business #702 -- 3CX: It's like SolarWinds, but stupider

PLUS: Why Wiz's latest AzureAD research is worth a second look...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • Why 3CX was the dumbest supply chain attack we’ve seen
  • Why Wiz’s AzureAD research was a showstopper that didn’t get the attention it deserved
  • How attackers are burning down cloud infrastructure
  • The latest from the world of spyware
  • Much, much more

This week’s show is brought to you by Nucleus Security. Chris Hughes from Aquia is this week’s sponsor guest. He appeared at Nucleus Security’s invitation.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

Between Two Nerds: The NCF's Practical Guide to Offensive Cyber Operations

The UK's National Cyber Force explains how it uses offensive cyber operations to mess with people...

In this edition of Between Two Nerds Tom Uren and The Grugq discuss the UK’s National Cyber Force’s recently published “Responsible Cyber Power in Practice” document. The Grugq thinks he’s been plagiarised, while Tom wonders whether the NCF’s “doctrine of cognitive effects” highlights the limits of cyber operations. It’s a good document and will be influential in shaping how people discuss offensive operations (those that disrupt, degrade, destroy etc).


SUBSCRIBE NOW:
Risky Business main podcast feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Our extra podcasts feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Subscribe to our newsletters: