Risky Biz News: Google will delete inactive accounts

PLUS: EU passes cryptocurrency regulations; ransomware attack cripples one of Indonesia's largest banks; Zimbra servers targeted by new MalasLocker ransomware.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Srsly Risky Biz: Crimephones are a cop's best friend

Why crimephones are dead, long live crimephones!

In this edition of the Seriously Risky Biz podcast Patrick Gray and Tom Uren talk about the trajectory of crimephones from criminals’ best friend to greatest liability.

These devices were bad for police at the beginning, but they’ve become a net positive for law enforcement efforts, leading to hundreds of arrests, tonnes of seized drugs and deeper insight into criminal operations.

Risky Biz News: US charges, sanctions WazaWaka

PLUS: Turkish opposition media hit by DDoS attacks on election day; DoD embraces Microsoft Defender; and a new Chinese APT has been backdooring TP-Link routers in Europe.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Business #706 -- Why BlackBerry thinks Cuba ransomware is a Russian front

PLUS: Wazawaka charged and PlugwalkJoe pleads guilty...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • Wazawaka charged, sanctioned
  • PlugwalkJoe extradited, pleads guilty
  • BlackBerry thinks Cuba ransomware is a front for Russian intelligence
  • Anonymous Sudan pops up in Israel
  • Microsoft’s Outlook patch fail
  • Much, much more

This week’s show is brought to you by Bloodhound Enterprise. Andy Robbins is this week’s sponsor guest. He talks about how graph theory could help us to uncover more lolbins.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

Between Two Nerds: The Culture of the Snake

Diving into a the Snake malware report to learn about how the FSB operates...

In this edition of Between Two Nerds Tom Uren and The Grugq look at last week’s Snake malware joint cybersecurity advisory and dive into what it tells us about the FSB.

Selena Larson on how cybercriminals use threat intelligence

Blackhats pay attention to research and intelligence too…

In this Risky Business News sponsor interview Tom Uren asks Proofpoint’s Selena Larson about how threat actors reacted en masse after Microsoft blocked various types of macros.

Cyber criminals used a variety of different techniques to evade these blocks. In part this happened quickly because of knowledge sharing by the cyber threat intelligence community.

Risky Biz News: The VMProtect source code leaks. Again.

PLUS: Intrusion Truth points at Chinese APT nest in Wuhan; NSA and CyberCom's Gen. Nakasone expected to resign later this year; new PPLFault and GoldFault attacks disclosed.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

Risky Business #705 -- USA's Turla takedown marks a shift in tactics

US authorities just aren't as shy as they used to be…

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • Joe Sullivan’s sentencing
  • MSI key material leak
  • Merck to be paid in NotPetya claim
  • The FBI takes down Turla’s Snake malware operation
  • Much, much more

This week’s show is brought to you by Gigamon. Chaim Mazal, Gigamon’s CSO, is this week’s sponsor guest. He’s talking about how the company’s gear is acting as a data source for network security products.

Risky Biz News: DEFCON attendees will target AI models

PLUS: GreenMwizi group targets Booking.com customers; Google offers cheap cybersecurity training courses; new Cactus ransomware gang targets Fortinet VPN appliances.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Sponsor Interview with Material Security's Chris Long

A look at running a modern phishing workflow...

In this Risky Business News sponsor interview Tom Uren asks Material Security’s Director of Security Chris Long about what ittakes to run a “modern” phishing workflow. Chris thinks there are opportunities to take identify and take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.

Risky Biz News: No jail time for Uber's Joe Sullivan

PLUS: Google accounts get Passkey support; MSI's private keys leak after ransomware attack; and the US takes down the Pay2Check card-checking service.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Snake Oilers: Resourcely, Panther and Island

Automagic Terraform, a practitioner-developed cloud-SIEM and a true enterprise browser…

In this edition of Snake Oilers:

  • Travis McPeak pitches Resourcely’s automagic Terraform cloud-provisioning technology
  • Ken Westin pitches Panther – a cloud-native SIEM developed by former practitioners
  • Brian Kenyon from Island talks about the company’s enterprise browser

Enjoy!

Srsly Risky Biz: Iran Fake’s It Till It Makes It

PLUS: the real significance of China's new counter-espionage law...

In this podcast Patrick Gray and Tom Uren take a whirlwind tour examining the different ways countries conduct cyber-enabled influence operations. Iran, China and the UK all have different approaches and we have our favourite.

China has a new counter-epsionage law and even though it hasn’t been formerly passed yet already foreign companies are getting in trouble for doing due diligence or corporate intelligence type work. The real point here is to tighten information control, and the wording is so broad that it leaves tremendous scope for the PRC to use the law whenever it wants to send a message.

Finally, the two discuss concrete examples of intelligence derived from Section 702 of the US FISA Act. 702 allows US intelligence agencies to compel service providers to help conduct targeted surveillance of foreigners outside the US and will expire at the end of the year unless Congress renews it.

Risky Biz News: Apple and Google partner to kill AirTag stalking

PLUS: US Marshals still recovering from February ransomware; Sandworm nukes another Ukrainian network; and Israel power outages were the result of technical issues, not cyberattacks.

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Business #704 -- Why LLMs aren't an exploit bonanza

PLUS: Mysterious hacker doxes Russian intelligence bitcoin addresses, steals holdings…

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • Rob Joyce weighs in on AI and offsec
  • Mysterious hacker doxes Russian intelligence agency bitcoin wallets
  • Wired deep dives on SolarWinds
  • AmeriCold food logistics giant suffers incident
  • Iranian authorities roll low-tech spyware
  • Much, much more

This week’s show is brought to you by Greynoise. Its founder and CEO Andrew Morris is this week’s sponsor guest.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

Between Two Nerds: Cyber Deterrence part II

Even more about deterrence!

In this edition of Between Two Nerds Tom Uren and The Grugq dive further into deterrence based on both reader feedback and recent news about Iranian destructive operations. One of the requirements for effective deterrence is transparency and people sometimes assume that states have good information about what their cyber operators are doing. But we discuss the universal incentives that encourage state actors to exaggerate their current operations. If this is happening deterrence won’t work because leaders will think they are already getting away with murder.


SUBSCRIBE NOW:
Risky Business main podcast feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Our extra podcasts feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Subscribe to our newsletters: