Risky Business #673 -- When throwing computers into a woodchipper is standard IR

UEFI rootkits are properly in the wild now...

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • Why Entrust being ransomwared is good news
  • UEFI bootkits turn hardware into landfill
  • Microsoft resumes macro blocking rollout
  • Pat and Adam talk about why plugging your IDP into legacy apps is a dreadful idea
  • Much, much more

This week’s sponsor guest is Paul “The Voice” Lanzi of Remediant. He’s popping along to talk about the emergence of a new product category – Identity Threat Detection and Response, or ITDR.

RBTALKS2: How the Belarusian Cyber Partisans learned from real spies

A chat with The Grugq…

Catalin Cimpanu will be back later this week with more Risky Business News podcasts, but until then we’ve got this great feature interview for you.

In this podcast interview Seriously Risky Business newsletter writer Tom Uren talks to The Grugq about the Belarusian Cyber Partisans. The group first emerged in 2019 to zero fanfare when its early campaigns fell flat. But its tactics have improved and these days it’s giving the Belarusian government some serious headaches.

They’ve disrupted railways, infiltrated intelligence agencies and stolen massive government databases and troves of Belarusian audio intercepts including Interior Ministry intercepts from foreign embassies in Belarus. But how did they evolve into an effective group?

We think it’s because they’ve independently reinvented how professional intelligence agencies do business. We talk about the Cyber Partisans and the intelligence cycle, which encompasses planning, collection, processing and exploitation, analysis and dissemination.

Grugq and Tom discuss the Cyber Partisans in relation to the intelligence cycle and how the group is not only doing collection and exploitation but has more recently invested in analysis and dissemination, turning raw intelligence into something that will have impact.

Risky Business #672 -- "Expected behaviour" is in the eye of the beholder

When one person's bug is another person's feature…

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including:

  • A look at the DHS Cyber Safety Review Board’s Log4j report
  • Joshua Schulte no longer the “alleged” Vault7 leaker
  • Chinese APT crews targeted US political journalists before Jan 6
  • Ransomware gangs make leak sites searchable
  • Why recovering plaintext passwords from Okta is expected behaviour
  • US Government seizes North Korean ransomware payment
  • Much, much more

This week’s show is brought to you by Trail of Bits. Dan Guido is this week’s sponsor guest and he’ll tell us about work Trail of Bits did for DARPA on investigating blockchain security fundamentals.

Risky Business #671 -- The case for an American-owned NSO Group

PLUS: Microsoft flip flops on changes to macro defaults...

On this week’s show Patrick Gray and guest cohost Dmitri Alperovitch discuss the week’s security news, including:

  • Why an American defence contractor acquiring NSO Group would be a nonproliferation win
  • A look at Microsoft’s botched macro measures
  • iPhone’s Lockdown Mode
  • Ukraine goes big on Yubikeys
  • Aerojet Rocketdyne pays millions over poor security controls, CISO whistleblower gets bag of cash
  • Much, much more

This week’s show is sponsored by Proofpoint. Ryan Kalember, Proofpoint’s Executive Vice President of Cybersecurity Strategy, joins us in this week’s sponsor interview to talk about changes he’s observed in the criminal ecosystem.

Risky Biz Soap Box: Running a global vulnerability management program

In short, it's hard...

Today’s soap box is brought to you by Nucleus Security.

Nucleus makes a platform that ingests vulnerability scan information from all your vuln scanning tech so that you can do things like assign different vulnerabilities to different teams to manage and remediate. Send these ones to infrastructure, send these ones to app teams, send everything up and down this stack to this department etc.

If you want to see Nucleus in action I have recorded a demo and it’s on our YouTube product demos page, I’ve linked through to it in the show notes for this podcast.

Our guest in this episode is Scott Kuffer, co-founder of Nucleus, and the topic is running a vulnerability management program in a very large enterprise.

Srsly Risky Biz #3 — China Gonna China

PLUS: Microsoft under fire for its report on cyber-attacks in Ukraine.

This podcast is a discussion between Patrick Gray and Tom Uren on the big stories affecting people in cyber policy.

It’s based on the latest Seriously Risky Business newsletter, which you can find here.

Risky Business #670 -- China's world record data breach

A billion records from Shanghai police servers for sale...

On this week’s show Patrick Gray and guest cohost Mark Piper discuss the week’s security news, including:

  • A billion records leaked in China
  • China to develop desktop operating system
  • HackerOne fires insider for stealing hackers’ work and bounties
  • FSB officer charged with stealing hacker’s bitcoin
  • Why Microsoft is wrong on Russia and Ukraine
  • Much, much more

Red Canary’s Adam Mashinchi and Brian Donohue will be along in this week’s sponsor interview to talk about Atomic Red Team, the open source adversary emulation framework they help to maintain.


SUBSCRIBE NOW:
Risky Business main podcast feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Our extra podcasts feed:
Listen on Apple Podcasts Listen on Overcast Listen on Pocket Casts Listen on Spotify Subscribe with RSS
Subscribe to our newsletters: