Podcasts

News, analysis and commentary

Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Russia will use a custom crypto-algorithm for its 5G network, the Hungarian opposition accuses the government of using spyware, Kaspersky says it tied Coruna to the “Operation Triangulation” attacks, and malware was deployed on thousands of Luxembourg government phones.

Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network
0:00 / 6:53

Interview: Former NSA and CIA cyber leaders on offensive AI

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this interview you’ll hear former NSA executive Rob Joyce and former CIA cyber intelligence leader Andy Boyd talk to host Patrick Gray about how AI is changing the state of art in offensive security.

Recorded in front of a live audience at the Decibel Oasis side event next door to the RSA Conference in San Francisco, the trio also talk about why a series of iOS exploit chain leaks don’t seem to be stirring up a scandal.

Interview: Former NSA and CIA cyber leaders on offensive AI
0:00 / 15:04

Soap Box: Red teaming AI systems with SpecterOps

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

In this sponsored Soap Box edition of the show, Patrick Gray and James Wilson talk about red teaming AI systems with Russel Van Tuyl, Vice President of Services at elite penetration testing firm SpecterOps.

SpecterOps is the company behind attack path enumeration tool Bloodhound and Bloodhound Enterprise, but they’re also a pentest and red teaming shop with world class expertise in popping shells on all sorts of interesting systems in all sorts of interesting places.

This episode is also available on Youtube.

Soap Box: Red teaming AI systems with SpecterOps
0:00 / 30:11

Srsly Risky Biz: Why get a warrant when you have Kash?

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about FBI Director Kash Patel admitting to Congress that the Bureau is buying American’s location data and using it to generate valuable intelligence. That’s concerning, because commercially available information can be used in tremendously invasive ways and the FBI can buy it without needing a warrant.

They also discuss the FCC’s surprising move to ban foreign-made consumer routers. It’s not about security, it is just about reshoring manufacturing.

And finally they discuss the Trump administration’s plan for unleashing the private sector.

This episode is also available on Youtube.

Srsly Risky Biz: Why get a warrant when you have Kash?
0:00 / 21:12

Risky Business #830 -- LiteLLM and security scanner supply chains compromised

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They talk through:

  • TeamPCP’s supply chain attack on Github, and they threw in an anti-Iran wiper, because why not?!
  • Anthropic hooks up its models to just… use your whole computer
  • After Stryker’s Very Bad Day, CISA says maybe add some more controls around your Intune?
  • Another iOS exploit kit shows up in the cyber bargain-bin
  • The FTC decides to ban… all new home routers?! U wot m8?!
  • Supermicro founder was personally sanction-busting Nvidia GPUs into China?!

This week’s episode is sponsored by enterprise browser maker, Island. Chief Customer Officer Bradon Rogers joins Pat to explain how its customers are using Island to control the use of personal AI services in regulated industries.

This episode is also available on Youtube.

Risky Business #830 -- LiteLLM and security scanner supply chains compromised
0:00 / 63:53

Risky Bulletin: The CEO of Intellexa is big mad at Greece

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Intellexa’s CEO is angry with Greek authorities, the FTC bans new foreign-made routers, Google launches a threat disruption unit, and German police warned companies about software bugs… in the middle of the night.

Risky Bulletin: The CEO of Intellexa is big mad at Greece
0:00 / 6:35

Between Two Nerds: Its raining iOS exploit kits!

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss how Google just keeps on finding iOS exploit kits. Is iPhone security busted? And why are Russian state hackers after crypto?

This episode is also available on Youtube.

Between Two Nerds: Its raining iOS exploit kits!
0:00 / 23:40

Risky Bulletin: Russia's Signal phishing nets thousands of accounts

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Russian intelligence services compromised thousands of Signal accounts, the Trivy vulnerability scanner is abused in a supply chain attack, Oracle issues an out-of-band patch for its Fusion Middleware, and the FBI takes down the Aisuru and Kimwolf botnets.

Risky Bulletin: Russia's Signal phishing nets thousands of accounts
0:00 / 7:01

When disaster strykes

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode of Risky Business Features, James Wilson and Brad Arkin discuss the attack that devastated medtech company Stryker. It turns out the attackers used Microsoft’s inTune to wipe the company’s devices, but what else could they have weaponised?

This podcast basically turned into an incident review of the Stryker incident. Enjoy!

When disaster strykes
0:00 / 40:00

Sponsored: What is Extended Identity Access Management?

Presented by

Casey Ellis
Casey Ellis

Founder, Bugcrowd

In this Risky Business sponsored interview, Casey Ellis chats to Fletcher Heisler, founder and CEO of open source identity provider, Authentik. They chat about Extended Identity Access Management (XIAM), the company’s new acronym that has been seven years in the making.

Sponsored: What is Extended Identity Access Management?
0:00 / 10:39