Podcasts

News, analysis and commentary

Between Two Nerds: How AI will upset state cyber competition

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss how the rise of AI, which is very good at vulnerability and exploit development, will change the cyber security industry and competition between states.

This episode is also available on YouTube

Between Two Nerds: How AI will upset state cyber competition
0:00 / 29:52

Mythos and 0day: A hacker’s perspective

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode of Risky Business Features, James Wilson chats to professional hacker Jamieson O’Reilly about Anthropic’s Mythos and the impact it could have on offensive security. Jamieson is CEO of DVULN and co-founder of Aether AI. He’s been hacking into organisations for more than a decade, and knows a thing or two about combining AI and offensive security.

Mythos and 0day: A hacker’s perspective
0:00 / 32:54

Risky Bulletin: France takes first steps to ditch Windows for Linux

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

France prepares to ditch Windows for Linux, OpenAI was impacted by the Axios supply chain attack, Rockstar Games gets hacked again, and Adobe patches a reader zero-day.

Risky Bulletin: France takes first steps to ditch Windows for Linux
0:00 / 6:36

Sponsored: Corelight Agentic Triage helps defenders stay ahead

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this sponsored interview, Corelight’s Senior Director of Product Management, Dave Getman, tells James Wilson how Corelight Agentic Triage helps defenders stay ahead of AI-powered attacks.

Corelight makes NDR hardware that runs a heavily optimised version of the Zeek network monitoring tool. Corelight Agentic Triage integrates with EDR and other data sources, and helps defenders make sense of all the data that NDR can generate.

Sponsored: Corelight Agentic Triage helps defenders stay ahead
0:00 / 16:19

Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

The FBI extracted Signal chats from iPhone notifications logs, Los Angeles police data was leaked online, a former Meta employee is under investigation for downloading private photos, and an Adobe Reader zero-day is being exploited in the wild.

Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs
0:00 / 6:49

Snake Oilers: Burp AI, Sondera and Truffle Security

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products:

  • Burp AI and DAST: The founder of PortSwigger and creator of legendary security software Burp Suite, Dafydd Stuttard, drops by to pitch listeners on Burp AI and Burp Suite DAST.

  • Sondera: Josh Devon talks about Sondera, a technology designed to intervene when AI models start doing the wrong thing by statefully tracking their trajectories. This isn’t a permissions suite for AI agents, it’s a way to stick agents in a harness and make sure they adhere to hard policy boundaries.

  • Truffle Security: Dylan Ayrey, the founder of Truffle Security, joins Risky Business again to talk through the latest bells and whistles in Trufflehog, a security tool that searches for exposed secrets and validates them. The Truffle team has done a lot of work on the remediation part of their product over the last few years, and Dylan tells us all about it!

This episode is also available on YouTube

Snake Oilers: Burp AI, Sondera and Truffle Security
0:00 / 48:00

Srsly Risky Biz: American diplomats to fight foreign propaganda... on X

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about the State Department taking to X to counter foreign propaganda. US Secretary of State Marco Rubio dismantled the State Department’s counter-propaganda office when he took charge, but it turns out that giving adversary states free reign online is a bad idea.

They also discuss how America’s lawful intercept systems are high value targets for Chinese hackers. It’s a big deal that part of the FBI’s lawful intercept system has been breached and it is high time that the security of these systems was reviewed.

This episode is also available on Youtube.

Srsly Risky Biz: American diplomats to fight foreign propaganda... on X
0:00 / 19:17

Risky Bulletin: Cybercrime losses passed $20 billion last year

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Cybercrime losses surpassed $20 billion last year, authorities disrupt a Russian router botnet that intercepted email logins, Iran hacks PLCs across the US, and exploitation hits ComfyUI and Flowise-AI-servers.

Risky Bulletin: Cybercrime losses passed $20 billion last year
0:00 / 8:12

What happens after North Korea infiltrates?

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode, investigative journalist Geoff White joins James Wilson for a look into the complex machine that is North Korea’s IT worker infiltration scheme. They discuss the interview process, what happens once the workers are actually hired, how value is maximised for the regime, and how the money moves around. It’s even more diabolical than the headlines divulge.

What happens after North Korea infiltrates?
0:00 / 51:39

Risky Business #832 -- Anthropic unveils magical 0day computer God

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:

  • Anthropic’s new Mythos model hunts bugs and chains exploits together so well that… you cant have it…
  • …Unless you’re one of their Project Glasswing partners
  • The world isn’t short on bugs, though. F5, Fortinet, Progress ShareFile, and TrueConf are all getting rekt by humans
  • GPU Rowhammering goes in the GPU, past the IOMMU and back into the host-side Nvidia driver
  • North Korea is spending serious time and money on its crypto hacking
  • Just when the US needs CISA most, they slash its budget some more!

This week’s episode is sponsored by identity verification firm, Persona. Tying digital actions to actual human identities isn’t just for banking know-your-customer any more. Persona’s Benjamin Chait says know-your-staff checks belong in high-value flows inside your organisation, too.

This episode is also available on Youtube.

Risky Business #832 -- Anthropic unveils magical 0day computer God
0:00 / 53:30