Podcasts

News, analysis and commentary

Mythos smythos! How to find 0day with lesser models

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this podcast James Wilson chats with Niels Provos about his research into using older AI models to successfully hunt for 0day vulnerabilities. Niels has had a long and prolific career in cybersecurity, having worked as a Distinguished Engineer at Google and then heading up security at Stripe.

His interest in AI bug hunting was piqued recently when one of the Mythos 0day vulnerabilities that received lots of attention happened to be in code he wrote for the OpenBSD project 27 years ago.

It got him thinking: Are these frontier models really that magical? Or could we replicate their findings with some clever orchestration instead of relying on the model’s smarts to find bugs with a single prompt?

As it turns out, this was worth looking into. Niels’ orchestration framework, Iron Curtain, works extremely well.

This episode is also available on YouTube

Mythos smythos! How to find 0day with lesser models
0:00 / 87:53

Risky Bulletin: State sponsored group exploits Palo 0day

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Palo Alto Networks patches a firewall zero-day, Google patches an Android remote takeover bug, Ivanti also patches one, and a leak exposes Russia’s spy and hacker school.

Risky Bulletin: State sponsored group exploits Palo 0day
0:00 / 7:55

Srsly Risky Biz: After Mythos, US government weighs AI regulation

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and James Wilson talk about the sudden drive to put regulation around the releases of new AI models because of their cyber security implications. A standardised approach is desirable, but clamping down too hard won’t achieve as much as might be hoped. Experts with older or even open models can get just as far as novices with the latest models.

They also discuss Australia’s new Cyber Incident Review Board. It has been hamstrung and won’t be as successful as it could be because it can’t assign blame.

This episode is also available on YouTube

Srsly Risky Biz: After Mythos, US government weighs AI regulation
0:00 / 22:32

Risky Bulletin: Targeted supply chain attack hits DAEMON Tools

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

The DAEMON Tools website was hit in a targeted supply chain attack, Australia gets its own CSRB, the US arrests a wanted VOIP server hacker after 17 years, and Oracle switches to monthly security updates.

Risky Bulletin: Targeted supply chain attack hits DAEMON Tools
0:00 / 8:48

Risky Business #836 -- You can't patch the bugpocalypse

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray and James Wilson are joined by special guest co-host Brad Arkin. They discuss the week’s cybersecurity news, including:

  • The US Government says we just have to patch faster, but…
  • Bugs in cPanel, MoveIt and all Linux distributions this week show that patching alone isn’t enough
  • James gets mad about lame AI Agent adoption advice from the US and Australian Governments
  • James Kettle and Niels Provos both showed us that any model can find 0day like Mythos
  • And the cyber-assisted theft of cargo results in an astonishing loss of $725 million dollars

This week’s show is sponsored by SpecterOps. Their CTO, Jared Atkinson, chats to Pat about the big changes in the threat landscape, brought about by AI, that are causing a pivot away from detection and remediation, and toward prevention.

This episode is also available on Youtube.

Risky Business #836 -- You can't patch the bugpocalypse
0:00 / 61:56

Between Two Nerds: The wild wild west

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss the breakdown of cyber norms. What would have been an unthinkable cyber operation just a few years ago is now a regular occurrence.

This episode is also available on YouTube.

Between Two Nerds: The wild wild west
0:00 / 31:57

Solving the AI agent identity problem

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this podcast James Wilson and Brad Arkin chat about emerging trends in AI agent identity and credential management. Brad was formerly the CISO of Adobe, Cisco and Salesforce, and is now working with all sorts of companies that are deploying AI.

With everyone now in at least a large-scale pilot of agentic AI, the issue of how to manage agent identities and credentials is still an unsolved problem. But, some interesting patterns are emerging.

Solving the AI agent identity problem
0:00 / 40:21

Risky Bulletin: DigiCert hacked with a malicious screensaver file

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

DigiCert got hacked via a malicious screensaver file, two ransomware negotiators each get four years in prison, Trellix discloses a security breach, and another Russian hacker gets arrested while vacationing in the wrong place.

Risky Bulletin: DigiCert hacked with a malicious screensaver file
0:00 / 9:45

Sponsored: James Kettle built an AI hacker

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this sponsored interview, James Wilson talks with James Kettle and Daf Stuttard from PortSwigger about the incredible research James will unveil at Black Hat US this July, and how that research will be productised into Burp Suite. It shouldn’t be surprising that when James Kettle bolts an LLM into his research methodology that insanely dangerous things happen. This interview is a window into the future of AI-enabled hacking and security testing.

This interview is also available on YouTube.

Sponsored: James Kettle built an AI hacker
0:00 / 24:56

Risky Bulletin: cPanel auth bypass exploited in wild

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

The Copy Fail vulnerability impacts all Linux distros going back to 2017, hackers are exploiting a cPanel auth bypass, every Moldovan citizen has their data stolen, and some scam compounds got raided raided… in Dubai.

Risky Bulletin: cPanel auth bypass exploited in wild
0:00 / 13:05