Podcasts

News, analysis and commentary

Risky Bulletin: Supply chain attack plants backdoor on Android tablets

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.

Risky Bulletin: Supply chain attack plants backdoor on Android tablets
0:00 / 8:18

History Repeats: Security in the AI Agent Era

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

AI agents are being deployed with the same trust-by-default architecture the early internet had. Same mistakes, MUCH faster timeline.

OpenClaw has hit 180K+ GitHub stars. But in the past week:

  • 341 malicious skills on ClawHub were distributing Atomic Stealer
  • ZeroPath disclosed a Browser Relay vuln enabling cross-tab cookie theft
  • CrowdStrike, Cisco, and Bitdefender all published enterprise advisories
  • VirusTotal partnered with ClawHub to scan uploads
  • Korean tech firms (Kakao, Naver, Karrot) banned it on corporate networks
  • 1,000+ Open PRs, 250+ less than 24 hours old.

But how does this thing actually work? Join James Wilson as he explains why banning these types of agents doesn’t work, why browser sessions are now API surfaces, and why your organisation needs to think of these issues early or be condemned to decades of catch-up programs.

History Repeats: Security in the AI Agent Era
0:00 / 29:56

Between Two Nerds: Buying the magic weapon

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.

This episode is also available on Youtube

Between Two Nerds: Buying the magic weapon
0:00 / 28:18

Risky Bulletin: Cambodia promises to dismantle scam compounds by April

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.

Risky Bulletin: Cambodia promises to dismantle scam compounds by April
0:00 / 8:52

Sponsored: Filtering the KEV was really hard … Until now!

Presented by

Casey Ellis
Casey Ellis

Founder, Bugcrowd

In this sponsored interview Casey Ellis chats to Tod Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.

Sponsored: Filtering the KEV was really hard … Until now!
0:00 / 23:58

Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A Malware developer faked his own death to evade the FBI, Apple patches a zero-day used in a targeted attack, the Tianfu Cup quietly returns, and researchers spot the first malicious Outlook add-in.

Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI
0:00 / 7:11

Srsly Risky Biz: Microsoft forgoes its secure future

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about Microsoft CEO Satya Nadella’s messaging around personnel changes at the top of its security organisation. These signal a focus on selling security products rather than on making secure products.

They also discuss Expedition Cloud, a Chinese cyber range that replicated the critical infrastructure of neighbouring countries, apparently to develop and fine-tune cyber disruption operations.

Finally, they talk about what we’ve learnt about the role of cyber operations in the US bombing of Iranian nuclear facilities. It was far bigger than we previously thought.

This episode is also available on Youtube.

Srsly Risky Biz: Microsoft forgoes its secure future
0:00 / 19:50

Risky Business #824 -- Microsoft's Secure Future is looking a bit wobbly

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:

  • Microsoft reshuffles security leadership. It doesn’t spark joy.
  • Russia is hacking the Winter Olympics. Again. But y tho?
  • China-linked groups are keeping busy, hacking telcos in Norway, Singapore and dozens of others
  • Campaigns underway targeting Ivanti, BeyondTrust and SolarWinds products
  • An unknown hero blocks 23/tcp on the US internet backbone
  • And James Wilson pops into talk about Claude’s go at a C compiler

This week’s episode is sponsored by Ent.AI, an AI startup that isn’t quite ready to tell us all what they’re doing. But nevertheless, founder Brandon Dixon joins to discuss AI’s role in security. Where does language-based understanding take us that previous methods couldn’t?

This episode is also available on Youtube.

Risky Business #824 -- Microsoft's Secure Future is looking a bit wobbly
0:00 / 56:13

Risky Bulletin: Chinese cyber-spies breached all of Singapore's telcos

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

China has breached all of Singapore’s major telcos, Microsoft announces two new security features, a hacktivist leaks data from a stalkerware provider, and researchers map out “GRU information warfare units” based on their insignia.

Risky Bulletin: Chinese cyber-spies breached all of Singapore's telcos
0:00 / 6:48

Between Two Nerds: Why we are doomed to insecurity

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq talk about why the world is destined to be perpetually insecure.

This episode is also available on Youtube.

Between Two Nerds: Why we are doomed to insecurity
0:00 / 27:15