Podcasts

News, analysis and commentary

Sponsored: Socket CEO Feross Aboukhadijeh on how tracking vulnerabilities isn't enough for open source repositories

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In this Risky Business News sponsored interview, Tom Uren talks to Feross Aboukhadijeh, CEO and Founder of Socket about how open source repositories are riddled with horrible software. Feross explains why it makes a difference if a package is vulnerable, malicious or just unwanted and how current transparency mechanisms such as CVEs and the NVD just aren’t suitable for the challenge of open source repositories.

Sponsored: Socket CEO Feross Aboukhadijeh on how tracking vulnerabilities isn't enough for open source repositories
0:00 / 14:42

Risky Biz News: Trickbot dev arrested in Moscow

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast here.

Risky Biz News: Trickbot dev arrested in Moscow
0:00 / 9:26

Srsly Risky Biz: World vs China cyber security reporting duel

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Patrick Gray
Patrick Gray

CEO and Publisher

In this podcast Tom Uren and Adam Boileau talk about how countries are using cyber security reports and advisories to win friends and influence people; why having gaping holes in US federal government security is situation normal; and efforts to make up for the disappearance of Twitter’s trust and safety team.

Srsly Risky Biz: World vs China cyber security reporting duel
0:00 / 23:20

Risky Biz Soap Box: Mike Wiacek on lazy mode threat hunting

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

This Soap Box edition of the show is with Mike Wiacek, the CEO and Founder of Stairwell.

Stairwell is a platform that creates something similar to an NDR, but for file analysis instead of network traffic. The idea is you get a copy of every unique file in your environment to the Stairwell platform, via a file forwarding agent. You get an inventory that lists where these files exist in your environment, at what times, and from there you can start doing analysis.

If you find a dodgy file you can do all the usual malware analysis type stuff, but you can also do things like immediately find out where else that file is in your organisation, or even where else it was. From there you can identify other files that are similar – variants of those files – and search for those. And you can unpack all this very, very quickly.

This is the type of tool that EDR companies use internally to do threat hunting, but it’s just for you and your org – you can drive it. And as you’ll hear, the idea of a transparent, customisable and programmable security stack is something that’s on-trend at the moment. Mike lays out the case that doing this sort of file analysis in your organisation makes a whole lot of sense.

Risky Biz Soap Box: Mike Wiacek on lazy mode threat hunting
0:00 / 31:20

Risky Biz News: Kasperksy winds down US business

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast here.

Risky Biz News: Kasperksy winds down US business
0:00 / 8:24

Between Two Nerds: The great game, cyber edition

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

The Grugq
The Grugq

Independent Security Researcher

In this edition of Between Two Nerds Tom Uren and The Grugq discuss Shashank Joshi’s notes from a recent Oxford Cyber forum. Topics include the role of 0days and who is ahead when it comes to offensive cyber operations.

The pair refer to observations made in this thread.

Between Two Nerds: The great game, cyber edition
0:00 / 22:47

Sponsored: runZero on keeping up with CISA's KEV list

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In this Risky Business News sponsored interview, Tom Uren talks to Rob King, Director of Security Research at runZero, about keeping up with the stream of vulnerabilities in the KEV list and OT devices and runZero’s research into the SSH protocol.

Sponsored: runZero on keeping up with CISA's KEV list
0:00 / 15:39

Risky Biz News: AT&T discloses massive hack

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast here.

Risky Biz News: AT&T discloses massive hack
0:00 / 7:11

Risky Biz News: Apple warns iPhone users of new spyware attacks

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast here.

Risky Biz News: Apple warns iPhone users of new spyware attacks
0:00 / 9:07

Wide World of Cyber: State directed cybercrime

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Alex Stamos
Alex Stamos

CISO, Sentinel One

Chris Krebs
Chris Krebs

Chief Intelligence and Public Policy Officer, Sentinel One

In this podcast Alex Stamos, Chris Krebs and Patrick Gray discuss the relationship between cybercrime and the state, which is often more complicated than it should be.

While the US Government and its allies fight the scourge of ransomware, other governments are using it to either raise revenue or irritate their foes. North Korea sees ransomware as a money spinner, while the Kremlin enjoys poking the west in the eye with it.

Join us for a breakdown of the relationships between governments who should know better and the worst types of people on the planet.

Wide World of Cyber: State directed cybercrime
0:00 / 39:41