Podcasts

News, analysis and commentary

Srsly Risky Biz: Why get a warrant when you have Kash?

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about FBI Director Kash Patel admitting to Congress that the Bureau is buying American’s location data and using it to generate valuable intelligence. That’s concerning, because commercially available information can be used in tremendously invasive ways and the FBI can buy it without needing a warrant.

They also discuss the FCC’s surprising move to ban foreign-made consumer routers. It’s not about security, it is just about reshoring manufacturing.

And finally they discuss the Trump administration’s plan for unleashing the private sector.

This episode is also available on Youtube.

Srsly Risky Biz: Why get a warrant when you have Kash?
0:00 / 21:12

Risky Business #830 -- LiteLLM and security scanner supply chains compromised

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They talk through:

  • TeamPCP’s supply chain attack on Github, and they threw in an anti-Iran wiper, because why not?!
  • Anthropic hooks up its models to just… use your whole computer
  • After Stryker’s Very Bad Day, CISA says maybe add some more controls around your Intune?
  • Another iOS exploit kit shows up in the cyber bargain-bin
  • The FTC decides to ban… all new home routers?! U wot m8?!
  • Supermicro founder was personally sanction-busting Nvidia GPUs into China?!

This week’s episode is sponsored by enterprise browser maker, Island. Chief Customer Officer Bradon Rogers joins Pat to explain how its customers are using Island to control the use of personal AI services in regulated industries.

This episode is also available on Youtube.

Risky Business #830 -- LiteLLM and security scanner supply chains compromised
0:00 / 63:53

Risky Bulletin: The CEO of Intellexa is big mad at Greece

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Intellexa’s CEO is angry with Greek authorities, the FTC bans new foreign-made routers, Google launches a threat disruption unit, and German police warned companies about software bugs… in the middle of the night.

Risky Bulletin: The CEO of Intellexa is big mad at Greece
0:00 / 6:35

Between Two Nerds: Its raining iOS exploit kits!

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss how Google just keeps on finding iOS exploit kits. Is iPhone security busted? And why are Russian state hackers after crypto?

This episode is also available on Youtube.

Between Two Nerds: Its raining iOS exploit kits!
0:00 / 23:40

Risky Bulletin: Russia's Signal phishing nets thousands of accounts

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Russian intelligence services compromised thousands of Signal accounts, the Trivy vulnerability scanner is abused in a supply chain attack, Oracle issues an out-of-band patch for its Fusion Middleware, and the FBI takes down the Aisuru and Kimwolf botnets.

Risky Bulletin: Russia's Signal phishing nets thousands of accounts
0:00 / 7:01

When disaster strykes

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode of Risky Business Features, James Wilson and Brad Arkin discuss the attack that devastated medtech company Stryker. It turns out the attackers used Microsoft’s inTune to wipe the company’s devices, but what else could they have weaponised?

This podcast basically turned into an incident review of the Stryker incident. Enjoy!

When disaster strykes
0:00 / 40:00

Sponsored: What is Extended Identity Access Management?

Presented by

Casey Ellis
Casey Ellis

Founder, Bugcrowd

In this Risky Business sponsored interview, Casey Ellis chats to Fletcher Heisler, founder and CEO of open source identity provider, Authentik. They chat about Extended Identity Access Management (XIAM), the company’s new acronym that has been seven years in the making.

Sponsored: What is Extended Identity Access Management?
0:00 / 10:39

Risky Bulletin: Second iOS hacking framework found in the wild

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A second iOS hacking framework has been found in the wild, Belgium launches its own government communications app, AWS kills S3 bucketsquatting and a cyberattack cripples car breathalyzers.

Risky Bulletin: Second iOS hacking framework found in the wild
0:00 / 7:01

Srsly Risky Biz: Successful war leaves Iran with one option, its cyber forces

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about how successfully achieving America’s war goals could force Iran to double down on cyber power. It’s resilient to bombing and is the cheapest, quickest way for the regime to get some wins post-war.

They also discuss Meta stepping back from end-to-end encryption on Instagram’s direct messages. There is a time and place for E2EE messages, so good riddance.

Finally, they discuss the one weird trick President Trump uses to make his smartphone conversations useless for foreign intelligence services.

This episode is also available on Youtube.

Srsly Risky Biz: Successful war leaves Iran with one option, its cyber forces
0:00 / 19:11

MCP is Dead

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

James Wilson delivers his take on the state of the Model Context Protocol (MCP) in this solo episode of Risky Business Features. Despite MCP being the technology that made Large Language Models useful and AI Agents possible, the models have shown us they want to use something else instead. They want to use the shell directly, and that is going to have serious cybersecurity consequences.

MCP is Dead
0:00 / 36:42