Podcasts

News, analysis and commentary

Sponsor Interview with Material Security's Chris Long

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In this Risky Business News sponsor interview Tom Uren asks Material Security’s Director of Security Chris Long about what ittakes to run a “modern” phishing workflow. Chris thinks there are opportunities to take identify and take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.

Sponsor Interview with Material Security's Chris Long
0:00 / 0:00

Risky Biz News: No jail time for Uber's Joe Sullivan

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: No jail time for Uber's Joe Sullivan
0:00 / 0:00

Snake Oilers: Resourcely, Panther and Island

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

In this edition of Snake Oilers:

  • Travis McPeak pitches Resourcely’s automagic Terraform cloud-provisioning technology
  • Ken Westin pitches Panther – a cloud-native SIEM developed by former practitioners
  • Brian Kenyon from Island talks about the company’s enterprise browser

Enjoy!

Snake Oilers: Resourcely, Panther and Island
0:00 / 0:00

Srsly Risky Biz: Iran Fake’s It Till It Makes It

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Patrick Gray
Patrick Gray

CEO and Publisher

In this podcast Patrick Gray and Tom Uren take a whirlwind tour examining the different ways countries conduct cyber-enabled influence operations. Iran, China and the UK all have different approaches and we have our favourite.

China has a new counter-epsionage law and even though it hasn’t been formerly passed yet already foreign companies are getting in trouble for doing due diligence or corporate intelligence type work. The real point here is to tighten information control, and the wording is so broad that it leaves tremendous scope for the PRC to use the law whenever it wants to send a message.

Finally, the two discuss concrete examples of intelligence derived from Section 702 of the US FISA Act. 702 allows US intelligence agencies to compel service providers to help conduct targeted surveillance of foreigners outside the US and will expire at the end of the year unless Congress renews it.

Srsly Risky Biz: Iran Fake’s It Till It Makes It
0:00 / 0:00

Risky Biz News: Apple and Google partner to kill AirTag stalking

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: Apple and Google partner to kill AirTag stalking
0:00 / 0:00

Risky Business #704 -- Why LLMs aren't an exploit bonanza

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

Adam Boileau
Adam Boileau

Technology Editor

On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They cover:

  • Rob Joyce weighs in on AI and offsec
  • Mysterious hacker doxes Russian intelligence agency bitcoin wallets
  • Wired deep dives on SolarWinds
  • AmeriCold food logistics giant suffers incident
  • Iranian authorities roll low-tech spyware
  • Much, much more

This week’s show is brought to you by Greynoise. Its founder and CEO Andrew Morris is this week’s sponsor guest.

Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that’s your thing.

Risky Business #704 -- Why LLMs aren't an exploit bonanza
0:00 / 0:00

Between Two Nerds: Cyber Deterrence part II

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

The Grugq
The Grugq

Independent Security Researcher

In this edition of Between Two Nerds Tom Uren and The Grugq dive further into deterrence based on both reader feedback and recent news about Iranian destructive operations. One of the requirements for effective deterrence is transparency and people sometimes assume that states have good information about what their cyber operators are doing. But we discuss the universal incentives that encourage state actors to exaggerate their current operations. If this is happening deterrence won’t work because leaders will think they are already getting away with murder.

Between Two Nerds: Cyber Deterrence part II
0:00 / 0:00

Risky Biz News: Hacker exposes Bitcoin addresses operated by Russian intelligence

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: Hacker exposes Bitcoin addresses operated by Russian intelligence
0:00 / 0:00

Risky Biz News: Cl0p goes all-in on Papercut bug

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: Cl0p goes all-in on Papercut bug
0:00 / 0:00

Srsly Risky Biz: North Korea's "Vibes-based" targeting

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Patrick Gray
Patrick Gray

CEO and Publisher

In this podcast Patrick Gray talks to Tom Uren about North Korea’s “double” or “threaded” supply chain attack via Trading Technologies and 3CX. This type of “access begets access” approach makes total sense and Tom thinks it will likely be a standard approach for North Korea. Microsoft has released a couple of reports over the month that indicate Iran is increasingly willing to launch destructive cyber attacks. One Iranian group, Mango Sandstorm, has been destroying on-prem and cloud environments. Another, Mint Sandstorm, has been targeting a wide swathe of US critical infrastructure. It’s a worry.

Finally, Tom and Pat discuss cyber security company Team Cyrmu’s sale of netflow to US government agencies, which has been controversial in the press because of potential privacy violations. Tom spoke to the company and based on what we learnt there isn’t a privacy concern here. But the broader principle that data purchases be examined for privacy risks still stands.

Srsly Risky Biz: North Korea's "Vibes-based" targeting
0:00 / 0:00