Risky Bulletin Podcast feed

Daily podcasts featuring news bulletins and discussion shows...

Risky Bulletin: YouTubers unmask and help dismantle Chinese scam ring

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Two YouTube channels help dismantle a Chinese scam operation, Cloudflare, Zscaler, and Palo Alto disclose Salesloft-related breaches, a ransomware attack disrupts vehicle production at Jaguar Land Rover, and we have a new record DDoS attack.

Risky Bulletin: YouTubers unmask and help dismantle Chinese scam ring
0:00 / 4:24

Between Two Nerds: How threat actors are using AI to run wild

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq talk about how cyber threat actors are using AI tools to fill in resource and skills gaps that they have.

This episode is also available on Youtube.

Between Two Nerds: How threat actors are using AI to run wild
0:00 / 32:17

Risky Bulletin: Noem fires FEMA IT team over alleged cybersecurity failures

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

FEMA’s IT staff fired over an alleged breach, WhatsApp patches a zero-day, the Salesloft breach impacted more than just Salesforce, and a scammer steals $1.5 million dollars from the city of Baltimore.

Risky Bulletin: Noem fires FEMA IT team over alleged cybersecurity failures
0:00 / 5:54

Sponsored: Push Security on the evolution of phishing techniques

Presented by

Casey Ellis
Casey Ellis

Founder, Bugcrowd

In this sponsored interview Casey Ellis chats with Push Security co-founder Jacques Louw. Push’s browser plugin gives a unique level of visibility into how users interact with the web and the attacks they face. Jacques talks through what they’re seeing, and their recently published taxonomy of phishing attacks. It’s on Github for everyone to contribute to!

Sponsored: Push Security on the evolution of phishing techniques
0:00 / 18:05

Risky Bulletin: npm attack uses AI prompts to steal creds, crypto-wallet keys

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Catalin Cimpanu
Catalin Cimpanu

News Editor

An npm supply chain attack uses AI to steal credentials and crypto-wallet keys, Google establishes a cyber disruption unit, a ransomware attack disrupts more than 200 Swedish municipalities, and Salt Typhoon hacks have now hit more than 80 countries.

Risky Bulletin: npm attack uses AI prompts to steal creds, crypto-wallet keys
0:00 / 7:38

Srsly Risky Biz: America wants to hack the planet

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about proposed legislation that would allow the President to license private sector hackers to go after cybercrime groups. The bill won’t pass, but letting hackers loose on industrial-scale scam farms actually makes sense.

They also talk about Microsoft’s blind spot regarding China. It has trusted China-based engineers with sensitive work, and is now only just realising that China’s security interests are not compatible with Microsoft’s.

This episode is also available on Youtube.

Srsly Risky Biz: America wants to hack the planet
0:00 / 17:29

Risky Bulletin: FCC removes 1,200 voice providers from US phone network

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

The FCC removes 1,200 voice providers from the US phone network, a cyberattack shuts down Nevada’s state government services; hackers breach Salesloft and pivot into Salesforce accounts, and Citrix patches yet another zero-day.

Risky Bulletin: FCC removes 1,200 voice providers from US phone network
0:00 / 6:36

Between Two Nerds: Teenage hackers are like goldfish

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds, Tom Uren and The Grugq talk about how the teenage hacking groups Scattered Spider, Lapsus$ and Shiny Hunters are collaborating. They examine whether this is bad news and what will it take to slow these wrecking crews down. Plus, how teenage hackers are like goldfish.

This episode is also available on Youtube.

Between Two Nerds: Teenage hackers are like goldfish
0:00 / 29:25

Risky Bulletin: Hackers sabotage Iranian ships at sea, again

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Hackers sabotage Iranian ships for a second time this year, mass cybercrime arrests across Africa, South Korea extradites a Chinese man behind celebrity hacks, and a French supermarket chain discloses a data breach.

Risky Bulletin: Hackers sabotage Iranian ships at sea, again
0:00 / 6:12

Sponsored: Why threat actors hate Okta FastPass

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In this Risky Business News sponsor interview Tom Uren talks to Brett Winterford, Okta’s VP of Threat Intelligence about FastPass. Brett explains what it is, how Okta uses it and why threat actors avoid it.

Sponsored: Why threat actors hate Okta FastPass
0:00 / 14:26