Risky Business News Podcast

Analysis and news podcasts published weekly

Between Two Nerds: The Culture of the Snake

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

The Grugq
The Grugq

Independent Security Researcher

In this edition of Between Two Nerds Tom Uren and The Grugq look at last week’s Snake malware joint cybersecurity advisory and dive into what it tells us about the FSB.

Between Two Nerds: The Culture of the Snake
0:00 / 0:00

Selena Larson on how cybercriminals use threat intelligence

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In this Risky Business News sponsor interview Tom Uren asks Proofpoint’s Selena Larson about how threat actors reacted en masse after Microsoft blocked various types of macros.

Cyber criminals used a variety of different techniques to evade these blocks. In part this happened quickly because of knowledge sharing by the cyber threat intelligence community.

Selena Larson on how cybercriminals use threat intelligence
0:00 / 0:00

Risky Biz News: The VMProtect source code leaks. Again.

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

Risky Biz News: The VMProtect source code leaks. Again.
0:00 / 0:00

Risky Biz News: Gmail to warn users on dark web password exposures

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: Gmail to warn users on dark web password exposures
0:00 / 0:00

Risky Biz News: FBI takes down Turla's Snake malware

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Risky Biz News: FBI takes down Turla's Snake malware
0:00 / 0:00

Between Two Nerds: Why cyber insurance is great in theory but not in practice

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

The Grugq
The Grugq

Independent Security Researcher

In this edition of Between Two Nerds Tom Uren and The Grugq look at how cyber insurance should theoretically improve security and examine what actually happens in practice.

Between Two Nerds: Why cyber insurance is great in theory but not in practice
0:00 / 0:00

Risky Biz News: DEFCON attendees will target AI models

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: DEFCON attendees will target AI models
0:00 / 0:00

Sponsor Interview with Material Security's Chris Long

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

In this Risky Business News sponsor interview Tom Uren asks Material Security’s Director of Security Chris Long about what ittakes to run a “modern” phishing workflow. Chris thinks there are opportunities to take identify and take advantage of “phishing superusers”, employees who are a cut above when it comes to uncovering phishing and other malicious activities. Phishing is also the “point of the spear” for defenders — it provides an entry point into attacker activities that enable all sorts of potential detection opportunities.

Sponsor Interview with Material Security's Chris Long
0:00 / 0:00

Risky Biz News: No jail time for Uber's Joe Sullivan

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird.

You can find the newsletter version of this podcast click here.

Risky Biz News: No jail time for Uber's Joe Sullivan
0:00 / 0:00

Srsly Risky Biz: Iran Fake’s It Till It Makes It

Presented by

Tom Uren
Tom Uren

Policy & Intelligence

Patrick Gray
Patrick Gray

CEO and Publisher

In this podcast Patrick Gray and Tom Uren take a whirlwind tour examining the different ways countries conduct cyber-enabled influence operations. Iran, China and the UK all have different approaches and we have our favourite.

China has a new counter-epsionage law and even though it hasn’t been formerly passed yet already foreign companies are getting in trouble for doing due diligence or corporate intelligence type work. The real point here is to tighten information control, and the wording is so broad that it leaves tremendous scope for the PRC to use the law whenever it wants to send a message.

Finally, the two discuss concrete examples of intelligence derived from Section 702 of the US FISA Act. 702 allows US intelligence agencies to compel service providers to help conduct targeted surveillance of foreigners outside the US and will expire at the end of the year unless Congress renews it.

Srsly Risky Biz: Iran Fake’s It Till It Makes It
0:00 / 0:00