Risky Bulletin

Srsly Risky Biz: When cyber campaigns cross a line

Dec 4, 2025
Tom Uren, a cyber policy analyst and author of the Seriously Risky Business newsletter, joins to discuss a new framework outlining seven 'red flags' for assessing cyber operations. They explore Iran's use of cyber intelligence for missile strikes and the implications of political interference in elections. The conversation dives into the significance of corporate disclosure amid evolving state cyber activities, and they express skepticism about China's claims of being a responsible cyber actor. This engaging dialogue sheds light on the complexities of modern cyber warfare.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
INSIGHT

Framework Clarifies When Cyber Ops Cross Lines

  • Defining clear red flags helps victims and policymakers judge cyber operations more consistently.
  • The framework aims to reduce ambiguity about when incidents merit robust responses.
INSIGHT

Control Loss Is A Red Flag

  • Loss of technical or organizational control is a major red flag in cyber operations.
  • Examples like NotPetya and WannaCry show why states must ensure control of malware and operators.
ANECDOTE

NotPetya And Stuxnet Compared

  • NotPetya is cited as a clear example of malware getting out of control and causing vast collateral damage.
  • Stuxnet is noted as spreading beyond its target but was designed to limit activation outside intended systems.
Get the Snipd Podcast app to discover more snips from this episode
Get the app