

Risky Bulletin
risky.biz
Regular cybersecurity news updates from the Risky Business team...
Episodes
Mentioned books

Sep 11, 2025 • 18min
Srsly Risky Biz: Exploiting authorisation sprawl is the new black
Tom Uren and Amberleigh Jack dissect the Salesloft breach, spotlighting how one weak link can wreak havoc across interconnected systems. They discuss the alarming rise of authorization sprawl and the challenges in detecting misuse of tokens. Apple’s new Memory Integrity Enforcement is examined as a pivotal move towards bolstering device security, while the podcast also highlights an innovative five-year security chip development that emphasizes continuous testing. These insights reveal critical vulnerabilities and evolving strategies in the cybersecurity landscape.

Sep 10, 2025 • 9min
Risky Bulletin: White House to keep CyberCom and NSA dual role
The podcast dives into the White House's decision to maintain the dual leadership of Cyber Command and the NSA. It discusses a significant ransomware figure being charged and the implications for cybersecurity. Apple introduces a new memory safety protection feature while supply chain attacks afflict the npm ecosystem. Listeners learn about a hacking incident involving a former UK Prime Minister’s emails, and regulatory discussions around disinformation and surveillance are addressed.

10 snips
Sep 8, 2025 • 26min
Between Two Nerds: The death of the exploit
Dive into the complexities of modern hacking as experts discuss the shift from simple to intricate exploits in cyber warfare. Historical military strategies illustrate the unsustainable nature of current exploit pricing. Discover the role of commercial surveillance vendors in zero-day exploits, impacting targeted individuals. The conversation resonates with humor while exploring the unique experiences of those monitored by intelligence agencies. Finally, learn about the paradox of declining exploit commonality, yet rising media intrigue in the cybersecurity landscape.

26 snips
Sep 8, 2025 • 8min
Risky Bulletin: New APT group turns out to be a phishing test
Discover the deception behind a new APT group that turns out to be just a phishing test. Learn how Qantas responds to a breach by cutting executive bonuses. Explore the implications of Anthropic halting AI tool sales to Chinese firms. Plus, find out why Nepal has blocked 26 social media sites. This engaging discussion tackles the ever-changing landscape of cybersecurity and corporate responsibility.

Sep 7, 2025 • 17min
Sponsored: Why prompt injection is an intractable problem
Keith Hoodlet, Director of Engineering for AI, Machine Learning, and AppSec at Trail of Bits, dives into the complexities of prompt injection attacks targeting AI systems. He discusses the evolving landscape of technology and its security challenges, highlighting the difficulties in defending against these attacks. Innovative techniques like the 'line jumping' method and the 'MCP context protector' are explored as potential safeguards. Hoodlet emphasizes the importance of rigorous testing and monitoring to secure AI implementations against these persistent threats.

18 snips
Sep 5, 2025 • 9min
Risky Bulletin: Cyberattack disrupts Bridgestone tyre factories across North America
A cyberattack temporarily halts operations at Bridgestone's tyre factories, highlighting the growing threat of ransomware. Listeners learn about a sneaky new infostealer that captures images during private moments. The episode also reveals concerning missed vulnerabilities in Cloudflare infrastructure that persisted for over a year. Meanwhile, Brazil grapples with another incident involving its payment systems, showcasing the pervasive challenge of cyber hacks in today's world.

Sep 4, 2025 • 18min
Srsly Risky Biz: Google sharpens its cyber knife
Google's new cyber disruption unit marks a bold shift in how the private sector can combat online threats. Multiple countries are linking the Salt Typhoon cyber campaign to Chinese firms, raising questions about accountability. Additionally, Apple's ongoing dispute with the UK over iCloud encryption highlights the complex legal landscape tech companies face. The discussion also dives into the ethics of hacking back, emphasizing the need for clear legal frameworks to empower firms in defending against cyber attacks.

9 snips
Sep 3, 2025 • 4min
Risky Bulletin: YouTubers unmask and help dismantle Chinese scam ring
Two YouTube channels join forces to expose a massive Chinese scam operation, showcasing the power of online activism. The discussion dives into major cybersecurity issues, including a ransomware attack that disrupts Jaguar Land Rover's production. Additionally, experts reveal how tech giants are combating breaches and record DDoS attacks, shedding light on advancements in cyber defense. It's a thrilling exploration of the intersection between technology and crime!

Sep 1, 2025 • 32min
Between Two Nerds: How threat actors are using AI to run wild
In this discussion, experts delve into how cybercriminals are exploiting AI tools to enhance their attacks, making sophisticated cybercrime accessible even to amateurs. They highlight the stark gap between threat actors' agility with AI and businesses' slow adoption. The chat covers how AI is refining extortion tactics, creating personalized ransom notes for victims. It also touches on the cultural aspects of cybersecurity and the evolving implications of public AI models in crime, including state-sponsored activities and innovative uses in scams.

Sep 1, 2025 • 6min
Risky Bulletin: Noem fires FEMA IT team over alleged cybersecurity failures
FEMA's IT team faces the axe over alleged cybersecurity failures, raising eyebrows about safety protocols. A significant WhatsApp vulnerability receives a crucial patch, yet the threat landscape continues to evolve. Baltimore falls victim to a $1.5 million scam, highlighting dire security lapses in municipal systems. The podcast also dives into recent legal battles involving cybersecurity breaches and the implications of AI chatbots in our digital lives, underscoring the urgency of protecting sensitive information.