Risky Bulletin

risky.biz
undefined
5 snips
Feb 5, 2026 • 18min

Srsly Risky Biz: Google's cyber disruption unit kicks its first goal

Tom Uren, policy and intelligence editor and author of the Seriously Risky Business newsletter, unpacks Google’s takedown of the IPIDEA residential proxy network. He also covers SpaceX’s swift fixes after Starlink was adapted for long-range drone guidance. The conversation spotlights private-sector disruption, faster legal takedowns, and why corporate pressure matters.
undefined
Feb 4, 2026 • 8min

Risky Bulletin: Plone CMS stops supply-chain attack

A halted supply‑chain sabotage against a CMS and a six‑month compromise of Notepad++ servers that pushed targeted backdoor updates. A spike in malicious OpenClaw skills and a massive API token leak. French police raids tied to AI deepfake nudity probes and companies disabling license‑plate readers after unauthorized access.
undefined
13 snips
Feb 2, 2026 • 33min

Between Two Nerds: The internal logic of Russian power grid attacks

A deep dive into a recent Russian strike on Polish electricity infrastructure. They unpack why Poland near Ukraine was targeted and how attribution differs across reports. Conversation covers how distributed renewables and default configurations affected the attack. They explore shifting tactics from central systems to edge devices and the information impact versus technical damage.
undefined
Feb 2, 2026 • 8min

Risky Bulletin: StopICE blames hack on "a CBP agent here in SoCal"

A data leak tied to a US border agent and a massive chatbot backend exposure make for tense privacy talk. Microsoft moving to disable NTLM and strengthen Kerberos gets security protocol focus. Poland banning Chinese cars from military bases raises geopolitical supply chain concerns. Multiple zero-days, large-scale DDoS mitigation, and major breach settlements round out the hard-hitting cyber news.
undefined
Feb 1, 2026 • 18min

Sponsored: AI is critical to the future of cyber defence

Edward Wu, founder and CEO of Dropzone AI, builds AI-powered SOCs to speed alert investigations. He discusses a Vanderbilt report warning of growing adversary resources. He argues AI is essential because hiring alone cannot match nation-state scale. He urges automation of alert investigations and sharing TTP-level intelligence to scale small security teams.
undefined
8 snips
Jan 29, 2026 • 7min

Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack

A supply-chain breach pushed a backdoor through an antivirus update. A large proxy botnet was taken down and Android SDKs tied to it may be blocked. A destructive wiper hit dozens of Polish energy sites. Reports cover low GDPR fine collections, new location-privacy controls, major legal settlements over tracking, and rising crypto laundering routes.
undefined
4 snips
Jan 29, 2026 • 17min

Srsly Risky Biz: Punish the wicked and reward the righteous

Tom Uren, policy and intelligence editor who analyzes cybersecurity policy and spyware impacts, joins to discuss the Pall Mall Process and international efforts to curb abusive spyware. He explores the U.S. strategy of punishing miscreants while rewarding compliant firms. They also unpack the Salt Typhoon telecom compromises against senior UK officials and what strict telco rules actually buy us.
undefined
Jan 27, 2026 • 8min

Risky Bulletin: Cyberattack cripples cars across Russia

A cyberattack left smart alarms and cars across Russia unusable. Microsoft rushed an out-of-band Office patch for an active zero-day. WhatsApp introduced a strict account lockdown with enforced protections. Chrome extensions were found stealing ChatGPT authentication tokens. Investigations and legal fallout ripple across governments and firms.
undefined
Jan 26, 2026 • 30min

Between Two Nerds: Getting pinged and the fog of war

The Grugq, an experienced cyber security practitioner and analyst known for offensive security and espionage tradecraft, joins to unpack attacker uncertainty after being detected. They explore offensive counterintelligence, parallels with human espionage, what happens when implants are pinged, and why publishing technical reports both clarifies detection and forces attackers to change tradecraft.
undefined
Jan 26, 2026 • 13min

Sponsored: Push Security on ConsentFix attacks

In this Risky Business News sponsor interview, Catalin Cimpanu talks with Luke Jennings, VP of Research & Development at Push Security, about ConsentFix. It’s a new form of email-based social engineering attack used in the wild, an evolution of the ClickFix attack that goes after your identity. Show notes ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants ConsentFix debrief: latest community insights, recommendations, and predictions Luke Jennings, ConsentFix LinkedIn post Year in Review: How Phishing Attacks Evolved in 2025

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app