Risky Bulletin

risky.biz
undefined
Oct 5, 2025 • 8min

Risky Bulletin: Microsoft tells users to uninstall games affected by a Unity bug

Microsoft warns users to uninstall games due to a major Unity bug, creating concerns about security. Discord suffers a data breach, exposing user information. Google introduces end-to-end encryption for Gmail, enhancing email security. Meanwhile, both Apple and Google block an app that tracked ICE agents, prioritizing user safety. In a curious twist, optical mice are revealed to potentially record audio, showcasing unexpected tech vulnerabilities. The podcast dives into serious issues affecting privacy and security in the digital landscape.
undefined
7 snips
Oct 5, 2025 • 12min

Sponsored: Corelight on where will NDRs go next

Ashish Malpani, Head of Product Marketing at Corelight, dives deep into the evolving world of network detection and response (NDR). He predicts significant advancements in NDR to protect multi-cloud environments and enhance endpoint detection. Malpani emphasizes the importance of layered detection to reduce false positives and discusses how NDR can identify threats that bypass traditional cloud controls. He advocates for a robust security stack, highlighting the need for continuous evolution of detection strategies to stay ahead of cyber threats.
undefined
Oct 3, 2025 • 7min

Risky Bulletin: Scam compound operators sentenced to death in China

China sentences 11 scam compound operators to death for a massive $1.4 billion fraud scheme. A cyber attack has exposed 800 customers' data from Red Hat's private repositories. Microsoft blocks malicious SVG images in Outlook to enhance user security. Signal threatens to withdraw from the EU over controversial chat controls. SBI Crypto suffers a $21 million theft linked to North Korean laundering tactics, while the malicious group Klopp targets Oracle customers with ransom demands.
undefined
Oct 2, 2025 • 18min

Srsly Risky Biz: The cyberespionage gig economy

Tom Uren, a policy and intelligence editor known for his insights on cyberespionage, joins Amberleigh Jack to explore intriguing recruitment tactics used by foreign intelligence. They discuss Russia's strategy of enlisting locals through Telegram for espionage roles, highlighting the risks involved. Tom reveals how mapping Wi-Fi networks aids cyber operations and contrasts the cautious approaches of Western agencies with bolder strategies. They also address governance lapses observed in a DOGE report, showcasing how weak oversight can lead to vulnerabilities.
undefined
Oct 1, 2025 • 6min

Risky Bulletin: Router APIs abused to send SMS spam

A cybercrime group exploits a router vulnerability to send SMS spam, raising alarms across the tech community. CISA introduces a new support model for local governments to enhance cybersecurity. South Korea elevates its cyber threat level after a data center fire, causing concerns about data outages. Researchers expose how Tile tracking devices leak location data, while the FTC sues Sendit over deceptive messaging practices. Additionally, a malware campaign infects thousands of devices in Italy and Spain, attributed to a Turkish-speaking group.
undefined
Sep 29, 2025 • 28min

Between Two Nerds: The power of cyber

Dive into the fascinating world of cyber warfare as experts analyze its evolving role in modern conflicts. Discover how military expectations often clash with cyber's actual capabilities. The conversation highlights the significance of information operations, IP theft, and the limitations of traditional definitions of cyber attacks. Learn about the effective use of cyber in peacetime and the nuanced outcomes of subtle operations. Explore the UK's approach to responsible cyber power and the implications of information manipulation on society.
undefined
6 snips
Sep 29, 2025 • 5min

Risky Bulletin: UK to bail out Jaguar Land Rover

The UK government steps in with a £1.5bn loan guarantee for Jaguar Land Rover after a devastating ransomware attack. Hackers are targeting sensitive data, with one attempting to extort a nursery using children’s photos. Meanwhile, Dutch police take down teens allegedly sniffing Wi-Fi for Russian handlers. On the tech front, a serious exploit in the GoAnywhere MFT system is being actively exploited, while reports suggest that humanoid robots are sending data back to China.
undefined
9 snips
Sep 28, 2025 • 13min

Sponsored: Why identity is critical

Fletcher Heisler, CEO of Authentik and a leader in open-source identity solutions, dives deep into the critical role of identity providers in organizational resilience. He explains how effective redundancy strategies can mitigate risks and discusses real-world failures illustrating the importance of backup systems. The conversation highlights the trade-offs between SaaS and on-prem solutions, emphasizing the need for multi-IDP strategies for reliability. Fletcher also shares insights on the benefits of self-managed identity systems for customization and cost-effectiveness.
undefined
12 snips
Sep 26, 2025 • 8min

Risky Bulletin: EU users to get free Windows 10 extended security updates

European users are set to receive free extended security updates for Windows 10, following Microsoft's decision to remove account-linking conditions. In a significant move, Microsoft also ended its surveillance contract with Israeli intelligence. Cisco has patched multiple zero-day vulnerabilities, highlighting ongoing cyber threats. A UK man was arrested for disrupting EU airports with ransomware, and Canada is investigating TikTok over child data practices. The EU has opened an antitrust probe into SAP for alleged anti-competitive behavior.
undefined
Sep 25, 2025 • 16min

Srsly Risky Biz: The kids aren't alright

Amberleigh and Tom dive into the evolving landscape of youth cybercrime, exploring how online communities like Minecraft lure kids into illicit activities. They discuss the stark differences between technically skilled hackers and those who rely on social engineering. The conversation also highlights the dark reality of violence and coercion within cybercrime today. Finally, they introduce a strategic playbook for deterring cyber adversaries, emphasizing a shift in focus towards state-level interests as a means of prevention.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app