

Risky Bulletin
risky.biz
Regular cybersecurity news updates from the Risky Business team...
Episodes
Mentioned books

Oct 5, 2025 • 8min
Risky Bulletin: Microsoft tells users to uninstall games affected by a Unity bug
Microsoft warns users to uninstall games due to a major Unity bug, creating concerns about security. Discord suffers a data breach, exposing user information. Google introduces end-to-end encryption for Gmail, enhancing email security. Meanwhile, both Apple and Google block an app that tracked ICE agents, prioritizing user safety. In a curious twist, optical mice are revealed to potentially record audio, showcasing unexpected tech vulnerabilities. The podcast dives into serious issues affecting privacy and security in the digital landscape.

7 snips
Oct 5, 2025 • 12min
Sponsored: Corelight on where will NDRs go next
Ashish Malpani, Head of Product Marketing at Corelight, dives deep into the evolving world of network detection and response (NDR). He predicts significant advancements in NDR to protect multi-cloud environments and enhance endpoint detection. Malpani emphasizes the importance of layered detection to reduce false positives and discusses how NDR can identify threats that bypass traditional cloud controls. He advocates for a robust security stack, highlighting the need for continuous evolution of detection strategies to stay ahead of cyber threats.

Oct 3, 2025 • 7min
Risky Bulletin: Scam compound operators sentenced to death in China
China sentences 11 scam compound operators to death for a massive $1.4 billion fraud scheme. A cyber attack has exposed 800 customers' data from Red Hat's private repositories. Microsoft blocks malicious SVG images in Outlook to enhance user security. Signal threatens to withdraw from the EU over controversial chat controls. SBI Crypto suffers a $21 million theft linked to North Korean laundering tactics, while the malicious group Klopp targets Oracle customers with ransom demands.

Oct 2, 2025 • 18min
Srsly Risky Biz: The cyberespionage gig economy
Tom Uren, a policy and intelligence editor known for his insights on cyberespionage, joins Amberleigh Jack to explore intriguing recruitment tactics used by foreign intelligence. They discuss Russia's strategy of enlisting locals through Telegram for espionage roles, highlighting the risks involved. Tom reveals how mapping Wi-Fi networks aids cyber operations and contrasts the cautious approaches of Western agencies with bolder strategies. They also address governance lapses observed in a DOGE report, showcasing how weak oversight can lead to vulnerabilities.

Oct 1, 2025 • 6min
Risky Bulletin: Router APIs abused to send SMS spam
A cybercrime group exploits a router vulnerability to send SMS spam, raising alarms across the tech community. CISA introduces a new support model for local governments to enhance cybersecurity. South Korea elevates its cyber threat level after a data center fire, causing concerns about data outages. Researchers expose how Tile tracking devices leak location data, while the FTC sues Sendit over deceptive messaging practices. Additionally, a malware campaign infects thousands of devices in Italy and Spain, attributed to a Turkish-speaking group.

Sep 29, 2025 • 28min
Between Two Nerds: The power of cyber
Dive into the fascinating world of cyber warfare as experts analyze its evolving role in modern conflicts. Discover how military expectations often clash with cyber's actual capabilities. The conversation highlights the significance of information operations, IP theft, and the limitations of traditional definitions of cyber attacks. Learn about the effective use of cyber in peacetime and the nuanced outcomes of subtle operations. Explore the UK's approach to responsible cyber power and the implications of information manipulation on society.

6 snips
Sep 29, 2025 • 5min
Risky Bulletin: UK to bail out Jaguar Land Rover
The UK government steps in with a £1.5bn loan guarantee for Jaguar Land Rover after a devastating ransomware attack. Hackers are targeting sensitive data, with one attempting to extort a nursery using children’s photos. Meanwhile, Dutch police take down teens allegedly sniffing Wi-Fi for Russian handlers. On the tech front, a serious exploit in the GoAnywhere MFT system is being actively exploited, while reports suggest that humanoid robots are sending data back to China.

9 snips
Sep 28, 2025 • 13min
Sponsored: Why identity is critical
Fletcher Heisler, CEO of Authentik and a leader in open-source identity solutions, dives deep into the critical role of identity providers in organizational resilience. He explains how effective redundancy strategies can mitigate risks and discusses real-world failures illustrating the importance of backup systems. The conversation highlights the trade-offs between SaaS and on-prem solutions, emphasizing the need for multi-IDP strategies for reliability. Fletcher also shares insights on the benefits of self-managed identity systems for customization and cost-effectiveness.

12 snips
Sep 26, 2025 • 8min
Risky Bulletin: EU users to get free Windows 10 extended security updates
European users are set to receive free extended security updates for Windows 10, following Microsoft's decision to remove account-linking conditions. In a significant move, Microsoft also ended its surveillance contract with Israeli intelligence. Cisco has patched multiple zero-day vulnerabilities, highlighting ongoing cyber threats. A UK man was arrested for disrupting EU airports with ransomware, and Canada is investigating TikTok over child data practices. The EU has opened an antitrust probe into SAP for alleged anti-competitive behavior.

Sep 25, 2025 • 16min
Srsly Risky Biz: The kids aren't alright
Amberleigh and Tom dive into the evolving landscape of youth cybercrime, exploring how online communities like Minecraft lure kids into illicit activities. They discuss the stark differences between technically skilled hackers and those who rely on social engineering. The conversation also highlights the dark reality of violence and coercion within cybercrime today. Finally, they introduce a strategic playbook for deterring cyber adversaries, emphasizing a shift in focus towards state-level interests as a means of prevention.


