

Risky Bulletin
risky.biz
Regular cybersecurity news updates from the Risky Business team...
Episodes
Mentioned books

Jun 29, 2025 • 17min
Sponsored: Why Linux is the dark matter of the internet
Craig Rowland, CEO of Sandfly Security, sheds light on the crucial, yet often overlooked, role of Linux in the cybersecurity landscape. He discusses how security teams frequently underinvest in Linux protection despite its importance. The conversation dives into the unique vulnerabilities of Linux systems and the threat posed by state-sponsored hackers. Rowland emphasizes the need for proactive monitoring solutions, contrasting the challenges of Linux with those of Windows, and advocates for agentless detection methods to enhance security without disrupting operations.

7 snips
Jun 26, 2025 • 8min
Risky Bulletin: Phishers abuse forgotten Direct Send feature
A sophisticated phishing group exploits a forgotten feature in Microsoft Exchange Online, posing dire security risks. A ransomware attack tragically links to a patient's death, highlighting the severe impacts of cybercrime. France takes decisive action by arresting BreachForums leadership amid a surge in cyber incidents, including major breaches in universities and municipalities. Meanwhile, cities like Lyon shift to open-source solutions, seeking greater digital independence from Microsoft.

Jun 26, 2025 • 17min
Srsly Risky Biz: Comparing Chinese and American 0day pipelines
The hosts delve into a fascinating comparison of U.S. and Chinese 0-day vulnerability acquisition methods. While the U.S. insists on stealth and exclusive exploits, China casts a wide net, raising questions about effectiveness and national security. They also explore the complexities of U.S. cyber operations, particularly regarding strikes on Iranian nuclear sites, revealing a less glamorous reality than often believed. Plus, there’s a discussion on potential reforms necessary for improving American cybersecurity compared to China's open market approach.

14 snips
Jun 25, 2025 • 7min
Risky Bulletin: Hackers breach Norwegian dam, open valve at full capacity
Dive into a shocking breach where hackers fully opened a valve at a Norwegian dam. Discover the U.S. House's swift move to ban WhatsApp on staff devices for security concerns. Explore Russia's plan to create a national IMEI database and its implications. Uncover the latest cyber threats, including new botnets and vulnerabilities in popular software. Plus, learn about prosecutions involving members of the notorious REvil ransomware group. Cybersecurity is more critical than ever!

10 snips
Jun 23, 2025 • 29min
Between Two Nerds: The evil genius of Predatory Sparrow
Dive into the world of Predatory Sparrow, a hacktivist group shaking up geopolitical tensions between Iran and Israel. Discover their audacious cyberattacks targeting Iran’s financial institutions and the creative strategies behind them. Explore the psychological effects of cyber warfare on public sentiment and leadership amid crises. Learn about the complexities of cyber tactics, identity manipulation, and the significant implications of financial disruptions during wartime. It’s a thrilling analysis of modern conflict and technology.

Jun 23, 2025 • 8min
Risky Bulletin: White House rejects nominee for NSA & CyberCom leader
The White House's surprising rejection of the Pentagon's nominee for NSA and Cyber Command raises eyebrows amid growing cybersecurity concerns. Meanwhile, the FCC delves into the US Cyber Trust Mark program, looking to enhance security standards. In a dramatic twist, a cyberattack severely impacts Russia's animal products industry, while hackers unleash a massive data leak affecting everyone in Paraguay. The urgency for robust security measures has never been clearer!

Jun 22, 2025 • 11min
Sponsored: The geopolitics of trust
Fletcher Heisler, CEO of Authentik and expert in identity solutions, discusses the inflection points prompting organizations to rethink their Identity Providers. He delves into the complexities of scaling security amidst rising costs and emphasizes the benefits of open-source systems. The conversation also covers the growing trend of sovereign tech stacks, highlighting the importance of earning customer trust in today’s geopolitical landscape. Lastly, Heisler touches on the balance between open-source flexibility and proprietary needs, shaping the future of technology.

Jun 20, 2025 • 8min
Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA
Russian hackers are breaching security measures by misusing app-specific passwords to bypass multi-factor authentication. The identification of the tenth Salt Typhoon victim marks a significant escalation in cyber threats. A shocking $90 million was stolen from an Iranian crypto exchange by a group known as Predatory Sparrow. Meanwhile, Argentina takes action against a Russian disinformation gang, highlighting the global dimensions of cyber warfare and espionage. The landscape of cybersecurity continues to evolve amidst these alarming incidents.

Jun 19, 2025 • 22min
Srsly Risky Biz: Data brokers are a killer's best friend
Tom Uren and Patrick Gray talk about a Minnesota man who used people-search services to locate, stalk and eventually murder political targets.
They also discuss purported hacktivist group Predatory Sparrow weighing in on the Iran-Israel conflict. It has attacked Iran’s financial system including a bank associated with the Iranian Revolutionary Guard Corp and also burnt USD$90 million worth of cryptocurrency from an Iranian exchange
This episode is also available on Youtube.
Show notes

Jun 18, 2025 • 7min
Risky Bulletin: Israel-linked hackers claim Iran bank disruption
An Israeli-linked hacktivist group claims responsibility for disrupting an Iranian bank, shedding light on escalating cyber warfare. Meanwhile, a historic German napkin company falls victim to a ransomware attack, highlighting vulnerabilities in even the oldest businesses. New security measures are introduced in Google Chrome to combat local network threats. Additionally, Europol successfully dismantles the Archetyp dark web market, illustrating the ongoing battle against cybercrime.