Risky Bulletin

risky.biz
undefined
Jun 29, 2025 • 17min

Sponsored: Why Linux is the dark matter of the internet

Craig Rowland, CEO of Sandfly Security, sheds light on the crucial, yet often overlooked, role of Linux in the cybersecurity landscape. He discusses how security teams frequently underinvest in Linux protection despite its importance. The conversation dives into the unique vulnerabilities of Linux systems and the threat posed by state-sponsored hackers. Rowland emphasizes the need for proactive monitoring solutions, contrasting the challenges of Linux with those of Windows, and advocates for agentless detection methods to enhance security without disrupting operations.
undefined
7 snips
Jun 26, 2025 • 8min

Risky Bulletin: Phishers abuse forgotten Direct Send feature

A sophisticated phishing group exploits a forgotten feature in Microsoft Exchange Online, posing dire security risks. A ransomware attack tragically links to a patient's death, highlighting the severe impacts of cybercrime. France takes decisive action by arresting BreachForums leadership amid a surge in cyber incidents, including major breaches in universities and municipalities. Meanwhile, cities like Lyon shift to open-source solutions, seeking greater digital independence from Microsoft.
undefined
Jun 26, 2025 • 17min

Srsly Risky Biz: Comparing Chinese and American 0day pipelines

The hosts delve into a fascinating comparison of U.S. and Chinese 0-day vulnerability acquisition methods. While the U.S. insists on stealth and exclusive exploits, China casts a wide net, raising questions about effectiveness and national security. They also explore the complexities of U.S. cyber operations, particularly regarding strikes on Iranian nuclear sites, revealing a less glamorous reality than often believed. Plus, there’s a discussion on potential reforms necessary for improving American cybersecurity compared to China's open market approach.
undefined
14 snips
Jun 25, 2025 • 7min

Risky Bulletin: Hackers breach Norwegian dam, open valve at full capacity

Dive into a shocking breach where hackers fully opened a valve at a Norwegian dam. Discover the U.S. House's swift move to ban WhatsApp on staff devices for security concerns. Explore Russia's plan to create a national IMEI database and its implications. Uncover the latest cyber threats, including new botnets and vulnerabilities in popular software. Plus, learn about prosecutions involving members of the notorious REvil ransomware group. Cybersecurity is more critical than ever!
undefined
10 snips
Jun 23, 2025 • 29min

Between Two Nerds: The evil genius of Predatory Sparrow

Dive into the world of Predatory Sparrow, a hacktivist group shaking up geopolitical tensions between Iran and Israel. Discover their audacious cyberattacks targeting Iran’s financial institutions and the creative strategies behind them. Explore the psychological effects of cyber warfare on public sentiment and leadership amid crises. Learn about the complexities of cyber tactics, identity manipulation, and the significant implications of financial disruptions during wartime. It’s a thrilling analysis of modern conflict and technology.
undefined
Jun 23, 2025 • 8min

Risky Bulletin: White House rejects nominee for NSA & CyberCom leader

The White House's surprising rejection of the Pentagon's nominee for NSA and Cyber Command raises eyebrows amid growing cybersecurity concerns. Meanwhile, the FCC delves into the US Cyber Trust Mark program, looking to enhance security standards. In a dramatic twist, a cyberattack severely impacts Russia's animal products industry, while hackers unleash a massive data leak affecting everyone in Paraguay. The urgency for robust security measures has never been clearer!
undefined
Jun 22, 2025 • 11min

Sponsored: The geopolitics of trust

Fletcher Heisler, CEO of Authentik and expert in identity solutions, discusses the inflection points prompting organizations to rethink their Identity Providers. He delves into the complexities of scaling security amidst rising costs and emphasizes the benefits of open-source systems. The conversation also covers the growing trend of sovereign tech stacks, highlighting the importance of earning customer trust in today’s geopolitical landscape. Lastly, Heisler touches on the balance between open-source flexibility and proprietary needs, shaping the future of technology.
undefined
Jun 20, 2025 • 8min

Risky Bulletin: Russian hackers abuse app-specific passwords to bypass MFA

Russian hackers are breaching security measures by misusing app-specific passwords to bypass multi-factor authentication. The identification of the tenth Salt Typhoon victim marks a significant escalation in cyber threats. A shocking $90 million was stolen from an Iranian crypto exchange by a group known as Predatory Sparrow. Meanwhile, Argentina takes action against a Russian disinformation gang, highlighting the global dimensions of cyber warfare and espionage. The landscape of cybersecurity continues to evolve amidst these alarming incidents.
undefined
Jun 19, 2025 • 22min

Srsly Risky Biz: Data brokers are a killer's best friend

Tom Uren and Patrick Gray talk about a Minnesota man who used people-search services to locate, stalk and eventually murder political targets. They also discuss purported hacktivist group Predatory Sparrow weighing in on the Iran-Israel conflict. It has attacked Iran’s financial system including a bank associated with the Iranian Revolutionary Guard Corp and also burnt USD$90 million worth of cryptocurrency from an Iranian exchange This episode is also available on Youtube. Show notes
undefined
Jun 18, 2025 • 7min

Risky Bulletin: Israel-linked hackers claim Iran bank disruption

An Israeli-linked hacktivist group claims responsibility for disrupting an Iranian bank, shedding light on escalating cyber warfare. Meanwhile, a historic German napkin company falls victim to a ransomware attack, highlighting vulnerabilities in even the oldest businesses. New security measures are introduced in Google Chrome to combat local network threats. Additionally, Europol successfully dismantles the Archetyp dark web market, illustrating the ongoing battle against cybercrime.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app