

Risky Bulletin
risky.biz
Regular cybersecurity news updates from the Risky Business team...
Episodes
Mentioned books

Jun 16, 2025 • 30min
Between Two Nerds: Why modern influence operations suck
Dive into the intriguing world of AI-driven influence operations as they contrast modern tactics with World War II strategies. Explore how emotion-laden narratives are crafted to sway public perception and the simplistic nature of contemporary campaigns. Discover the clever black propaganda tactics used to undermine Nazi influence in Bulgaria and question the effectiveness of AI in creative strategy. This thought-provoking discussion reveals the gaps between innovation claims and actual impact, urging a return to genuine engagement in messaging.

Jun 16, 2025 • 6min
Risky Bulletin: Washington Post email accounts hacked
In a gripping discussion, the podcast delves into the alarming hacks affecting major institutions like the Washington Post and a questionable email provider. It highlights the impact of these breaches on data security and raises concerns about the rising threat of ransomware. Additionally, there's a spotlight on the EU's significant investment in enhancing hospital cybersecurity, showcasing global efforts to combat these threats. Tune in for an insightful look at the current landscape of cyber security challenges!

Jun 15, 2025 • 13min
Sponsored: Hardening the browser
Michael Leland, the Field CTO of Island, dives into the critical need for secure browsing in enterprises. He discusses how traditional browsers fall short, especially against threats from malicious extensions and phishing attacks. Leland emphasizes the importance of enforcing Manifest V3 to ensure tighter controls on extension permissions. Moreover, he highlights proactive measures like multi-factor authentication and specialized enterprise browsers to safeguard corporate credentials, proving that even stolen credentials don't have to lead to disaster.

Jun 13, 2025 • 8min
Risky Bulletin: Predator spyware alive despite US sanctions
The podcast delves into the resilience of Intellexa amid US sanctions and the implications of zero-click iMessage exploits targeting journalists. It examines Europol's challenges with encrypted communications and the rise of sextortion and DDoS attacks in Latin America. Additionally, listeners learn about significant ransomware attacks on a major South Korean bookstore and the ongoing struggle against cybersecurity threats, shedding light on the legal battles faced by technology companies.

Jun 12, 2025 • 19min
Srsly Risky Biz: Trump scales back Biden product security demands
The discussion kicks off with Trump's recent executive order that alters cybersecurity approaches, highlighting a shift from strict regulations to a more market-driven perspective. They dive into North Korea's innovative use of AI for creating fake IT worker scams, showcasing how cyber deception is evolving. The conversation also touches on the role of identity security in countering cyber threats, along with the complex ethics of intelligence agencies utilizing AI in social media influence campaigns. It's a captivating look at the intersection of politics, cybersecurity, and technology.

Jun 11, 2025 • 5min
Risky Bulletin: SentinelOne dodges a Chinese APT hack
Discover how SentinelOne managed to fend off a sophisticated Chinese APT hack. Explore the alarming rise in cyberattacks affecting grocery deliveries in the U.S. and uncover anonymous reports pointing to more victims of the Salt Typhoon. The discussion also highlights a shocking crackdown in Kazakhstan, where 140 individuals were arrested for selling citizen data. A deep dive into the implications of state-sponsored cyber activities rounds out this riveting exploration of today's cybersecurity landscape.

Jun 9, 2025 • 37min
Between Two Nerds: How Russia's sabotage team got into hacking
Delve into the shadowy world of Unit 29155, Russia's military hacking squad. Discover how open-source intelligence uncovers their operations and the complexities of blending traditional espionage with modern cyber tactics. Learn about a false flag hacking operation and the unique communication methods these hackers employ. Explore the dynamics of smaller, autonomous hacking groups versus larger ones, and the ethical dilemmas faced within these chaotic networks. It's a thrilling journey through contemporary cyber warfare and intelligence.

Jun 9, 2025 • 6min
Risky Bulletin: EU launches its own DNS service
Discover how the EU is stepping up its digital sovereignty with the launch of its own DNS service. Hear about Trump revising cybersecurity policies from previous administrations. Learn about a significant supply chain attack impacting popular NPM packages. And don't miss the report on mysterious iOS attacks making waves in the wild. It's a captivating dive into the current landscape of cybersecurity challenges and innovations!

Jun 9, 2025 • 18min
Sponsored: Phishing crews have gotten really good at evasion
In this insightful conversation, Jacques Louw, co-founder and Chief Product Officer of Push Security, discusses the alarming advancements in phishing tactics. He highlights how attackers cleverly hide their malicious payloads using legitimate tools and OAuth challenges. The dialogue also emphasizes the importance of passkeys in fortifying security against these sophisticated threats. Furthermore, they explore the role of AI in identity security and the transition to more advanced phishing detection methods, offering a glimpse into the future of cybersecurity.

Jun 6, 2025 • 7min
Risky Bulletin: APTeens go after Salesforce data
In a thrilling exploration of cybersecurity, hackers target Salesforce data, exposing risks for countless companies. The FBI dismantles the BidenCash carding forum, sending shockwaves through the cybercrime community. Meanwhile, China incentivizes hackers to target Taiwanese military systems, illustrating global tensions in cyberspace. Significant vulnerabilities are also highlighted, including malicious services on GitHub and troubling breaches in solar panel management systems, with essential patches rolling out to mitigate threats.