Risky Bulletin

risky.biz
undefined
May 25, 2025 • 23min

Sponsored: Sublime Security on the spam/email bomb problem

Bobby Filar, Head of Machine Learning at Sublime Security, brings his expertise in email security to the forefront, discussing the alarming rise of spam bombing in corporate environments. He highlights how cybercriminals use these tactics as a gateway for initial access. The conversation dives into innovative machine learning features aimed at detecting unusual email volumes, combating social engineering, and enhancing threat detection. Bobby also shares insights into the role of Autonomous Security Analysts in automating the triage of suspicious emails, benefiting both security teams and junior analysts.
undefined
May 23, 2025 • 8min

Risky Bulletin: DanaBot and Lumma Stealer taken down

Law enforcement recently shut down the DanaBot and Lumma Stealer malware operations, marking key victories in the fight against cybercrime. The US government is pushing for a centralized data broker platform to streamline data management. In international news, Turkey dismantled a Chinese spy ring using IMSI catchers, while Russia hacked border cameras to track military aid to Ukraine. These developments highlight the ever-evolving landscape of cybersecurity threats and responses.
undefined
May 22, 2025 • 20min

Srsly Risky Biz: Telegram is cooperating with authorities, for now

Telegram recently cracked down on major criminal marketplaces linked to over $30 billion in illicit sales. The hosts discuss the platform's surprising cooperation with authorities amid ongoing scrutiny. They also highlight the alarming prevalence of scam ads on Meta and raise concerns about Chinese app encryption, questioning its effectiveness. A critical investigation into foreign electoral interference reveals social media's dark influences, emphasizing the urgent need for regulatory oversight to safeguard democracy and user safety.
undefined
May 21, 2025 • 7min

Risky Bulletin: TeleMessage data published by DDoSecrets

Dive into a hefty data breach as DDoSecrets reveals 400GB of stolen TeleMessage information. Discover how the FBI’s FISA oversight office just went dark. Learn about the Predatorgate lawsuit delays due to a lack of interpreters. Plus, witness a wave of DDoS attacks shaking up Russian government portals. The discussion also touches on cybersecurity advancements, including Microsoft's post-quantum cryptography and the emerging U.S. cybersecurity coalition tackling global vulnerabilities head-on.
undefined
May 19, 2025 • 29min

Between Two Nerds: Why hackers and spies don't mix

Explore the challenges skilled hackers face when trying to merge their talents with state espionage efforts. The discussion dives into contrasting recruitment strategies and operational methods between independent hackers and intelligence agencies. Discover how cultural divides create hurdles in cyber operations and the complexities of integrating hacker innovation into structured frameworks. Delve into the implications of failed intelligence operations and the fine line between success and failure, emphasizing the different motivations driving hackers and intelligence organizations.
undefined
May 19, 2025 • 6min

Risky Bulletin: Japan passes active cyber defense law

Japan takes a bold step with its active cyber defense law, aiming to enhance national security. Meanwhile, printer software is found to ship with malware, raising red flags for users. A UK telecom company faces backlash after leaking sensitive user data and geolocation. In the world of tech, Volkswagen urgently patches critical bugs in its mobile app. The discussion also touches on hacktivism, cybersecurity enhancements by the NHS, and shifting social media regulations for minors in Europe.
undefined
May 18, 2025 • 16min

Sponsored: Securing identity is like building a house while blindfolded

In this engaging discussion, Justin Kohler, Chief Product Officer at SpecterOps, tackles the daunting task of securing identity directory services. He emphasizes the pitfalls of the principle of least privilege and introduces innovative approaches to mitigate risks. Key topics include the complexities of identity architecture in cybersecurity, the importance of privilege zones, and how AI is revolutionizing vulnerability detection. Justin reveals strategies for navigating growing organizational security challenges and addressing attack paths in hybrid environments.
undefined
May 16, 2025 • 8min

Risky Bulletin: Coinbase reveals insider breach, extortion attempt

Hackers targeted Coinbase, extorting employees for sensitive user data. Meanwhile, America's largest steel producer halted operations following a severe cyberattack. The podcast delves into the rise of Scattered Spider, shifting their focus to US retailers. Additionally, it discusses the US government's retreat from plans aimed at safeguarding citizens from data brokers, raising concerns about personal privacy in the digital age.
undefined
May 15, 2025 • 43min

Srsly Risky Biz: Special guests Rob Joyce and Andy Boyd on offensive cyber

Rob Joyce, former NSA Cybersecurity Director, and Andy Boyd, ex-CIA Center for Cyber Intelligence director, dive into the evolving world of offensive cyber strategies. They discuss the implications of political shifts on intelligence staffing and morale. The conversation highlights the challenges of talent exodus in agencies and the urgent need for adaptive cybersecurity tactics in the face of threats from adversaries like China and Russia. They also touch on the role of innovative partnerships in enhancing national security.
undefined
May 14, 2025 • 7min

Risky Bulletin: EU launches its own vulnerability database

The EU has unveiled a new vulnerability database aimed at enhancing cybersecurity. A Turkish APT has been spotted deploying a zero-day exploit in Iraq, while North Korea's APT is active in Ukraine. Spain is launching an investigation into the role of cyber incidents in its recent energy grid collapse. Additionally, recent breaches in the UK retail sector reveal alarming cryptocurrency scams, with Telegram stepping up to combat these threats. Meanwhile, concerns about vulnerabilities in Nissan Leaf vehicles and updates on Microsoft's privacy measures are also discussed.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app