Risky Business cover image

Risky Business

Latest episodes

undefined
55 snips
Mar 12, 2025 • 1h 4min

Risky Business #783 -- Evil webcam ransomwares entire Windows network

Rob Joyce, former Special Assistant to the US President and cybersecurity director at the NSA, shares his insights on national security challenges. He discusses groundbreaking cyber threats, including a ransomware attack using a Linux webcam to infiltrate Windows networks. Lee Chagolla-Christensen, Principal Security Researcher at SpecterOps, dives into the vulnerabilities of NTLM authentication in Active Directory and the potential of Bloodhound to address these issues. The conversation highlights the evolving landscape of cybersecurity and the importance of robust defense mechanisms.
undefined
22 snips
Mar 5, 2025 • 50min

Risky Business #782 -- Are the USA and Russia cyber friends now?

Vincent Stouffer, Field CTO at Corelight, brings his expertise in network visibility and attacker detection to the discussion. The conversation covers North Korea's impressive cyber theft tactics, particularly the Bybit hack. They analyze the U.S.'s shifting stance on Russian cyber threats and how that impacts global security. Stouffer emphasizes the importance of monitoring network traffic to uncover hidden threats while underscoring the challenges of credential management. The dialogue also highlights innovative authentication methods evolving in the cybersecurity landscape.
undefined
23 snips
Feb 26, 2025 • 1h 3min

Risky Business #781 -- How Bybit oopsied $1.4bn

This week, a staggering $1.4 billion was stolen from the Bybit cryptocurrency exchange, sparking a deep dive into the security flaws that allowed it to happen. North Korea's sophisticated hacking methods are discussed, alongside the dangers inherent in routine cryptocurrency transfers. The podcast also tackles encryption debates, government surveillance, and the challenges companies like Meta face with account management and automation. There’s a look at advanced techniques used by hackers targeting Cisco devices and vulnerabilities within Windows security solutions.
undefined
Feb 21, 2025 • 41min

Wide World of Cyber: DeepSeek lobs an AI hand grenade

Join Alex Stamos, former CISO for Facebook and Yahoo, and Chris Krebs, ex-director of CISA, as they dive into the intriguing world of AI and its geopolitical implications. They discuss the controversial DeepSeek AI model and its potential impact on cybersecurity. The duo analyzes the skepticism surrounding AI innovations and examines the contrasting regulatory approaches in Europe and the U.S. Don't miss their insights on privacy rights, market dynamics, and the future of AI innovation amidst growing international tensions.
undefined
13 snips
Feb 19, 2025 • 1h 1min

Risky Business #780 -- ASD torched Zservers data while admins were drunk

Braden Rogers, Chief Customer Officer at Island, discusses the pressing challenges of AI data exposure. He dives into the emotional toll recent cyber incidents have had on the tech community. The conversation also highlights the complexities of managing unstructured data in enterprises and the increasing necessity of robust security measures as large language models become ubiquitous. Additionally, Braden critiques existing protections against prompt injection attacks while advocating for smarter data governance strategies.
undefined
8 snips
Feb 14, 2025 • 38min

Risky Biz Soap Box: Run your own open source IDP with Authentik

Fletcher Heisler, CEO of Authentik and a leader in open-source identity solutions, dives into the power of self-hosted identity management. He explains how users are reclaiming control from traditional SaaS providers like Okta. The discussion highlights Authentik's flexibility and adaptability for businesses, whether on-premises or in the cloud. Fletcher emphasizes user-driven development, security through transparency, and the importance of backup strategies, making a strong case for the future of open-source identity solutions.
undefined
50 snips
Feb 12, 2025 • 59min

Risky Business #779 -- DOGE staffer linked to The Com

Edward Wu, Founder and CEO of Dropzone.AI, shares insights on leveraging AI to improve security operations at SOCs. He discusses the rise in cybersecurity threats connected to sensitive data access, especially concerning the controversies surrounding Musk's DOGE team. The conversation delves into the evolving practices in cloud security and the shift from reactive to proactive measures against cybercrime. Wu emphasizes how AI can handle tedious tasks, allowing human analysts to focus on critical insights and better tackle emerging cyber risks.
undefined
34 snips
Feb 5, 2025 • 56min

Risky Business #778 -- Musk's child soldiers seize control of FedGov IT systems

Josh Kamdjou, co-founder and CEO of Sublime Security, dives into the significant challenges facing email security. He discusses how attackers exploit trusted platforms like DocuSign for phishing campaigns. The conversation also touches on recent cybersecurity breaches, the complexities of managing government IT systems, and the necessity for advanced detection methods in email security. Kamdjou highlights the continuous evolution of scammers’ tactics and the importance of robust defenses to safeguard sensitive information.
undefined
16 snips
Jan 29, 2025 • 51min

Risky Business #777 -- It's SonicWall's turn

Luke Jennings, a security researcher at Push Security, dives into the pitfalls of federated authentication, emphasizing how attackers exploit unexpected identity providers. He highlights alarming vulnerabilities in SonicWall devices and a comical DNS mishap involving MasterCard. The discussion also touches upon the risks of using personal Google accounts for corporate access and the complexities of managing multiple identity providers. With an eye on emerging threats, Jennings provides insights into securing user authentication in today's digital landscape.
undefined
34 snips
Jan 22, 2025 • 1h 4min

Risky Business #776 -- Trump will flex American cyber muscles

Craig Rowland, founder of Sandfly Security, brings his expertise in Linux EDR solutions to the conversation. He discusses the pressing challenges in Linux security monitoring, emphasizing the lack of standardized detection and response methods. The podcast also examines political influences on cybersecurity during the Trump administration and the implications of recent U.S. policies. Key topics include the complexities of securing Linux systems compared to Windows and addressing vulnerabilities in critical infrastructure. Tune in for insights into how organizations can fortify their defenses!

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app