
Risky Business
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Latest episodes

8 snips
Nov 11, 2024 • 36min
Risky Biz Soap Box: Why black box email security is dead
In this insightful discussion, Josh Kamdjou, co-founder of Sublime Security, shares his journey from offensive security to pioneering innovative email protection. He critiques traditional opaque email security solutions for their inefficiencies and high false positive rates. Josh introduces a new programmable detection engine that adapts to diverse user environments, addressing emerging threats like AI-driven phishing. The conversation emphasizes the necessity for smarter, more customizable email security measures in the face of evolving cyberattack tactics.

8 snips
Nov 6, 2024 • 57min
Risky Business #769 -- Sophos drops implants on Chinese exploit devs
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
Sophos drops implants on Chinese firewall exploit devs
Microsoft workshops better just-in-time Windows admin privileges
Snowflake hacker arrested in Canada
Okta has a fun, but not very impactful auth-bypass bug
Russians bring dumb-but-smart RDP client attacks
And much, much more.
Special guest Sophos CISO Ross McKerchar joined us to talk about its “hacking back” campaign. The full interview is
available on Youtube for those who want to really live vicariously through Sophos doing what every vendor probably wants to do.
This week’s episode is sponsored by attack surface mapping vendor runZero. Founder and CEO HD Moore joins to talk about marrying up the outside and inside views of your network.
You can also watch this episode on Youtube
Show notes
Okta AD/LDAP Delegated Authentication - Username Above 52 Characters Security Advisory
Does bcrypt have a maximum password length? - Information Security Stack Exchange
Local Administrator Protection | Privilege Protection
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices | WIRED
A Deeper Look at FortiJump (FortiManager CVE-2024-47575) | Bishop Fox
Man Arrested for Snowflake Hacking Spree Faces US Extradition | WIRED
Google uses large language model to discover real-world vulnerability
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI
Thousands of hacked TP-Link routers used in yearslong account takeover attacks - Ars Technica
CISA warns of foreign threat group launching spearphishing campaign using malicious RDP files | Cybersecurity Dive
Chinese state-backed hackers breached 20 Canadian government networks over four years, agency warns
India-Canada row: Canadian officials confess to leaking 'intel' against India to Washington Post - India Today
Amid diplomatic row, Canada names India in ‘cyberthreat adversary’ list, accuses it of ‘likely spying’ | World News - The Indian Express
The Untold Story of Trump's Failed Attempt to Overthrow Venezuela's President | WIRED
Risky Biz News: The mystery at Mango Park
North Korean hackers seen collaborating with Play ransomware group, researchers say

Oct 30, 2024 • 52min
Risky Business #768 -- CSRB will investigate China's Wiretap Hacks
Daniel Ayala, Chief Security and Trust Officer at Dotmatics, shares insights on data security challenges in cloud environments. Rajan Kapoor from Material Security discusses the importance of securing data in platforms like M365 and Google Workspace. The conversation delves into the investigation of Chinese wiretap hacks, the rise of cybercrime, and the impact of recent breaches on corporate accountability. They also highlight the necessity for robust email security measures and data governance strategies to protect sensitive information from misuse.

Oct 28, 2024 • 38min
Risky Biz Soap Box: Thinkst Canary's decade of deception
Haroon Meer, founder of Thinkst Canary, shares insights from a decade in deception technology. He discusses how Thinkst continues to lead the deception game with user-friendly solutions. The conversation delves into the innovative use of internal honeypots and canary tokens for risk management. Meer also reflects on the importance of establishing genuine connections at cybersecurity conferences, blending humor with practical advice. He touches on the evolving landscape of security and the persistent preference for hardware devices over cloud solutions.

Oct 23, 2024 • 1h 2min
Risky Business #767 – SEC fines Check Point, Mimecast, Avaya and Unisys over hacks
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
SEC fines tech firms for downplaying the Solarwinds hacks
Anonymous Sudan still looks and quacks like a Russian duck
Apple proposes max 10 day TLS certificate life
Oopsie! Microsoft loses a bunch of cloud logs
Veeam and Fortinet are bad and should feel bad
North Koreans are good (at hacking)
And much, much more.
This week’s episode is sponsored by Proofpoint. Chief Strategy Officer Ryan Kalember joins to talk about their work keeping up with prolific threat actor SocGholish.
This episode is also available on Youtube.
Show notes
Four cyber companies fined for SolarWinds disclosure failures
U.S. charges Sudanese men with running powerful cyberattack-for-hire gang
Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals | WIRED
Risky Biz News: Anonymous Sudan's Russia Links Are (Still) Obvious
Microsoft confirms partial loss of security log data on multiple platforms | Cybersecurity Dive
Risky Biz News: Apple wants to reduce the lifespan of TLS certificates to 10 days
Encrypted Chat App ‘Session’ Leaves Australia After Visit From Police
Crypto platform Radiant Capital says $50 million in digital coins stolen following account compromises
North Korean hackers use newly discovered Linux malware to raid ATMs - Ars Technica
Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach – Krebs on Security
Here’s how SIM swap in alleged bitcoin pump-and-dump scheme worked - Ars Technica
Critical Veeam CVE actively exploited in ransomware attacks | Cybersecurity Dive
FortiGate admins report active exploitation 0-day. Vendor isn’t talking. - Ars Technica
Hackers reportedly impersonate cyber firm ESET to target organizations in Israel
The latest in North Korea’s fake IT worker scheme: Extorting the employers

Oct 16, 2024 • 54min
Risky Business #766 – China hacks America's lawful intercept systems
This week, Casey Hill, the Director of Product Management at Panther, dives into the future of Security Information and Event Management (SIEM). He critiques the outdated practice of dumping data into lakes without proper management. Casey highlights the vulnerabilities in lawful intercept systems, particularly concerning recent Chinese espionage. The conversation also touches on emerging cyber threats, including innovative malware and the evolving strategies of cybercriminals, while emphasizing the need for structured data management in cybersecurity.

Oct 1, 2024 • 40min
Snake Oilers: Sandfly Security, Permiso and Wiz
This episode features insights from guests representing Sandfly Security, Permiso, and Wiz. Sandfly discusses their innovative agentless approach to securing Linux systems, tackling challenges like SSH key management. Permiso emphasizes machine learning in identity security, focusing on proactive measures to detect threats. Wiz explores cloud security vulnerabilities and the importance of integrating safety measures into coding practices. Together, they shed light on the evolving landscape of cybersecurity and its critical role in today's digital world.

Sep 25, 2024 • 1h 6min
Risky Business #765 -- The Kaspersky switcheroo
Rob Joyce, a former U.S. cybersecurity advisor, shares insights on the pressures tech giants face from governments. He discusses Elon Musk's challenges with free speech in Brazil and TikTok's proactive stance against misinformation. Mike Wiacek, founder of Stairwell, highlights innovative malware detection techniques and the ongoing arms race in cybersecurity. The duo also explores Kaspersky's unexpected switch to an unfamiliar antivirus, demonstrating the complex dynamics in the security landscape.

8 snips
Sep 18, 2024 • 1h 3min
Risky Business #764 -- Mossad expands into telecommunications services
Luke Jennings, a security expert at Push Security with a focus on phishing kit analysis, joins to discuss the evolving tactics of cybercriminals. He sheds light on how phishing crews are driving an arms race in online security and emphasizes the importance of adapting detection methods to users' needs. The conversation includes a critical look at multi-factor authentication vulnerabilities and the necessity of enhanced browser security. Jennings also critiques current cybersecurity solutions and the overlooked potential for browser-level monitoring.

Sep 11, 2024 • 52min
Risky Business #763 – Microsoft un-patches critical bug
Paul Wells, an incident responder at Kroll Cyber, dives into the crucial topic of cyber incident preparedness. He emphasizes the significance of having a pre-established incident response plan to mitigate crises effectively. With examples from real-world breaches, Wells discusses the necessity of accurate backups and clear communication during recovery. The conversation also touches upon the complexities of modern cybersecurity threats like ransomware and how organizations can adapt their strategies for improved resilience.