Player FM - Internet Radio Done Right
17 subscribers
Checked 4h ago
Added three years ago
Content provided by Risky.biz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Risky.biz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED
When negative feedback shakes your confidence, it can be difficult to get back to feeling like yourself at work. In this episode, Anne and Frances help a struggling listener who has spent years toning herself down in the workplace after being told that she was too assertive — now, she feels that her modest approach is holding her back. Together, they use Anne and Frances’s “trust triangle” framework to explore how empathy, authenticity, and logic can help you rebuild confidence and trust with your colleagues, and share helpful confidence hacks for getting comfy with discomfort. What problems are you dealing with at work? Text or call 234-FIXABLE or email fixable@ted.com to be featured on the show. For the full text transcript, visit ted.com/podcasts/fixable-transcripts Want to help shape TED’s shows going forward? Fill out our survey ! Hosted on Acast. See acast.com/privacy for more information.…
Risky Bulletin: China privately admits to hacking US
Manage episode 476868452 series 3343651
Content provided by Risky.biz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Risky.biz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
China privately admits to hacking American critical infrastructure, the US Treasury was compromised by password spraying, America will sign a global spyware agreement after all, and a Chinese APT is abusing the Windows Sandbox to hide its malware.
Show notes
647 episodes
Manage episode 476868452 series 3343651
Content provided by Risky.biz. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Risky.biz or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
China privately admits to hacking American critical infrastructure, the US Treasury was compromised by password spraying, America will sign a global spyware agreement after all, and a Chinese APT is abusing the Windows Sandbox to hide its malware.
Show notes
647 episodes
All episodes
×
1 Srsly Risky Biz: Data brokers are a killer's best friend 22:28
22:28
Play Later
Play Later
Lists
Like
Liked22:28
Tom Uren and Patrick Gray talk about a Minnesota man who used people-search services to locate, stalk and eventually murder political targets. They also discuss purported hacktivist group Predatory Sparrow weighing in on the Iran-Israel conflict. It has attacked Iran’s financial system including a bank associated with the Iranian Revolutionary Guard Corp and also burnt USD$90 million worth of cryptocurrency from an Iranian exchange This episode is also available on Youtube . Show notes…

1 Risky Bulletin: Israel-linked hackers claim Iran bank disruption 7:03
7:03
Play Later
Play Later
Lists
Like
Liked7:03
An Israeli-linked hacktivist group claims attack on Iranian bank, Chrome gets a new prompt to prevent local network attacks, a Century-old German napkin company goes under following ransomware attack, and Europol takes down the Archetyp dark web market. Show notes

1 Between Two Nerds: Why modern influence operations suck 30:21
30:21
Play Later
Play Later
Lists
Like
Liked30:21
In this edition of Between Two Nerds Tom Uren and The Grugq take a look at a new AI-powered covert influence campaign and compare it to World War 2 efforts. This episode is also available on Youtube . Show notes

1 Risky Bulletin: Washington Post email accounts hacked 5:48
5:48
Play Later
Play Later
Lists
Like
Liked5:48
Email accounts compromised at the Washington Post, shady email provider Cock.li gets hacked, hackers steal data from a French university, and the EU invests €145 million in hospital cybersecurity. Show notes
In this Risky Bulletin sponsor interview Michael Leland, Field CTO of Island, talks about how Island manages risks from extensions, phishing and infostealers. Even when credentials are stolen, it is still not game over and there are still ways to prevent data loss and breaches. Show notes

1 Risky Bulletin: Predator spyware alive despite US sanctions 7:47
7:47
Play Later
Play Later
Lists
Like
Liked7:47
Intellexa is alive and well despite US sanctions, Paragon spyware used a zero-click iMessage exploit, South Korea’s largest online bookstore gets ransomwared, and law enforcement takes down several cybercrime operations. Show notes

1 Srsly Risky Biz: Trump scales back Biden product security demands 19:26
19:26
Play Later
Play Later
Lists
Like
Liked19:26
Tom Uren and Patrick Gray talk about how a Trump executive order has scaled back the government’s cyber security ambitions. The carrots and sticks that would have been used to encourage organisations to adopt stricter security standards are gone. They also discuss North Korea’s use of AI in its IT worker scam and the emergence of espionage-as-a-service… perhaps. This episode is also available on Youtube . Show notes…

1 Risky Bulletin: SentinelOne dodges a Chinese APT hack 5:13
5:13
Play Later
Play Later
Lists
Like
Liked5:13
SentinelOne dodges a Chinese APT hack, anonymous sources point to more Salt Typhoon victims, a cyberattack disrupts grocery deliveries in the US, and 140 arrested in Kazakhstan for selling citizens’ data. Show notes

1 Between Two Nerds: How Russia's sabotage team got into hacking 37:05
37:05
Play Later
Play Later
Lists
Like
Liked37:05
In this edition of Between Two Nerds Tom Uren and The Grugq take a look at the hackers of Unit 29155, Russian military intelligence’s sabotage and assassination group. This episode is also available on Youtube . Show notes The Insider 'Hidden Bear' investigation Japanese Tokuryū Ukraine SSSCIP report H1 2023…

1 Risky Bulletin: EU launches its own DNS service 6:12
6:12
Play Later
Play Later
Lists
Like
Liked6:12
The EU launches its own DNS service, Trump revises previous administrations’ cyber executive orders, a supply chain attack hits popular NPM packages, and mysterious iOS attacks spotted in the wild. Show notes

1 Sponsored: Phishing crews have gotten really good at evasion 18:19
18:19
Play Later
Play Later
Lists
Like
Liked18:19
In this sponsored interview, Casey Ellis interviews Push Security co-founder and Chief Product Officer Jacques Louw about how good phishing crews have gotten at evading detection. Attackers are hiding their payloads behind legitimate bot-detection tools to stop things like email security gateways from seeing them, as well as locking up phishing pages behind OAuth challenges. Push sees all this because it’s installed as a browser plugin and sees what users see. Show notes…

1 Risky Bulletin: APTeens go after Salesforce data 7:02
7:02
Play Later
Play Later
Lists
Like
Liked7:02
A hacking group goes after Salesforce data, the FBI takes down the BidenCash carding forum, China offers rewards for Taiwanese military hackers, and high risk bugs are patched in enterprise software from HPE and Infoblox. Show notes

1 Srsly Risky Biz: Law Enforcement Is Finally Making Progress on Ransomware 18:43
18:43
Play Later
Play Later
Lists
Like
Liked18:43
Tom Uren and Patrick Gray talk about how Operation Endgame, the multinational law enforcement effort to tackle ransomware is approaching the problem holisitically. It’s tackling the enablers of ransomware and although it won’t eliminate the crime, it’ll make it harder for criminals. They also discuss the spyware app that helped to dismantle the Syrian regime, at least maybe a little bit, and how Russian military intelligence’s sabotage and assasination unit got into cyber operations. This episode is also available on Youtube . Show notes…

1 Risky Bulletin: Syrian Army infected with spyware before regime collapse 8:20
8:20
Play Later
Play Later
Lists
Like
Liked8:20
A spyware app infected the Syrian Army’s soldiers before the regime collapsed, NSO appeals its WhatsApp verdict, Chrome and Qual-comm patch zero-days, and an emergency services information sharing group shuts down. Show notes

1 Between Two Nerds: NSA's thinking on information warfare 31:08
31:08
Play Later
Play Later
Lists
Like
Liked31:08
In this edition of Between Two Nerds Tom Uren and The Grugq look at NSA’s take on information warfare, all the way back from 1997. This episode is also available on Youtube . Show notes Cryptolog, The Journal of Technical Health, from NSA in 1997
R
Risky Bulletin

1 Risky Bulletin: Law enforcement takes down AVCheck 6:16
6:16
Play Later
Play Later
Lists
Like
Liked6:16
Law enforcement agencies take down A-V-Check, four US Senators urge for the reinstatement of the Cyber Safety Review Board, Germany identifies the leader of the TrickBot gang, and an AI-vibe-coding platform leaks user data and API keys. Show notes
R
Risky Bulletin

1 Sponsored: HD Moore on why vuln scanners are awful and broken 15:21
15:21
Play Later
Play Later
Lists
Like
Liked15:21
In this sponsored interview, Risky Business Media’s brand new interviewer Casey Ellis chats with runZero founder and CEO HD Moore about why vuln scanning tech is awful and broken. He also talks about how they’re trying to do something better by glueing their own discovery product to the nuclei open source vulnerability scanner. Show notes…
R
Risky Bulletin

1 Risky Bulletin: Windows Update will patch third party apps 6:05
6:05
Play Later
Play Later
Lists
Like
Liked6:05
Windows Update will deliver third party app updates, a public database exposed Russia’s nuclear secrets, US banks ask the SEC to rescind cyber breach disclosure rule, and ConnectWise discloses an APT breach. Show notes
R
Risky Bulletin

1 Srsly Risky Biz: Russia's cybercriminals and spies are officially in cahoots 16:27
16:27
Play Later
Play Later
Lists
Like
Liked16:27
Tom Uren and Patrick Gray talk about Russian DanaBot malware developers making a tailored variant of their malware specifically for espionage. This fills in some of the blanks on the exact relationship between Russian criminals and the country’s intelligence services. They also discuss a US Director of National Intelligence initiative to centralise the purchase of commercially acquired information. Although this information can be used maliciously, having a one-stop-shop should make it easier to check that it is being used responsibly. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: Dutch intelligence discovers a new Russian APT 5:27
5:27
Play Later
Play Later
Lists
Like
Liked5:27
Dutch intelligence discovers a new Russian APT, a ransomware attack hits the maker of MATLAB, 20 arrested in Nigeria over hacking exam results, and an Iranian pleads guilty for the Robbinhood ransomware attacks. Show notes
R
Risky Bulletin

In this edition of Between Two Nerds Tom Uren and The Grugq talk about cyber’s ‘hard problems’ and why they are intractable. This episode is also available on Youtube . Show notes Cyber Hard Problems, from the National Academies of Sciences
R
Risky Bulletin

1 Risky Bulletin: Major CISA leadership exodus underway 4:51
4:51
Play Later
Play Later
Lists
Like
Liked4:51
A major exodus of leadership is underway at CISA, the US government will audit NIST over its vulnerability backlog; an ancient and mysterious APT has been linked to Spain’s government, and the SVG image format is great for phishing. Show notes
R
Risky Bulletin

1 Sponsored: Sublime Security on the spam/email bomb problem 22:55
22:55
Play Later
Play Later
Lists
Like
Liked22:55
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Bobby Filar, Head of Machine Learning at Sublime Security. Bobby takes us through the rising problem of spam bombing, or email bombing, a technique threat actors are increasingly using for initial access into corporate environments. Show notes Bobby Filar Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators Storm-1811 exploits RMM tools to drop Black Basta ransomware Massive Email Bombs Target .Gov Addresses A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist…
R
Risky Bulletin

1 Risky Bulletin: DanaBot and Lumma Stealer taken down 7:33
7:33
Play Later
Play Later
Lists
Like
Liked7:33
Law enforcement takes down the DanaBot and Lumma Stealer malware operations, the US government wants a centralized data broker platform, Turkey dismantles a Chinese IMSI catcher spy ring, and Russia hacked border cameras to track Ukrainian military aid. Show notes
R
Risky Bulletin

1 Srsly Risky Biz: Telegram is cooperating with authorities, for now 20:27
20:27
Play Later
Play Later
Lists
Like
Liked20:27
Tom Uren and Patrick Gray talk about how Telegram took down the two largest ever criminal marketplaces recently. They used Telegram for all their communications and had collectively sold over USD$30 billion in illicit products. The pair discuss why Telegram is now cooperating with authorities after historically being reluctant and whether this assistance will continue. They also discuss how Meta is awash with scam advertisements and how Chinese mobile app encryption is suspiciously awful. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: TeleMessage data published by DDoSecrets 6:41
6:41
Play Later
Play Later
Lists
Like
Liked6:41
DDoSecrets archives 400GB of stolen TeleMessage data, the FBI closes its FISA watchdog office, Predatorgate lawsuit delayed due to interpreter shortage, and a wave of DDoS attacks disrupt Russian government portals. Show notes
R
Risky Bulletin

1 Between Two Nerds: Why hackers and spies don't mix 28:35
28:35
Play Later
Play Later
Lists
Like
Liked28:35
In this edition of Between Two Nerds Tom Uren and The Grugq examine what makes it hard for even competent hackers to contribute to state-backed espionage agencies. This episode is also available on Youtube . Show notes The I-Soon cyber espionage contractor data leak
R
Risky Bulletin

1 Risky Bulletin: Japan passes active cyber defense law 6:20
6:20
Play Later
Play Later
Lists
Like
Liked6:20
Japan passes a new active cyber defense law, printer software gets shipped with malware, a UK telco leaks user data and geolocation via its 4G network, and Volkswagen patches major bugs in its mobile app. Show notes
R
Risky Bulletin

1 Sponsored: Securing identity is like building a house while blindfolded 15:50
15:50
Play Later
Play Later
Lists
Like
Liked15:50
In this Risky Bulletin sponsor interview Justin Kohler, Chief Product Officer at SpecterOps talks to Tom Uren about the impossible challenge of managing identity directory services securely. Organisations try to implement the principle of least privilege but have no idea if they have done a good job. Justin talks about approaches SpecterOps is developing to address this problem. Show notes…
R
Risky Bulletin

1 Risky Bulletin: Coinbase reveals insider breach, extortion attempt 7:41
7:41
Play Later
Play Later
Lists
Like
Liked7:41
Coinbase was extorted by hackers who bribed employees for user data, America’s largest steel producer halts production after a cyberattack, Scattered Spider shifts to targeting US retailers, and the US abandons plans to protect Americans from data brokers. Show notes
R
Risky Bulletin

1 Srsly Risky Biz: Special guests Rob Joyce and Andy Boyd on offensive cyber 43:03
43:03
Play Later
Play Later
Lists
Like
Liked43:03
In this special edition of the Seriously Risky Business podcast Patrick Gray speaks with former NSA Cybersecurity Director Rob Joyce and former director of the CIA’s Center for Cyber Intelligence Andy Boyd. The talk about what offensive cyber could look like under Trump 2.0, and the shake-up the intelligence community is going through under various White House initiatives. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: EU launches its own vulnerability database 6:49
6:49
Play Later
Play Later
Lists
Like
Liked6:49
The EU launches its own vulnerability database, a Turkish APT deploys a zero-day in Iraq, North Korea tasks an APT to Ukraine, and Spain will probe cyber’s role in last month’s energy grid collapse. Show notes
R
Risky Bulletin

1 Between Two Nerds: Should US spies steal Chinese commercial secrets? 32:25
32:25
Play Later
Play Later
Lists
Like
Liked32:25
In this edition of Between Two Nerds Tom Uren and The Grugq examine whether the US should steal intellectual property from Chinese companies. This episode is also available on Youtube . Show notes Stewart Baker's Lawfare article Bunny Huang's 'Essential Guide to Electronics in Shenzhen' BTN44 on the rights and wrongs of intellectual property theft Corelight sponsor interview with James Pope…
R
Risky Bulletin

1 Risky Bulletin: Kaleidoscope ad fraud network infects 2.5m devices a month 5:50
5:50
Play Later
Play Later
Lists
Like
Liked5:50
The Kaleidoscope ad fraud network infects 2.5 million devices a month, Germany seizes the eXch crypto-mixing service, the US takes down the Anyproxy botnet, and Chrome will use on-device AI to detect tech support scams. Show notes
R
Risky Bulletin

1 Sponsored: What really goes down on Blackhat wifi networks 15:35
15:35
Play Later
Play Later
Lists
Like
Liked15:35
In this Risky Bulletin sponsor interview James Pope, Director of Technical Enablement, talks to Tom Uren about his experience running networks and security centres at Black Hat conferences around the world. Pope talks about the challenges of running a SOC at a hacker conference, how conference networks around the world have a different character and talks about all the weird and wonderful security snafus he has found. Show notes…
R
Risky Bulletin

1 Risky Bulletin: France says Russia's influence operations are achieving results 6:03
6:03
Play Later
Play Later
Lists
Like
Liked6:03
France says Russia’s influence operations are achieving results, Crowdstrike lays off 5% of its staff, a hacker dumps LockBit’s ransomware database, and a ransomware attack slows production at a major US medical device maker. Show notes
R
Risky Bulletin

1 Srsly Risky Biz: US Cyber Command to be unleashed 21:24
21:24
Play Later
Play Later
Lists
Like
Liked21:24
Tom Uren and Patrick Gray talk about how the US is planning to take the gloves off in cyberspace and conduct much more aggressive offensive cyber operations. US responses to cyber espionage have not been very aggressive to date, but Tom is not convinced that cyber punches are required, so much as blows that really hurt. The pair also discuss TeleMessage, the Signal clone the Trump cabinet has been using. The app managed to sidestep certification and assessment processes and ended up being used by various agencies in the US government. And the White House. It’s a mystery how this happened. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: NSO ordered to pay Meta $167 million in WhatsApp lawsuit 5:37
5:37
Play Later
Play Later
Lists
Like
Liked5:37
NSO Group ordered to pay Meta $167 million dollars, the White House tells N-S-A to cut 8% of its civilian staff, the US sanctions a Myanmar militia group leader for cyber scams, and one of the Nomad Bridge hackers gets arrested in Israel. Show notes
R
Risky Bulletin

In this edition of Between Two Nerds Tom Uren and The Grugq talk about an in-depth report on a Ukrainian hacking control panel. The panel shows how the Ukrainian group thinks about hacking operations and the pair discuss why the report exists and what it achieves. This episode is also available on Youtube . Show notes Bulldog backdoor web panel analysis…
R
Risky Bulletin

1 Risky Bulletin: Trump admin's Signal clone gets hacked, messages exposed 7:52
7:52
Play Later
Play Later
Lists
Like
Liked7:52
The Trump admin’s Signal clone gets hacked, a six-year-old backdoor comes to life to hijack online stores, a Phishing kingpin identified as a 24-year-old Chinese man, and Ireland fines TikTok for transferring EU user data to China. Show notes
R
Risky Bulletin

1 Sponsored: Why security is a data search problem 13:12
13:12
Play Later
Play Later
Lists
Like
Liked13:12
In this Risky Bulletin sponsor interview Mike Wiaceck, CEO and founder of Stairwell, explains why he believes security is really a data storage and retrieval problem. He demonstrates how that pays off with in the analysis of new malware. Show notes
R
Risky Bulletin

1 Risky Bulletin: New Microsoft accounts will be passwordless by default 5:44
5:44
Play Later
Play Later
Lists
Like
Liked5:44
New Microsoft accounts will be passwordless by default, a Chinese APT is hijacking software updates, the US dominates EU cybersecurity market, and Commvault discloses a breach. Show notes
R
Risky Bulletin

1 Srsly Risky Biz: Security vendors are constantly attacked 20:47
20:47
Play Later
Play Later
Lists
Like
Liked20:47
Tom Uren and Patrick Gray talk about a SentinelOne report about how it is constantly targeted by both cybercriminal and state-backed hackers. Security firms are high-value targets, so constant attacks on them are the new normal. They also discuss an article that calls Signal “a kind of dark matter of American politics and media”. Many policy discussions occur on the app, and this explains the Trump administration’s extensive use of the app. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: French government grows spine, calls out Russian hacks 8:49
8:49
Play Later
Play Later
Lists
Like
Liked8:49
The French government calls out Russian hacks for the first time, Marks & Spencer sends staff home after a ransomware attack, China accuses America of hacking a major cryptography provider, and AirBorne vulnerabilities impact Apple’s AirPlay. Show notes
R
Risky Bulletin

1 Between Two Nerds: Releasing the hounds on scam compounds 31:23
31:23
Play Later
Play Later
Lists
Like
Liked31:23
In this edition of Between Two Nerds Tom Uren and The Grugq discuss the Southeast Asian criminal syndicates that run online scam compounds. Should organisations like US Cyber Command or the UK’s National Cyber Force target these gangs with disruption operations? This episode is also available on Youtube . Show notes UN Office of Drugs and Crime on Southeast Asian transnational cyber scammers…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.