Risky Business Podcast
October 22, 2025
Risky Business #811 -- F5 is the tip of the crap software iceberg
Presented by

Technology Editor

CEO and Publisher
In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
- China has been rummaging in F5’s networks for a couple of years
- Meanwhile China tries to deflect by accusing the NSA of hacking its national timing system
- Salesforce hackers use their stolen data trove to dox NSA, ICE employees
- Crypto stealing, proxy-deploying, blockchain-C2-ing VS Code worm charms us with its chutzpah
- Adam gets humbled by new Linux-capabilities backdoor trick
- Microsoft ignores its own guidance on avoiding BinaryFormatter, gets WSUS owned.
This episode is sponsored by Push Security. Co-founder and Chief Product Officer Jacques Louw joins to talk through how Push traced a LinkedIn phishing campaign targeting CEOs, and the new logging capabilities that proved critical to understanding it.
This episode is also available on Youtube.

Brought to you by Push Security
Stop identity attacks
Show notes
Why the F5 Hack Created an ‘Imminent Threat’ for Thousands of Networks | WIRED
Breach at US-based cybersecurity provider F5 blamed on China, sources say | Reuters
Network security devices endanger orgs with ’90s era flaws | CSO Online
Hackers Dox Hundreds of DHS, ICE, FBI, and DOJ Officials
Hackers Say They Have Personal Data of Thousands of NSA and Other Government Officials
ICE amps up its surveillance powers, targeting immigrants and antifa - The Washington Post
US court orders spyware company NSO to stop targeting WhatsApp, reduces damages | Reuters
Apple alerts exploit developer that his iPhone was targeted with government spyware | TechCrunch
A New Attack Lets Hackers Steal 2-Factor Authentication Codes From Android Phones | WIRED
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace | Koi Blog
Linux Capabilities Revisited | dfir.ch
CVE-2025-59287 WSUS Remote Code Execution | HawkTrace
Browser threat detection & response | Push Security | Push Security