<?xml version="1.0" encoding="utf-8" ?>
<rss version="2.0" xml:base="https://risky.biz/feeds/risky-business-news" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"  xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Risky Bulletin</title>
        <description>Regular cybersecurity news updates from the Risky Business team...</description>
        <link>https://risky.biz/</link>
        <copyright>Copyright Risky Business Media 2007-2026</copyright>
        <language>en</language>
        <atom:link href="https://risky.biz/feeds/risky-business-news" rel="self" type="application/rss+xml" />
        <pubDate>Tue, 10 Mar 2026 07:00:14 +1100</pubDate>
        <lastBuildDate>Tue, 10 Mar 2026 07:00:14 +1100</lastBuildDate>
        <itunes:image href="https://risky.biz/static/img/rb-feed-bulletin.png" />
        <itunes:author>Risky Business Media</itunes:author>
	<itunes:category text="News"> <itunes:category text="Tech News" /> </itunes:category> <itunes:category text="Technology"/>
        <itunes:owner>
            <itunes:name>Risky.biz</itunes:name>
            <itunes:email>editorial@risky.biz</itunes:email>
        </itunes:owner>
        <itunes:explicit>false</itunes:explicit>
        <generator>Jekyll v4.2.2</generator>
        
        
        
            
        
        <item>
            <title>Between Two Nerds: An internet blackout won&apos;t stop NSA in Iran</title>
            <pubDate>Tue, 10 Mar 2026 06:36:38 +1100</pubDate>
            <link>https://risky.biz/BTN157/</link>
            <guid isPermaLink="true">https://risky.biz/BTN157/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN157.mp3" length="24949261" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1558</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about why an internet shutdown won’t stop US cyber operations in Iran.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about why an internet shutdown won’t stop US cyber operations in Iran.</p>

<p>This episode is also available on <a href="https://youtu.be/RZHiQDZzlpk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/srsly-risky-biz-the-four-hour-cyber-war-on-iran/">Srsly Risky Biz: The Four Hour Cyber War on Iran</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/The_Thing_(listening_device)">The Thing listening device</a></li>
										
                    	<li><a href="https://www.cryptomuseum.com/covert/bugs/selectric/">IBM Selectric bug</a></li>
										
                    	<li><a href="https://www.yahoo.com/news/cias-communications-suffered-catastrophic-compromise-started-iran-090018710.html">CIA compromise in Iran</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime</title>
            <pubDate>Mon, 09 Mar 2026 12:13:44 +1100</pubDate>
            <link>https://risky.biz/RBNEWS535/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS535/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS535.mp3" length="8863753" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>523</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                US federal agencies told to crack down on scams and cybercrime, the White House releases its new Cyber Strategy, suspected Chinese hackers breach the FBI’s wiretap network, and Romania’s largest meat exporter is insolvent after a ransomware attack.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>US federal agencies told to crack down on scams and cybercrime, the White House releases its new Cyber Strategy, suspected Chinese hackers breach the FBI’s wiretap network, and Romania’s largest meat exporter is insolvent after a ransomware attack.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-new-white-house-eo-prioritizes-fight-against-scams-and-cybercrime/">Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: What it means to be a learning organisation</title>
            <pubDate>Mon, 09 Mar 2026 07:06:57 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI118/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI118/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI118.mp3" length="14097029" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>880</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsor interview, Marco Slaviero, CTO of Thinkst, talks to Tom Uren about how the company ensures that it is a learning organisation.

The pair discuss the company’s investment in its Thinkst Labs, how it differs from other security research labs, and how it helps grow products and people.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsor interview, Marco Slaviero, CTO of Thinkst, talks to Tom Uren about how the company ensures that it is a learning organisation.</p>

<p>The pair discuss the company’s investment in its Thinkst Labs, how it differs from other security research labs, and how it helps grow products and people.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes</title>
            <pubDate>Fri, 06 Mar 2026 13:32:10 +1100</pubDate>
            <link>https://risky.biz/RBNEWS534/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS534/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS534.mp3" length="7006411" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>407</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-iranian-hackers-are-scanning-for-security-cameras-to-aid-missile-strikes/">Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: The four hour cyber war on Iran</title>
            <pubDate>Thu, 05 Mar 2026 13:58:16 +1100</pubDate>
            <link>https://risky.biz/SRB157/</link>
            <guid isPermaLink="true">https://risky.biz/SRB157/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB157.mp3" length="20288344" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1256</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about how cyber operations were used in the first hours of the US-Israeli attack on Iran. They were instrumental in the attack on Iranian Supreme Leader Ali Khamenei, but they didn’t last long. The Iranian regime implemented an internet blackout within four hours of the first bombs.

They also discuss how threat actors are using AI. It’s not game-changing so far, but it is very much altering the balance between attack and defence.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about how cyber operations were used in the first hours of the US-Israeli attack on Iran. They were instrumental in the attack on Iranian Supreme Leader Ali Khamenei, but they didn’t last long. The Iranian regime implemented an internet blackout within four hours of the first bombs.</p>

<p>They also discuss how threat actors are using AI. It’s not game-changing so far, but it is very much altering the balance between attack and defence.</p>

<p>This episode is also available on <a href="https://youtu.be/UHoaIi9Ai1E">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes</title>
            <pubDate>Wed, 04 Mar 2026 10:00:00 +1100</pubDate>
            <link>https://risky.biz/RBNEWS533/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS533/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS533.mp3" length="7392569" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>432</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-cyber-command-conducted-cyberattacks-ahead-of-iran-strikes/">Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: The evolution of cyber ops in Ukraine</title>
            <pubDate>Tue, 03 Mar 2026 07:37:58 +1100</pubDate>
            <link>https://risky.biz/BTN156/</link>
            <guid isPermaLink="true">https://risky.biz/BTN156/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN156a.mp3" length="26710279" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1668</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq how the use of cyber operations in the war in Ukraine has evolved over time.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq how the use of cyber operations in the war in Ukraine has evolved over time.</p>

<p>This episode is also available on <a href="https://youtu.be/CUL4YC8xh0w">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/ukraine-cyberattacks-guiding-russian-missile-strikes">Russia using cyber espionage to direct grid missile strikes</a></li>
										
                    	<li><a href="https://spectator.com/article/has-it-all-gone-wrong-between-trump-and-starmer/">The Spectator article on US-UK relations</a></li>
										
                    	<li><a href="https://risky.biz/BTN72/">BTN72 on the Taurus missile leak</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: LLMs can deanonymize internet users based on their comments</title>
            <pubDate>Mon, 02 Mar 2026 12:17:26 +1100</pubDate>
            <link>https://risky.biz/RBNEWS532/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS532/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS532.mp3" length="9105659" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>539</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-llms-can-deanonymize-internet-users-based-on-their-comments/">Risky Bulletin: LLMs can deanonymize internet users based on their past comments</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: AI Agents need distinct identities</title>
            <pubDate>Mon, 02 Mar 2026 06:47:24 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI117/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI117/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI117.mp3" length="14642138" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>914</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis chats to Harish Peri, SVP and general manager for AI security at Okta, a cloud-based identity and access management company. The pair chat about the fact that AI is forcing enterprises to relearn the basics around identity security, and how Okta for AI Agents can help.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis chats to Harish Peri, SVP and general manager for AI security at Okta, a cloud-based identity and access management company. The pair chat about the fact that AI is forcing enterprises to relearn the basics around identity security, and how Okta for AI Agents can help.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russian man extorts Conti ransomware group</title>
            <pubDate>Fri, 27 Feb 2026 13:42:24 +1100</pubDate>
            <link>https://risky.biz/RBNEWS531/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS531/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS531.mp3" length="8785747" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>519</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russian-man-investigated-for-extorting-conti-ransomware-group/">Risky Bulletin: Russian man investigated for extorting Conti ransomware group</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Is Claude too woke for war?</title>
            <pubDate>Thu, 26 Feb 2026 11:59:10 +1100</pubDate>
            <link>https://risky.biz/SRB156/</link>
            <guid isPermaLink="true">https://risky.biz/SRB156/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB156.mp3" length="15940946" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>985</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and use in lethal autonomous weapons.

They also discuss the return of Volt Typhoon, the Chinese hacker group prepositioning in critical infrastructure for sabotage in the event of a conflict over Taiwan. The group is still around, even though the US government declared victory against it last July.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the argy-bargy between the Pentagon and AI company Anthropic. US Defense Secretary Pete Hegseth is demanding that all safeguards are lifted from Claude, while Anthropic CEO Dario Amodei is insisting on protections against mass surveillance of Americans and use in lethal autonomous weapons.</p>

<p>They also discuss the return of Volt Typhoon, the Chinese hacker group prepositioning in critical infrastructure for sabotage in the event of a conflict over Taiwan. The group is still around, even though the US government declared victory against it last July.</p>

<p>This episode is also available on <a href="https://youtu.be/XBFQXi61O_E">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov</title>
            <pubDate>Wed, 25 Feb 2026 12:29:58 +1100</pubDate>
            <link>https://risky.biz/RBNEWS530/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS530/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS530.mp3" length="7400619" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>432</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia launches a criminal probe into Telegram’s founder, two teenagers arrested for a South Korean bike share hack, Anthropic accuses Chinese AI firms of distillation attacks, and the US Treasury sanctions a Russian exploit broker.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia launches a criminal probe into Telegram’s founder, two teenagers arrested for a South Korean bike share hack, Anthropic accuses Chinese AI firms of distillation attacks, and the US Treasury sanctions a Russian exploit broker.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russia-starts-criminal-probe-of-telegram-founder-pavel-durov/">Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: How NSA will use AI</title>
            <pubDate>Tue, 24 Feb 2026 08:13:02 +1100</pubDate>
            <link>https://risky.biz/BTN155/</link>
            <guid isPermaLink="true">https://risky.biz/BTN155/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN155.mp3" length="26349799" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1646</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI.

This episode is available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about how ‘professional’ Five Eyes cyber espionage agencies like NSA will use AI. These agencies place a premium on stealth and won’t yolo AI.</p>

<p>This episode is available on <a href="https://youtu.be/w7sTC9GcL8A">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/ai-powered-espionage-will-favor-china/">How AI-powered espionage will favour China</a></li>
										
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">Google&#39;s AI threat tracker, February 2026</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices</title>
            <pubDate>Mon, 23 Feb 2026 11:48:53 +1100</pubDate>
            <link>https://risky.biz/RBNEWS529/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS529/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS529.mp3" length="6644801" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>385</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                An AI-driven hacking campaign breached 600 Fortinet devices, Ivanti was hacked via its own product, Wikipedia bans Archive-dot-Today for DDoS attacks, and Chinese hackers breached Italy’s police force.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>An AI-driven hacking campaign breached 600 Fortinet devices, Ivanti was hacked via its own product, Wikipedia bans Archive-dot-Today for DDoS attacks, and Chinese hackers breached Italy’s police force.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-ai-driven-hacking-campaign-breaches-600-fortinet-devices/">Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: The smouldering trashfire of AI and open source</title>
            <pubDate>Mon, 23 Feb 2026 06:42:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI116/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI116/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI116.mp3" length="24011308" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1499</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsor interview, Casey Ellis and Feross Aboukhadijeh discuss how AI is affecting open source, chat about a few attacks the company has seen in the wild and introduce Socket’s answer to the smouldering trashfire: Socket Firewall.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsor interview, Casey Ellis and Feross Aboukhadijeh discuss how AI is affecting open source, chat about a few attacks the company has seen in the wild and introduce Socket’s answer to the smouldering trashfire: Socket Firewall.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: RPKI infrastructure sits on shaky ground</title>
            <pubDate>Fri, 20 Feb 2026 13:00:06 +1100</pubDate>
            <link>https://risky.biz/RBNEWS528/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS528/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS528.mp3" length="8736621" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>516</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-rpki-infrastructure-sits-on-shaky-ground/">Risky Bulletin: RPKI infrastructure sits on shaky ground</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Cyber bullets can&apos;t replace political will</title>
            <pubDate>Thu, 19 Feb 2026 12:55:11 +1100</pubDate>
            <link>https://risky.biz/SRB155/</link>
            <guid isPermaLink="true">https://risky.biz/SRB155/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB155.mp3" length="18965488" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1174</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about a groundswell of calls from European officials to build cyber capabilities to strike back against adversaries. There are good reasons that countries should have their own cyber capabilities, but if you don’t have the political will to strike back, having a magic cyber weapon doesn’t really make a difference.

They also talk about ‘distillation attacks’. They are a way that AI developers can steal the secret sauce of advanced models just by asking questions. It looks like American companies need government assistance if the US wants to keep its AI lead.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about a groundswell of calls from European officials to build cyber capabilities to strike back against adversaries. There are good reasons that countries should have their own cyber capabilities, but if you don’t have the political will to strike back, having a magic cyber weapon doesn’t really make a difference.</p>

<p>They also talk about ‘distillation attacks’. They are a way that AI developers can steal the secret sauce of advanced models just by asking questions. It looks like American companies need government assistance if the US wants to keep its AI lead.</p>

<p>This episode is also available on <a href="https://youtu.be/5gh2PqEWMKo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Supply chain attack plants backdoor on Android tablets</title>
            <pubDate>Wed, 18 Feb 2026 14:24:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWS527/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS527/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS527.mp3" length="8440345" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>498</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-supply-chain-attack-plants-backdoor-on-android-tablets/">Risky Bulletin: Supply chain attack plants backdoor on Android tablets</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Buying the magic weapon</title>
            <pubDate>Tue, 17 Feb 2026 07:24:23 +1100</pubDate>
            <link>https://risky.biz/BTN154/</link>
            <guid isPermaLink="true">https://risky.biz/BTN154/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN154.mp3" length="27182585" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1698</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.

This episode is also available on Youtube

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.</p>

<p>This episode is also available on <a href="https://youtu.be/kC_x8niABrw">Youtube</a></p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/iran-nuclear-cyber-strikes-us">The Record on Iranian air defences</a></li>
										
                    	<li><a href="https://www.hurstpublishers.com/book/no-shortcuts/">Max Smeets No Shortcuts</a></li>
										
                    	<li><a href="https://risky.biz/RBNEWSSI115/">RunZero sponsor interview</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cambodia promises to dismantle scam compounds by April</title>
            <pubDate>Mon, 16 Feb 2026 14:14:00 +1100</pubDate>
            <link>https://risky.biz/RBNEWS526/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS526/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS526.mp3" length="8985691" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>532</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/risky-bulletin-cambodia-promises-to-dismantle-scam-networks-by-april/">Risky Bulletin: Cambodia promises to dismantle scam networks by April</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Filtering the KEV was really hard … Until now!</title>
            <pubDate>Mon, 16 Feb 2026 06:42:21 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI115/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI115/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI115.mp3" length="23035384" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1438</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis chats to Tod Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis chats to Tod Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.runzero.com/resources/kevology/">KEVology: An analysis of exploits, scores, &amp; timelines on the CISA KEV</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI</title>
            <pubDate>Fri, 13 Feb 2026 13:07:45 +1100</pubDate>
            <link>https://risky.biz/RBNEWS525/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS525/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS525.mp3" length="7381405" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>431</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A Malware developer faked his own death to evade the FBI, Apple patches a zero-day used in a targeted attack, the Tianfu Cup quietly returns, and researchers spot the first malicious Outlook add-in.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A Malware developer faked his own death to evade the FBI, Apple patches a zero-day used in a targeted attack, the Tianfu Cup quietly returns, and researchers spot the first malicious Outlook add-in.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-icedid-malware-developer-fakes-his-own-death-to-escape-the-fbi/">Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Microsoft forgoes its secure future</title>
            <pubDate>Thu, 12 Feb 2026 11:46:20 +1100</pubDate>
            <link>https://risky.biz/SRB154/</link>
            <guid isPermaLink="true">https://risky.biz/SRB154/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB154.mp3" length="19214186" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1190</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Microsoft CEO Satya Nadella’s messaging around personnel changes at the top of its security organisation. These signal a focus on selling security products rather than on making secure products.

They also discuss Expedition Cloud, a Chinese cyber range that replicated the critical infrastructure of neighbouring countries, apparently to develop and fine-tune cyber disruption operations.

Finally, they talk about what we’ve learnt about the role of cyber operations in the US bombing of Iranian nuclear facilities. It was far bigger than we previously thought.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Microsoft CEO Satya Nadella’s messaging around personnel changes at the top of its security organisation. These signal a focus on selling security products rather than on making secure products.</p>

<p>They also discuss Expedition Cloud, a Chinese cyber range that replicated the critical infrastructure of neighbouring countries, apparently to develop and fine-tune cyber disruption operations.</p>

<p>Finally, they talk about what we’ve learnt about the role of cyber operations in the US bombing of Iranian nuclear facilities. It was far bigger than we previously thought.</p>

<p>This episode is also available on <a href="https://youtu.be/fJ8N2BjhVzM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Chinese cyber-spies breached all of Singapore&apos;s telcos</title>
            <pubDate>Wed, 11 Feb 2026 14:02:28 +1100</pubDate>
            <link>https://risky.biz/RBNEWS524/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS524/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS524.mp3" length="7008885" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>408</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                China has breached all of Singapore’s major telcos, Microsoft announces two new security features, a hacktivist leaks data from a stalkerware provider, and researchers map out “GRU information warfare units” based on their insignia.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>China has breached all of Singapore’s major telcos, Microsoft announces two new security features, a hacktivist leaks data from a stalkerware provider, and researchers map out “GRU information warfare units” based on their insignia.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-chinese-cyber-spies-breached-all-of-singapores-telcos/">Risky Bulletin: Chinese cyber-spies breached all of Singapore&#39;s telcos</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Why we are doomed to insecurity</title>
            <pubDate>Tue, 10 Feb 2026 07:59:19 +1100</pubDate>
            <link>https://risky.biz/BTN153/</link>
            <guid isPermaLink="true">https://risky.biz/BTN153/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN153.mp3" length="26186113" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1635</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about why the world is destined to be perpetually insecure.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about why the world is destined to be perpetually insecure.</p>

<p>This episode is also available on <a href="https://youtu.be/aiXF18q5Vsk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://hntrbrk.com/ubiquiti/">Hunterbrook&#39;s Ubiquiti investigation</a></li>
										
                    	<li><a href="https://risky.biz/RBNEWSSI114/">Trail of Bits sponsor interview</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: SmarterTools hacked via its own product</title>
            <pubDate>Mon, 09 Feb 2026 13:45:08 +1100</pubDate>
            <link>https://risky.biz/RBNEWS523/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS523/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS523.mp3" length="6359607" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>368</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A software company gets hacked through vulnerabilities in its own product, European agencies are hacked via recent Ivanti zero-days, Senegal is being extorted by hackers, and a state actor is behind a Signal phishing campaign in Germany.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A software company gets hacked through vulnerabilities in its own product, European agencies are hacked via recent Ivanti zero-days, Senegal is being extorted by hackers, and a state actor is behind a Signal phishing campaign in Germany.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-smartertools-hacked-via-its-own-product/">Risky Bulletin: SmarterTools hacked via its own product</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Trail of Bits going all-in on AI</title>
            <pubDate>Mon, 09 Feb 2026 05:59:39 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI114/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI114/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI114.mp3" length="18000762" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1124</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, Tom Uren talks to Trail of Bits CEO Dan Guido about how Trail of Bits is reworking its business processes to take advantage of AI. Dan talks about what it takes to make AI agents reliable and trustworthy and how that will give the company an edge by making its work both better and faster.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, Tom Uren talks to Trail of Bits CEO Dan Guido about how Trail of Bits is reworking its business processes to take advantage of AI. Dan talks about what it takes to make AI agents reliable and trustworthy and how that will give the company an edge by making its work both better and faster.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://github.com/trailofbits/skills">Trail of Bits Skills Marketplace</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Denmark recruits hackers for offensive cyber operations</title>
            <pubDate>Fri, 06 Feb 2026 11:13:49 +1100</pubDate>
            <link>https://risky.biz/RBNEWS522/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS522/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS522.mp3" length="6537187" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>379</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Denmark recruits hackers for offensive cyber operations, CISA tells agencies to remove old edge devices, Coinbase has another insider breach, and Microsoft appoints a new security chief.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Denmark recruits hackers for offensive cyber operations, CISA tells agencies to remove old edge devices, Coinbase has another insider breach, and Microsoft appoints a new security chief.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-denmark-recruits-hackers-for-offensive-cyber-operations/">Risky Bulletin: Denmark recruits hackers for offensive cyber operations</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Google&apos;s cyber disruption unit kicks its first goal</title>
            <pubDate>Thu, 05 Feb 2026 13:41:10 +1100</pubDate>
            <link>https://risky.biz/SRB153/</link>
            <guid isPermaLink="true">https://risky.biz/SRB153/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB153.mp3" length="17231394" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1067</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Google’s cyber disruption unit taking aim at the IPIDEA residential proxy network. The network was a cybercrime enabler that was used by hundreds of threat actors for crime and espionage. More of this kind of disruption please.

They also discuss SpaceX’s rapid action to stop the Russian military using Starlink terminals to guide drones deep into Ukrainian territory.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Google’s cyber disruption unit taking aim at the IPIDEA residential proxy network. The network was a cybercrime enabler that was used by hundreds of threat actors for crime and espionage. More of this kind of disruption please.</p>

<p>They also discuss SpaceX’s rapid action to stop the Russian military using Starlink terminals to guide drones deep into Ukrainian territory.</p>

<p>This episode is also available on <a href="https://youtu.be/N7TusSygxEg">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Plone CMS stops supply-chain attack</title>
            <pubDate>Wed, 04 Feb 2026 12:32:12 +1100</pubDate>
            <link>https://risky.biz/RBNEWS521/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS521/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS521.mp3" length="8376785" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>494</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The Plone CMS stops a supply-chain attack, French cops raid the X Paris office;
the number of malicious OpenClaw skills grows, and a Chinese APT hacked Notepad++ servers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The Plone CMS stops a supply-chain attack, French cops raid the X Paris office;
the number of malicious OpenClaw skills grows, and a Chinese APT hacked Notepad++ servers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-plone-cms-stops-supply-chain-attack/">Risky Bulletin: Plone CMS stops supply-chain attack</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds:  The internal logic of Russian power grid attacks</title>
            <pubDate>Tue, 03 Feb 2026 07:31:56 +1100</pubDate>
            <link>https://risky.biz/BTN152/</link>
            <guid isPermaLink="true">https://risky.biz/BTN152/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN152.mp3" length="31414291" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1962</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss the recent Russian attack on Polish electricity infrastructure.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss the recent Russian attack on Polish electricity infrastructure.</p>

<p>This episode is also available on <a href="https://youtu.be/IqLHE-lIP4s">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/">ESET&#39;s first report</a></li>
										
                    	<li><a href="https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/">ESET&#39;s update report</a></li>
										
                    	<li><a href="https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/">CERT-PL report</a></li>
										
                    	<li><a href="https://www.dragos.com/blog/poland-power-grid-attack-electrum-targets-distributed-energy-2025">Dragos report</a></li>
										
                    	<li><a href="https://theins.ru/en/inv/281731">The Insider &#39;Hidden Bear&#39; investigation</a></li>
										
                    	<li><a href="https://risky.biz/BTN124/">BTN 124, How Russia&#39;s sabotage team got into hacking</a></li>
										
                    	<li><a href="https://risky.biz/BTN145/">BTN 145, Russia&#39;s cyber war on wheat</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: StopICE blames hack on &quot;a CBP agent here in SoCal&quot;</title>
            <pubDate>Mon, 02 Feb 2026 13:26:42 +1100</pubDate>
            <link>https://risky.biz/RBNEWS520/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS520/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS520.mp3" length="7978153" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>469</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                ICE tracking app blames a recent hack on a government agent, Microsoft will disable NTLM in the next release of Windows, Poland bans Chinese cars from military bases, and Ivanti patches two new zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>ICE tracking app blames a recent hack on a government agent, Microsoft will disable NTLM in the next release of Windows, Poland bans Chinese cars from military bases, and Ivanti patches two new zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-stopice-blames-hack-on-a-cbp-agent-here-in-socal/">Risky Bulletin: StopICE blames hack on &quot;a CBP agent here in SoCal&quot;</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: AI is critical to the future of cyber defence</title>
            <pubDate>Mon, 02 Feb 2026 07:03:08 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI113/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI113/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI113.mp3" length="17525201" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1094</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview, Casey Ellis chats to Edward Wu, founder of Dropzone AI about a recent Vanderbilt University report that reveals that foreign adversaries’ resources  are growing. Edward says AI capabilities are critical to the future of cyber defence, because the west can’t hire itself out of the shortfall.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview, Casey Ellis chats to Edward Wu, founder of Dropzone AI about a recent Vanderbilt University report that reveals that foreign adversaries’ resources  are growing. Edward says AI capabilities are critical to the future of cyber defence, because the west can’t hire itself out of the shortfall.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://cdn.vanderbilt.edu/vu-wpfsx/wp-content/uploads/sites/41/2025/12/Dominating-the-Digital-Space.pdf">Dominating the Digital Space: A Whole-of-Society Strategy for Securing the United States from Cyber Aggression</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack</title>
            <pubDate>Fri, 30 Jan 2026 09:58:47 +1100</pubDate>
            <link>https://risky.biz/RBNEWS519/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS519/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS519.mp3" length="7194753" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>421</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Hackers breach eScan antivirus and distribute a backdoor, Google takes down the IPIDEA proxy botnet, most GDPR fines remain uncollected, and the Poland wiper attack hit 30 locations.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Hackers breach eScan antivirus and distribute a backdoor, Google takes down the IPIDEA proxy botnet, most GDPR fines remain uncollected, and the Poland wiper attack hit 30 locations.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-escan-antivirus-distributes-backdoor-in-latest-supply-chain-attack/">Risky Bulletin: eScan antivirus distributes backdoor in latest supply chain attack</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Punish the wicked and reward the righteous</title>
            <pubDate>Thu, 29 Jan 2026 12:53:57 +1100</pubDate>
            <link>https://risky.biz/SRB152/</link>
            <guid isPermaLink="true">https://risky.biz/SRB152/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB152.mp3" length="16736324" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1037</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the Pall Mall Process, an international effort to reign in abusive spyware. Tom thinks the US has already stumbled into a viable carrots and sticks style strategy that will shape the industry more than coming up with standards will.

The pair also discuss news that Chinese Salt Typhoon hackers compromised the calls of senior UK officials in Downing Street. The UK has extensive telecommunications security regulations and the incident makes us wonder what that legislation is actually good for.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the Pall Mall Process, an international effort to reign in abusive spyware. Tom thinks the US has already stumbled into a viable carrots and sticks style strategy that will shape the industry more than coming up with standards will.</p>

<p>The pair also discuss news that Chinese Salt Typhoon hackers compromised the calls of senior UK officials in Downing Street. The UK has extensive telecommunications security regulations and the incident makes us wonder what that legislation is actually good for.</p>

<p>This episode is also available on <a href="https://youtu.be/vMGHuO4qQng">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Cyberattack cripples cars across Russia</title>
            <pubDate>Wed, 28 Jan 2026 08:06:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWS518/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS518/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS518.mp3" length="7868461" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>463</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A cyberattack has crippled cars in Russia, Microsoft patches an Office zero-day, WhatsApp rolls out an account lockdown feature, and a handful of Chrome extensions steal ChatGPT auth tokens.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A cyberattack has crippled cars in Russia, Microsoft patches an Office zero-day, WhatsApp rolls out an account lockdown feature, and a handful of Chrome extensions steal ChatGPT auth tokens.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-cyberattack-cripples-cars-across-russia/">Risky Bulletin: Cyberattack cripples cars across Russia</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Getting pinged and the fog of war</title>
            <pubDate>Tue, 27 Jan 2026 07:26:51 +1100</pubDate>
            <link>https://risky.biz/BTN151/</link>
            <guid isPermaLink="true">https://risky.biz/BTN151/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN151.mp3" length="28852611" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1802</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how getting pinged hurts state hackers by introducing uncertainty. Publishing technical reports on the hack can actually improve the situation by removing uncertainty  about how  attackers were detected.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how getting pinged hurts state hackers by introducing uncertainty. Publishing technical reports on the hack can actually improve the situation by removing uncertainty  about how  attackers were detected.</p>

<p>This episode is also available on <a href="https://youtu.be/988iMgzddqk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/BTN36b/">BTN 36, The culture of the Snake</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Push Security on ConsentFix attacks</title>
            <pubDate>Tue, 27 Jan 2026 06:20:19 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI112/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI112/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI112.mp3" length="12606672" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>786</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business News sponsor interview, Catalin Cimpanu talks with Luke Jennings, VP of Research &amp; Development at Push Security, about ConsentFix. It’s a new form of email-based social engineering attack used in the wild, an evolution of the ClickFix attack that goes after your identity.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business News sponsor interview, Catalin Cimpanu talks with Luke Jennings, VP of Research &amp; Development at Push Security, about ConsentFix. It’s a new form of email-based social engineering attack used in the wild, an evolution of the ClickFix attack that goes after your identity.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://pushsecurity.com/blog/consentfix">ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/consentfix-debrief">ConsentFix debrief: latest community insights, recommendations, and predictions</a></li>
										
                    	<li><a href="https://www.linkedin.com/feed/update/urn:li:activity:7407080879292059648/">Luke Jennings, ConsentFix LinkedIn post</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=Z3lXvXGfggs">Year in Review: How Phishing Attacks Evolved in 2025</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia deployed wipers on Poland&apos;s energy grid</title>
            <pubDate>Mon, 26 Jan 2026 10:04:28 +1100</pubDate>
            <link>https://risky.biz/RBNEWS517/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS517/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS517.mp3" length="6760859" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>394</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia deployed wipers against Poland’s energy grid, Microsoft shared BitLocker keys with the FBI, Romania dismantles a murder-for-hire portal, and the EU creates a new anti-spyware group.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia deployed wipers against Poland’s energy grid, Microsoft shared BitLocker keys with the FBI, Romania dismantles a murder-for-hire portal, and the EU creates a new anti-spyware group.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-eu-readies-new-anti-spyware-group-but-with-even-less-powers-than-pega/">Risky Bulletin: EU readies new anti-spyware group, but with even less powers than PEGA</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls</title>
            <pubDate>Fri, 23 Jan 2026 09:26:03 +1100</pubDate>
            <link>https://risky.biz/RBNEWS516/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS516/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS516.mp3" length="6852979" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>399</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-improperly-patched-bug-exploited-again-in-fortinet-firewalls/">Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: You can&apos;t block space internet</title>
            <pubDate>Thu, 22 Jan 2026 12:25:07 +1100</pubDate>
            <link>https://risky.biz/SRB151/</link>
            <guid isPermaLink="true">https://risky.biz/SRB151/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB151.mp3" length="19131834" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1187</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the rise of technologies that can undermine internet blackouts such as Starlink and its relatively new direct-to-cell service. Authoritarian internet shutdowns and disasters happen often enough that governments should think about how to take advantage of these new technologies rather than just reacting when crises arise.

They also discuss the nomination of General Joshua Rudd as head of NSA and US Cyber Command.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the rise of technologies that can undermine internet blackouts such as Starlink and its relatively new direct-to-cell service. Authoritarian internet shutdowns and disasters happen often enough that governments should think about how to take advantage of these new technologies rather than just reacting when crises arise.</p>

<p>They also discuss the nomination of General Joshua Rudd as head of NSA and US Cyber Command.</p>

<p>This episode is also available on <a href="https://youtu.be/UodJd3Cjv54">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Domain resurrection attacks come to Canonical&apos;s Snap Store</title>
            <pubDate>Wed, 21 Jan 2026 12:41:55 +1100</pubDate>
            <link>https://risky.biz/RBNEWS515/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS515/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS515.mp3" length="6438113" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>374</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Canonical’s Snap Store hit by domain resurrection attacks, Russia will use AI to detect VPN users, Iranian hackers switch to Starlink during internet outage, and Greece arrests SMS blasters… by dumb luck.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Canonical’s Snap Store hit by domain resurrection attacks, Russia will use AI to detect VPN users, Iranian hackers switch to Starlink during internet outage, and Greece arrests SMS blasters… by dumb luck.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-domain-resurrection-attacks-come-to-canonicals-snap-store/">Risky Bulletin: Domain resurrection attacks come to Canonical&#39;s Snap Store</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Why the West sucks at Information Warfare</title>
            <pubDate>Tue, 20 Jan 2026 06:52:53 +1100</pubDate>
            <link>https://risky.biz/BTN150/</link>
            <guid isPermaLink="true">https://risky.biz/BTN150/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN150.mp3" length="31311755" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1956</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about what information warfare even is, revisit a 30-year-old paper and examine why Western governments struggle with the concept.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about what information warfare even is, revisit a 30-year-old paper and examine why Western governments struggle with the concept.</p>

<p>This episode is also available on <a href="https://youtu.be/R3p12DTmE9A">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://apps.dtic.mil/sti/tr/pdf/ADA367662.pdf">What is Information Warfare by Martin Libicki</a></li>
										
                    	<li><a href="https://hrichina.substack.com/p/the-smear-campaign-against-guan-heng">Human Rights in China</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=rV7JFmz6Ca0">Leaked conversation on Youtube, in Mandarin</a></li>
										
                    	<li><a href="https://www.youtube.com/watch?v=kfVsfOSbJY0">Rebecca Black, Friday</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Germany seeks more hacking and surveillance powers for its intel service</title>
            <pubDate>Mon, 19 Jan 2026 09:41:53 +1100</pubDate>
            <link>https://risky.biz/RBNEWS514/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS514/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS514.mp3" length="7460003" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>438</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Germany seeks more hacking and surveillance powers for its intelligence service, Finland intends to criminalize the spreading of false information, patriotic “French” social media goes quiet during Iran’s internet outage, and hackers are extorting GrubHub.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Germany seeks more hacking and surveillance powers for its intelligence service, Finland intends to criminalize the spreading of false information, patriotic “French” social media goes quiet during Iran’s internet outage, and hackers are extorting GrubHub.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-germany-seeks-more-hacking-and-surveillance-powers-for-its-intel-service/">Risky Bulletin: Germany seeks more hacking and surveillance powers for its intel service</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Seeing into the seams</title>
            <pubDate>Mon, 19 Jan 2026 06:10:26 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI111/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI111/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI111.mp3" length="13853935" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>865</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, Tom Uren talks to Justin Kohler, Chief Product Officer at SpecterOps, about how attack paths exist in the seams between different identity or permissions management domains.

In isolation, for example, both your Github and your AWS deployment could follow best practices. But bring them together and you’ve got problems. Bloodhound’s OpenGraph lets you find and fix these otherwise invisible attack paths.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, Tom Uren talks to Justin Kohler, Chief Product Officer at SpecterOps, about how attack paths exist in the seams between different identity or permissions management domains.</p>

<p>In isolation, for example, both your Github and your AWS deployment could follow best practices. But bring them together and you’ve got problems. Bloodhound’s OpenGraph lets you find and fix these otherwise invisible attack paths.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: China bans Israeli and US cybersecurity products</title>
            <pubDate>Fri, 16 Jan 2026 10:00:57 +1100</pubDate>
            <link>https://risky.biz/RBNEWS513/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS513/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS513.mp3" length="7363579" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>432</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                China bans Israeli and US cybersecurity products, Sean Plankey is re-nominated for CISA Director, RAM price hikes are likely to impact the cost of firewalls, and Lumen sinkholes the Kimwolf DDoS botnet.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>China bans Israeli and US cybersecurity products, Sean Plankey is re-nominated for CISA Director, RAM price hikes are likely to impact the cost of firewalls, and Lumen sinkholes the Kimwolf DDoS botnet.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-dram-price-hikes-set-to-impact-firewalls-too/">Risky Bulletin: DRAM price hikes set to impact firewalls too</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: China Fights Scam Compounds … For China</title>
            <pubDate>Thu, 15 Jan 2026 12:02:36 +1100</pubDate>
            <link>https://risky.biz/SRB150/</link>
            <guid isPermaLink="true">https://risky.biz/SRB150/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB150.mp3" length="18670106" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1159</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the Chinese government’s reactive approach to tackling scam compounds. It’s driven by bad news on domestic media and therefore focusses on the compounds that are targeting Chinese citizens. Rather than eliminating the industry, that may instead be shaping the industry to focus on other countries and particularly Americans.

They also discuss the role of disruptive cyber operations in the US’s raid to capture Venezuelan President Nicolás Maduro.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the Chinese government’s reactive approach to tackling scam compounds. It’s driven by bad news on domestic media and therefore focusses on the compounds that are targeting Chinese citizens. Rather than eliminating the industry, that may instead be shaping the industry to focus on other countries and particularly Americans.</p>

<p>They also discuss the role of disruptive cyber operations in the US’s raid to capture Venezuelan President Nicolás Maduro.</p>

<p>This episode is also available on <a href="https://youtu.be/3bNxh_XuvuA">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia fines 33 telcos for surveillance non-compliance</title>
            <pubDate>Wed, 14 Jan 2026 14:22:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWS512/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS512/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS512.mp3" length="6491475" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>377</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia fines 33 telcos for surveillance non-compliance, AVCheck admin is arrested in Amsterdam, Poland repels an attack on its power grid, and voice cloning defenses can be bypassed.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia fines 33 telcos for surveillance non-compliance, AVCheck admin is arrested in Amsterdam, Poland repels an attack on its power grid, and voice cloning defenses can be bypassed.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-apex-legends-streamers-hacked-again/">Risky Bulletin: Voice cloning defenses still weak, can be bypassed</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Lights out!</title>
            <pubDate>Tue, 13 Jan 2026 07:32:35 +1100</pubDate>
            <link>https://risky.biz/BTN149/</link>
            <guid isPermaLink="true">https://risky.biz/BTN149/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN149.mp3" length="26863469" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1678</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq about the role of cyber operations in the US capture of Venezuela’s president Nicolas Maduro.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq about the role of cyber operations in the US capture of Venezuela’s president Nicolas Maduro.</p>

<p>This episode is also available on <a href="https://youtu.be/acaPlBDOQYI">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.politico.com/newsletters/weekly-cybersecurity/2026/01/05/maduros-fall-puts-us-cyber-power-in-the-spotlight-00710452">Maduro&#39;s fall puts US cyber power in the spotlight</a></li>
										
                    	<li><a href="https://www.politico.com/news/2026/01/03/trump-venezuela-cyber-operation-maduro-00709816">Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes</a></li>
										
                    	<li><a href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li>
										
                    	<li><a href="https://bsky.app/profile/shakirov2036.bsky.social/post/3mbocouzyvc2t">Power outages, but not cyber (from Oleg Shakirov)</a></li>
										
                    	<li><a href="https://www.nytimes.com/2026/01/03/us/politics/trump-capture-maduro-venezuela.html">NYTimes Inside &#39;Operation Absolute Resolve&#39;</a></li>
										
                    	<li><a href="https://www.penguin.com.au/books/spec-ops-9780307547231">Spec Ops by William McRaven</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Apex Legends streamers hacked again</title>
            <pubDate>Mon, 12 Jan 2026 09:32:41 +1100</pubDate>
            <link>https://risky.biz/RBNEWS511/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS511/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS511.mp3" length="6293397" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>365</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The Apex Legends game is hacked again, data about 17 million Instagram users put up for sale, Indonesia blocks X over pornographic content, and a ransomware attack hits major Chilean energy provider

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The Apex Legends game is hacked again, data about 17 million Instagram users put up for sale, Indonesia blocks X over pornographic content, and a ransomware attack hits major Chilean energy provider</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-apex-legends-streamers-hacked-again/">Risky Bulletin: Apex Legends streamers hacked again</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: What AI workloads mean for Cloud security</title>
            <pubDate>Mon, 12 Jan 2026 06:13:21 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI110/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI110/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI110.mp3" length="14685315" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>917</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business News sponsored interview the CEO and founder of Prowler, Toni de la Fuente, explains how implementing AI systems brings new security challenges that differ for traditional cloud workloads. Toni also talks about ‘attack paths’ in the context of cloud infrastructure and using them to minimise risk.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business News sponsored interview the CEO and founder of Prowler, Toni de la Fuente, explains how implementing AI systems brings new security challenges that differ for traditional cloud workloads. Toni also talks about ‘attack paths’ in the context of cloud infrastructure and using them to minimise risk.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Belarus deploys spyware on journalists&apos; phones</title>
            <pubDate>Fri, 19 Dec 2025 13:02:37 +1100</pubDate>
            <link>https://risky.biz/RBNEWS510/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS510/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS510.mp3" length="7134913" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>418</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Belarus deployed spyware on journalists’ phones, a man is arrested for installing malware on a ferry, France arrests the hacker behind an Interior Ministry email server breach, and new Cisco and SonicWall zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Belarus deployed spyware on journalists’ phones, a man is arrested for installing malware on a ferry, France arrests the hacker behind an Interior Ministry email server breach, and new Cisco and SonicWall zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-belarus-deploys-spyware-on-journalists-phones/">Risky Bulletin: Belarus deploys spyware on journalists&#39; phones</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Like Huawei, but for electricity</title>
            <pubDate>Thu, 18 Dec 2025 10:56:12 +1100</pubDate>
            <link>https://risky.biz/SRB149/</link>
            <guid isPermaLink="true">https://risky.biz/SRB149/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB149.mp3" length="18634128" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1157</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Patrick Gray talk about America’s increasing dependence on Chinese manufacturers for electrical sector equipment. This doesn’t seem like a good idea when China is hacking electric utilities for sabotage and PLA researchers are dreaming up ways to attack the grid.

They also discuss the possibility that the US was responsible for a cyber attack on Venezuela’s state oil company and how Russian state-backed hacktivism is so dumb.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Patrick Gray talk about America’s increasing dependence on Chinese manufacturers for electrical sector equipment. This doesn’t seem like a good idea when China is hacking electric utilities for sabotage and PLA researchers are dreaming up ways to attack the grid.</p>

<p>They also discuss the possibility that the US was responsible for a cyber attack on Venezuela’s state oil company and how Russian state-backed hacktivism is so dumb.</p>

<p>This episode is also available on <a href="https://youtu.be/5LlOvAxhg8w">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Most smart devices run outdated web browsers</title>
            <pubDate>Wed, 17 Dec 2025 11:39:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWS509/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS509/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS509.mp3" length="7788229" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>459</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Most smart devices run outdated web browsers, Ukrainian hacktivists breach a major Russian defense contractor, ransomware hits Venezuela’s state-owned oil company, and hackers are trying to extort PornHub with stolen user data.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Most smart devices run outdated web browsers, Ukrainian hacktivists breach a major Russian defense contractor, ransomware hits Venezuela’s state-owned oil company, and hackers are trying to extort PornHub with stolen user data.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-most-devices-run-outdated-web-browsers/">Risky Bulletin: Most smart devices run outdated web browsers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Three Nerds: The evolution of Iranian cyber espionage</title>
            <pubDate>Tue, 16 Dec 2025 07:37:39 +1100</pubDate>
            <link>https://risky.biz/BTN148/</link>
            <guid isPermaLink="true">https://risky.biz/BTN148/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN148.mp3" length="47958924" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2996</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk to Hamid Kashfi, CEO and founder of DarkCell, talk about the Iranian cyber espionage scene.

Kashfi talks about how the regime once forced people to hack and crushed the domestic security research scene. He describes how and why the government has changed its approach and is now reaping the rewards of improved Iranian capabilities.

This episode is available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk to Hamid Kashfi, CEO and founder of DarkCell, talk about the Iranian cyber espionage scene.</p>

<p>Kashfi talks about how the regime once forced people to hack and crushed the domestic security research scene. He describes how and why the government has changed its approach and is now reaping the rewards of improved Iranian capabilities.</p>

<p>This episode is available on <a href="https://youtu.be/0TlmD07DwwQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.usenix.org/system/files/1401_08-12_mickens.pdf">The &quot;Mossad or not&quot; threat model by James Mickens</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/Shamoon">Shamoon wiper</a></li>
										
                    	<li><a href="https://therecord.media/threat-actor-uses-hp-ilo-rootkit-to-wipe-servers">iLO rootkit</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: African freelancers behind anti-US and anti-French disinfo campaigns</title>
            <pubDate>Mon, 15 Dec 2025 12:56:14 +1100</pubDate>
            <link>https://risky.biz/RBNEWS508/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS508/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS508.mp3" length="7982109" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>471</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russia is hiring African freelancers for disinformation campaigns, the US is preparing to let contractors run offensive cyber operations, Germany blames Russia for the hack of its air traffic control agency, and Apple patches two WebKit zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russia is hiring African freelancers for disinformation campaigns, the US is preparing to let contractors run offensive cyber operations, Germany blames Russia for the hack of its air traffic control agency, and Apple patches two WebKit zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-african-freelancers-behind-anti-us-and-anti-french-disinfo-campaigns/">Risky Bulletin: African freelancers behind anti-US and anti-French disinfo campaigns</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: ConsentFix and Push Security&apos;s browser attack taxonomy</title>
            <pubDate>Mon, 15 Dec 2025 07:17:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI109/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI109/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI109.mp3" length="18835453" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1176</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis is joined by Push Security’s Field CTO, Mark Orlando. They chat about the ways that browser-based attacks are evolving and how Push Security is finding and cataloging them.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis is joined by Push Security’s Field CTO, Mark Orlando. They chat about the ways that browser-based attacks are evolving and how Push Security is finding and cataloging them.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://pushsecurity.com/blog/consentfix">ConsentFix: Analysing a browser-native ClickFix-style attack that hijacks OAuth consent grants</a></li>
										
                    	<li><a href="https://pushsecurity.com/blog/phishing-detection-evasion-launch/">Introducing our guide to phishing detection evasion techniques</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: EU has a problem attracting and retaining cyber talent</title>
            <pubDate>Fri, 12 Dec 2025 13:59:37 +1100</pubDate>
            <link>https://risky.biz/RBNEWS507/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS507/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS507.mp3" length="9435337" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>562</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The EU has a problem attracting and retaining cyber talent, the CEO of Coupang resigns following the company’s security breach, Microsoft expands its bug bounty program to cover third party code, and Chrome and Gogs patch zero-days.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The EU has a problem attracting and retaining cyber talent, the CEO of Coupang resigns following the company’s security breach, Microsoft expands its bug bounty program to cover third party code, and Chrome and Gogs patch zero-days.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-eu-has-a-problem-attracting-and-retaining-cyber-talent/">Risky Bulletin: EU has a problem attracting and retaining cyber talent</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers</title>
            <pubDate>Wed, 10 Dec 2025 11:12:01 +1100</pubDate>
            <link>https://risky.biz/RBNEWS506/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS506/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS506.mp3" length="4878475" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>277</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-linux-adds-pcie-encryption-to-help-secure-cloud-servers">Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: APTs go after the React2Shell vulnerability within hours</title>
            <pubDate>Mon, 08 Dec 2025 10:32:22 +1100</pubDate>
            <link>https://risky.biz/RBNEWS505/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS505/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS505.mp3" length="8401635" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>498</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: When cyber campaigns cross a line</title>
            <pubDate>Thu, 04 Dec 2025 11:02:51 +1100</pubDate>
            <link>https://risky.biz/SRB148/</link>
            <guid isPermaLink="true">https://risky.biz/SRB148/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB148.mp3" length="15772348" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>978</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Patrick Gray discuss a new report proposing a framework for deciding when cyber operations raise red flags. It suggests seven red flags and could help clarify thinking about how to respond to different operations.

They also discuss Anthropic testifying to Congress and Iran using cyber intelligence to target missile strikes including by sharing it with Houthi rebels who fired at a specific ship.

And finally, we are not reassured by China’s white paper about being a good cyber citizen.

This episode is also available of Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Patrick Gray discuss a new report proposing a framework for deciding when cyber operations raise red flags. It suggests seven red flags and could help clarify thinking about how to respond to different operations.</p>

<p>They also discuss Anthropic testifying to Congress and Iran using cyber intelligence to target missile strikes including by sharing it with Houthi rebels who fired at a specific ship.</p>

<p>And finally, we are not reassured by China’s white paper about being a good cyber citizen.</p>

<p>This episode is also available of <a href="https://youtu.be/q8j_NLZfYHM">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.interface-eu.org/publications/cyber-red-flags#appendices">Assessing Irresponsibility in Cyber Operations</a></li>
										
                    	<li><a href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/">AWS on state actors bridging cyber and kinetic warfare </a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Beating back state espionage</title>
            <pubDate>Tue, 02 Dec 2025 06:56:47 +1100</pubDate>
            <link>https://risky.biz/BTN147/</link>
            <guid isPermaLink="true">https://risky.biz/BTN147/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN147.mp3" length="26752510" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1671</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq wonder whether it is possible to deter states from cyber espionage with doxxing and other disruption measures.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq wonder whether it is possible to deter states from cyber espionage with doxxing and other disruption measures.</p>

<p>This episode is also available on <a href="https://youtu.be/rg00Ku-UN6c">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://blog.narimangharib.com/posts/2025%2F11%2F1763938840948?lang=en">Department 40 exposed</a></li>
										
                    	<li><a href="https://content.iranintl.com/secret-spy-unit-leads-irans-intel-gathering-for-surveillance-deadly-plots/index.html">Charming Kitten exposed</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Why Mastercard got into threat intel</title>
            <pubDate>Mon, 01 Dec 2025 09:21:12 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI108/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI108/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI108.mp3" length="13540222" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>845</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business News sponsor interview, Mike Lashlee, CSO of Mastercard talks to Tom Uren about why the company got into threat intelligence.

Mike talks about bringing together payments insights with threat intel to get strong signals about fraud or crime, the benefits of international collaboration and when it makes sense for your CSO to also be the CISO.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business News sponsor interview, Mike Lashlee, CSO of Mastercard talks to Tom Uren about why the company got into threat intelligence.</p>

<p>Mike talks about bringing together payments insights with threat intel to get strong signals about fraud or crime, the benefits of international collaboration and when it makes sense for your CSO to also be the CISO.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: DeepSeek and Musk&apos;s Grok both toe the party line</title>
            <pubDate>Thu, 27 Nov 2025 13:07:43 +1100</pubDate>
            <link>https://risky.biz/SRB147/</link>
            <guid isPermaLink="true">https://risky.biz/SRB147/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB147.mp3" length="20676822" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1285</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about new research that shows the Chinese-made DeepSeek-R1 AI model produces insecure code when  prompts include topics that the Chinese Communist Party dislikes. It’s interesting research, but the CCP doesn’t have a monopoly on imposing AI bias.

They also discuss the complete doxxing of the Iranian cyber espionage group known as APT35 or Charming Kitten.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about new research that shows the Chinese-made DeepSeek-R1 AI model produces insecure code when  prompts include topics that the Chinese Communist Party dislikes. It’s interesting research, but the CCP doesn’t have a monopoly on imposing AI bias.</p>

<p>They also discuss the complete doxxing of the Iranian cyber espionage group known as APT35 or Charming Kitten.</p>

<p>This episode is also available on <a href="https://youtu.be/e8l6pe73AcQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Telcos bad, Cloud good.</title>
            <pubDate>Tue, 25 Nov 2025 07:36:52 +1100</pubDate>
            <link>https://risky.biz/BTN146/</link>
            <guid isPermaLink="true">https://risky.biz/BTN146/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN146.mp3" length="34039289" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2126</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about the differences between telcos and cloud companies. Does the nature of the business force cloud companies to be better at security?

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about the differences between telcos and cloud companies. Does the nature of the business force cloud companies to be better at security?</p>

<p>This episode is also available on <a href="https://youtu.be/-xDzwi126Ug">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.theregister.com/2025/11/18/fcc_salt_typhoon_rules/">FCC looks to torch Biden-era cyber rules sparked by Salt Typhoon mess</a></li>
										
                    	<li><a href="https://github.com/Netflix/chaosmonkey">Netflix&#39;s Chaos Monkey</a></li>
										
                    	<li><a href="https://x.com/arekfurt/status/1990904718177317363">Brian in Pittsburgh</a></li>
										
                    	<li><a href="https://risky.biz/BTN145/">BTN145</a></li>
										
                    	<li><a href="https://en.wikipedia.org/wiki/Ultra_(cryptography)">Ultra</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: AI-Powered espionage will favor China</title>
            <pubDate>Thu, 20 Nov 2025 12:46:35 +1100</pubDate>
            <link>https://risky.biz/SRB146/</link>
            <guid isPermaLink="true">https://risky.biz/SRB146/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB146.mp3" length="20716876" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1288</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Anthropic’s discovery of an “AI-orchestrated” cyber espionage campaign. To Tom, it feels a research project, but it’s pretty clear it will be really useful for threat actors that aren’t focussed on specific high-priority targets. Think ransomware, Chinese intellectual property theft and North Korean hackers. But it won’t be so good for Western intelligence agencies.

They also discuss Google’s legal disruption of the China-based Lighthouse phishing as a service operation. Surprisingly, it seems to be working!

Finally, they talk about why the memory safe Rust language has been a triple win for Android.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Anthropic’s discovery of an “AI-orchestrated” cyber espionage campaign. To Tom, it feels a research project, but it’s pretty clear it will be really useful for threat actors that aren’t focussed on specific high-priority targets. Think ransomware, Chinese intellectual property theft and North Korean hackers. But it won’t be so good for Western intelligence agencies.</p>

<p>They also discuss Google’s legal disruption of the China-based Lighthouse phishing as a service operation. Surprisingly, it seems to be working!</p>

<p>Finally, they talk about why the memory safe Rust language has been a triple win for Android.</p>

<p>This episode is also available on <a href="https://youtu.be/6Wm5XcoECJo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Russia&apos;s cyber war on wheat</title>
            <pubDate>Tue, 18 Nov 2025 07:18:45 +1100</pubDate>
            <link>https://risky.biz/BTN145/</link>
            <guid isPermaLink="true">https://risky.biz/BTN145/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN145.mp3" length="29650941" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1852</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about the strategic “logic” of Russian wiper attacks on the Ukrainian grain sector.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about the strategic “logic” of Russian wiper attacks on the Ukrainian grain sector.</p>

<p>This episode is also available on <a href="https://youtu.be/UAeeWSiXHZ4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-2025-q3-2025/">ESET report</a></li>
										
                    	<li><a href="https://www.lawfaremedia.org/article/offensive-cyber-operations-and-combat-effectiveness-after-ukraine">Soesanto and Gajos at Lawfare</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys</title>
            <pubDate>Fri, 14 Nov 2025 13:45:06 +1100</pubDate>
            <link>https://risky.biz/RBNEWS504/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS504/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS504.mp3" length="7933605" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>468</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Europol takes down servers behind three malware operations, the US sanctions another Burmese military group linked to scam compounds, Google backs down from mandatory Android developer registration, and Checkout-dot-com donates its ransom to cybercrime researchers instead of paying hackers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Europol takes down servers behind three malware operations, the US sanctions another Burmese military group linked to scam compounds, Google backs down from mandatory Android developer registration, and Checkout-dot-com donates its ransom to cybercrime researchers instead of paying hackers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-europol-takes-down-elysium-venomrat-and-rhadamanthys-infrastructure/">Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys infrastructure</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Meta&apos;s fraud profit scandal</title>
            <pubDate>Thu, 13 Nov 2025 12:35:03 +1100</pubDate>
            <link>https://risky.biz/SRB145/</link>
            <guid isPermaLink="true">https://risky.biz/SRB145/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB145.mp3" length="17745654" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1103</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about a new Reuters’ report that reveals how Meta is knowingly raking in cash from scam advertisements. It’s around $16 billion worth, and in documents Meta calculates that it outweighs the costs of possible regulatory action.

They also discuss recent state-backed supply chain attacks that have, so far, remained targeted and responsible. Finally they look at the UK’s decision to stop sharing intelligence with the US about suspected drug boats in the Caribbean.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about a new Reuters’ report that reveals how Meta is knowingly raking in cash from scam advertisements. It’s around $16 billion worth, and in documents Meta calculates that it outweighs the costs of possible regulatory action.</p>

<p>They also discuss recent state-backed supply chain attacks that have, so far, remained targeted and responsible. Finally they look at the UK’s decision to stop sharing intelligence with the US about suspected drug boats in the Caribbean.</p>

<p>This episode is also available on <a href="https://youtu.be/6G1xLJrU_oY">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Another Chinese security firm has its data leaked</title>
            <pubDate>Wed, 12 Nov 2025 10:13:15 +1100</pubDate>
            <link>https://risky.biz/RBNEWS503/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS503/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS503.mp3" length="5775591" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>334</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Internal data leaks from another Chinese security firm, a US Congressional Budget Office breach has not been contained, the Cyber infosharing act likely to be extended until January, and we have a new OWASP Top 10.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Internal data leaks from another Chinese security firm, a US Congressional Budget Office breach has not been contained, the Cyber infosharing act likely to be extended until January, and we have a new OWASP Top 10.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-another-chinese-security-firm-has-its-data-leaked/">Risky Bulletin: Another Chinese security firm has its data leaked</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Why AI in malware is lame</title>
            <pubDate>Tue, 11 Nov 2025 07:44:05 +1100</pubDate>
            <link>https://risky.biz/BTN144/</link>
            <guid isPermaLink="true">https://risky.biz/BTN144/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN144.mp3" length="28727803" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1794</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss how cyber criminals and even state actors are being dumb about using AI.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss how cyber criminals and even state actors are being dumb about using AI.</p>

<p>This episode is also available on <a href="https://youtu.be/E71VoECXKp4">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actor-usage-of-ai-tools">Google&#39;s AI Threat Tracker</a></li>
										
                    	<li><a href="https://medium.com/@TalBeerySec/follow-the-script-why-attackers-are-winning-the-ai-arms-race-39de80748d09">Script framework</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Myanmar scam compound goes boom!</title>
            <pubDate>Mon, 10 Nov 2025 13:43:05 +1100</pubDate>
            <link>https://risky.biz/RBNEWS502/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS502/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS502.mp3" length="8028969" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>474</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Myanmar starts demolishing the KK Park scam compound, the US Congressional Budget Office gets hacked by a foreign APT, Chrome will remove risky X-S-L-T support, and scammers in Singapore will get the cane.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Myanmar starts demolishing the KK Park scam compound, the US Congressional Budget Office gets hacked by a foreign APT, Chrome will remove risky X-S-L-T support, and scammers in Singapore will get the cane.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Prowler uses AI how AI works best</title>
            <pubDate>Mon, 10 Nov 2025 07:12:00 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI107/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI107/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI107.mp3" length="18525435" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1157</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview Casey Ellis chats to Toni de la Fuente, founder and CEO of Prowler, an open source platform for cloud security. They chat about how and why Prowler selectively applies AI to ensure it adds value rather than just because they can.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview Casey Ellis chats to Toni de la Fuente, founder and CEO of Prowler, an open source platform for cloud security. They chat about how and why Prowler selectively applies AI to ensure it adds value rather than just because they can.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Europol arrests massive credit card fraud ring</title>
            <pubDate>Fri, 07 Nov 2025 12:39:29 +1100</pubDate>
            <link>https://risky.biz/RBNEWS501/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS501/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS501.mp3" length="7472078" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>444</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Payment service provider executives arrested over a credit card fraud ring, Meta makes a fortune showing scam ads, South Korean telco KT tried to hide a second breach and five more scammers are sentenced to death in China.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Payment service provider executives arrested over a credit card fraud ring, Meta makes a fortune showing scam ads, South Korean telco KT tried to hide a second breach and five more scammers are sentenced to death in China.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-europol-arrests-payment-service-executives-for-role-in-credit-card-fraud-ring/">Risky Bulletin: Europol arrests payment service executives for role in credit card fraud ring</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: The cyber regime change pipe dream</title>
            <pubDate>Thu, 06 Nov 2025 12:46:13 +1100</pubDate>
            <link>https://risky.biz/SRB144/</link>
            <guid isPermaLink="true">https://risky.biz/SRB144/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB144.mp3" length="21270812" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1324</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about aggressive US cyber operations targeting the Venezuelan government in President Trump’s first term. These were narrowly successful in that they achieved their immediate operational goals, but they didn’t achieve Trump’s broader policy goal of ousting Venezuelan leader Nicolás Maduro.

They also talk about why the adtech ecosystem is a national security problem all round the world and how cybercriminals are collaborating with organised crime to steal cargo from logistics companies.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about aggressive US cyber operations targeting the Venezuelan government in President Trump’s first term. These were narrowly successful in that they achieved their immediate operational goals, but they didn’t achieve Trump’s broader policy goal of ousting Venezuelan leader Nicolás Maduro.</p>

<p>They also talk about why the adtech ecosystem is a national security problem all round the world and how cybercriminals are collaborating with organised crime to steal cargo from logistics companies.</p>

<p>This episode is also available on <a href="https://youtu.be/KnAg-m3rp54">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks</title>
            <pubDate>Wed, 05 Nov 2025 13:51:58 +1100</pubDate>
            <link>https://risky.biz/RBNEWS500/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS500/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS500.mp3" length="7511125" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>442</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The US indicts two cybersecurity employees over ransomware attacks, hackers extort customers of South Korean massage parlors, another crypto firm gets hacked for $128 million dollars, and cargo thieves collab with hackers to target freight companies.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The US indicts two cybersecurity employees over ransomware attacks, hackers extort customers of South Korean massage parlors, another crypto firm gets hacked for $128 million dollars, and cargo thieves collab with hackers to target freight companies.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-us-indicts-two-rogue-cybersecurity-employees-for-deploying-ransomware/">Risky Bulletin: US indicts two rogue cybersecurity employees for ransomware attacks</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: Lost in transmission</title>
            <pubDate>Tue, 04 Nov 2025 07:06:37 +1100</pubDate>
            <link>https://risky.biz/BTN143/</link>
            <guid isPermaLink="true">https://risky.biz/BTN143/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN143.mp3" length="27460214" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1715</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq discuss the futility of using aggressive cyber operations to send messages between states.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq discuss the futility of using aggressive cyber operations to send messages between states.</p>

<p>This episode is also available on <a href="https://youtu.be/cTrzkF5ExOU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response">The Record, Volt Typhoon was not successful</a></li>
										
                    	<li><a href="https://www.cambridge.org/core/journals/european-journal-of-international-security/article/sand-in-the-gears-sabotage-in-world-politics/EB1FA8B5BC7400C358EFFC2D8624B181">Sand in the gears: Sabotage in world politics by Joshua Rovner, Rory Cormac and Lennart Maschmeyer</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Norway skittish of its Chinese electric buses</title>
            <pubDate>Mon, 03 Nov 2025 12:24:10 +1100</pubDate>
            <link>https://risky.biz/RBNEWS499/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS499/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS499.mp3" length="6779671" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>397</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Norway finds remote control features in its Chinese electric buses, the US CyberCorps program may saddle students with debt, Edge and Chrome get AI-based scareware blockers, and a Conti member has been extradited to the US.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Norway finds remote control features in its Chinese electric buses, the US CyberCorps program may saddle students with debt, Edge and Chrome get AI-based scareware blockers, and a Conti member has been extradited to the US.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-norway-skittish-of-its-chinese-electric-buses/">Risky Bulletin: Norway skittish of its Chinese electric buses</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Sublime can save a s**t tonne of time</title>
            <pubDate>Mon, 03 Nov 2025 06:46:47 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI106/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI106/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI106.mp3" length="16614845" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1037</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored interview, Casey Ellis chats to Sublime Security CEO and founder, Josh Kamdjou about how Sublime is seeing a massive surge in ICS or calendar invite phishing and how the email security platform can help.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored interview, Casey Ellis chats to Sublime Security CEO and founder, Josh Kamdjou about how Sublime is seeing a massive surge in ICS or calendar invite phishing and how the email security platform can help.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Russia arrests Meduza Stealer group</title>
            <pubDate>Fri, 31 Oct 2025 10:22:34 +1100</pubDate>
            <link>https://risky.biz/RBNEWS498/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS498/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS498.mp3" length="7865411" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>464</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Russian police arrest the Meduza-Stealer trio, a Former L-3Harris manager pleads guilty to selling exploits to Russia, the US hacked Venezuela in 2020, and Windows 11 Administrator Protection goes live.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Russian police arrest the Meduza-Stealer trio, a Former L-3Harris manager pleads guilty to selling exploits to Russia, the US hacked Venezuela in 2020, and Windows 11 Administrator Protection goes live.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russia-arrests-meduza-stealer-group/">Risky Bulletin: Russia arrests Meduza Stealer group</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Peter Williams, Ex-ASD, Pleads Guilty to Selling Eight Exploits to Russia</title>
            <pubDate>Thu, 30 Oct 2025 13:26:51 +1100</pubDate>
            <link>https://risky.biz/SRB143/</link>
            <guid isPermaLink="true">https://risky.biz/SRB143/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB143.mp3" length="18372684" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1143</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits.

They also discuss a new report’s recommendations to empower the Office of the National Cyber Director. It’s a good idea, but it won’t make up for the cuts in funding and personnel across the Trump administration’s cyber portfolio.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits.</p>

<p>They also discuss a new report’s recommendations to empower the Office of the National Cyber Director. It’s a good idea, but it won’t make up for the cuts in funding and personnel across the Trump administration’s cyber portfolio.</p>

<p>This episode is also available on <a href="https://youtu.be/hYnUDgllhDo">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: HackingTeam is back!</title>
            <pubDate>Wed, 29 Oct 2025 10:01:52 +1100</pubDate>
            <link>https://risky.biz/RBNEWS497/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS497/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS497.mp3" length="6893295" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>404</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                HackingTeam’s successor is targeting Russia and Belarus, X users must re-enroll their security keys, Chrome will put HTTP behind a warning dialogue, and 15 people are expected to plead guilty in an Italian hacking scandal.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>HackingTeam’s successor is targeting Russia and Belarus, X users must re-enroll their security keys, Chrome will put HTTP behind a warning dialogue, and 15 people are expected to plead guilty in an Italian hacking scandal.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-hackingteam-successor-linked-to-recent-chrome-zero-days/">Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: NSA gets its mojo back!</title>
            <pubDate>Tue, 28 Oct 2025 05:57:46 +1100</pubDate>
            <link>https://risky.biz/BTN142/</link>
            <guid isPermaLink="true">https://risky.biz/BTN142/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN142.mp3" length="25999097" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1624</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq dissect a recent Chinese CERT report that the NSA had hacked China’s national time keeping service.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq dissect a recent Chinese CERT report that the NSA had hacked China’s national time keeping service.</p>

<p>This episode is also available on <a href="https://youtu.be/m5KbO1cwfVw">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://mp.weixin.qq.com/s/ZtKjlaIoMVCSY-rXt2RP1Q">MSS Weixin post </a></li>
										
                    	<li><a href="https://mp.weixin.qq.com/s/XPjT0BVOJPJxSmASW0tXTA">CN-CERT technical analysis</a></li>
										
                    	<li><a href="https://x.com/globaltimesnews/status/1979873087731765300">Global Times on X</a></li>
										
                    	<li><a href="https://risky.biz/BTN110/">BTN110: The NSA&#39;s nine to five hacking campaign</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: WSUS bug under attack</title>
            <pubDate>Mon, 27 Oct 2025 12:24:36 +1100</pubDate>
            <link>https://risky.biz/RBNEWS496/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS496/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS496.mp3" length="7637447" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>450</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A bug in Microsoft WSUS is under attack, Thailand revokes the citizenship of scam-linked businessman, the US charges high tech poker cheat, and Iran’s top hacking school is breached.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A bug in Microsoft WSUS is under attack, Thailand revokes the citizenship of scam-linked businessman, the US charges high tech poker cheat, and Iran’s top hacking school is breached.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-russian-bill-would-require-researchers-to-report-bugs-to-the-fsb/">Risky Bulletin: Russian bill would require researchers to report bugs to the FSB</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Why you&apos;re probably doing Zero Trust wrong</title>
            <pubDate>Mon, 27 Oct 2025 06:29:07 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI105/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI105/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI105.mp3" length="11117987" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>694</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsored podcast Patrick Gray chats with Knocknoc CEO Adam Pointon about why true Zero Trust architectures never really got there. Spinning up ZTNA access to core applications and slapping SSO prompts on everything else is great, but if we’re honest, it’s not really Zero Trust. So, how and why did we get here?

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsored podcast Patrick Gray chats with Knocknoc CEO Adam Pointon about why true Zero Trust architectures never really got there. Spinning up ZTNA access to core applications and slapping SSO prompts on everything else is great, but if we’re honest, it’s not really Zero Trust. So, how and why did we get here?</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: iOS 26 change deletes clues of old spyware infections</title>
            <pubDate>Fri, 24 Oct 2025 11:45:55 +1100</pubDate>
            <link>https://risky.biz/RBNEWS495/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS495/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS495.mp3" length="8433267" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>500</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A change in iOS is deleting-clues of old spyware infections, Starlink disables 2,500 terminals at scam compounds, a Caribbean hospital is still down 5 months after a ransomware attack, and officials are charged in Poland’s Pegasus spyware scandal.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A change in iOS is deleting-clues of old spyware infections, Starlink disables 2,500 terminals at scam compounds, a Caribbean hospital is still down 5 months after a ransomware attack, and officials are charged in Poland’s Pegasus spyware scandal.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/risky-bulletin-ios-26-change-deletes-clues-of-old-spyware-infections/">Risky Bulletin: iOS 26 change deletes clues of old spyware infections</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Hacking for Godot</title>
            <pubDate>Thu, 23 Oct 2025 13:09:55 +1100</pubDate>
            <link>https://risky.biz/SRB142/</link>
            <guid isPermaLink="true">https://risky.biz/SRB142/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB142.mp3" length="16950916" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1055</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about how America can better use its private sector to scale up offensive cyber activities, including espionage and disruption operations. Involving it to tackle ransomware and cryptocurrency scammers makes a lot of sense.

They also talk about how the ransomware ecosystem is splintering, and one operator’s relatively quick journey from being an affiliate to a platform operator.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about how America can better use its private sector to scale up offensive cyber activities, including espionage and disruption operations. Involving it to tackle ransomware and cryptocurrency scammers makes a lot of sense.</p>

<p>They also talk about how the ransomware ecosystem is splintering, and one operator’s relatively quick journey from being an affiliate to a platform operator.</p>

<p>This episode is also available on <a href="https://youtu.be/FqD-xzGEfnQ">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://sergeybratus.gitlab.io/papers/DartmouthCyberRoundtable2025.pdf">From Chaos to Capability: Building the US Market for Offensive Cyber</a></li>
										
                    	<li><a href="https://analyst1.com/devmans-raas-launch-the-affiliate-who-aims-to-become-the-boss/">Devman&#39;s RaaS Launch</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Clever worm hits the VS Code scene</title>
            <pubDate>Wed, 22 Oct 2025 09:35:15 +1100</pubDate>
            <link>https://risky.biz/RBNEWS494/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS494/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS494.mp3" length="7655733" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>452</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A worm hits VS Code users, F5 was breached via its own devices back in 2023, Korea Telecom’s CEO says he’ll resign following a recent security breach, and the Boy Scouts will award cybersecurity merit badges.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A worm hits VS Code users, F5 was breached via its own devices back in 2023, Korea Telecom’s CEO says he’ll resign following a recent security breach, and the Boy Scouts will award cybersecurity merit badges.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-clever-worm-hits-the-devops-scene/">Risky Bulletin: Clever worm hits the DevOps scene</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Three Nerds: India, the sleeping cyber superpower</title>
            <pubDate>Tue, 21 Oct 2025 08:33:01 +1100</pubDate>
            <link>https://risky.biz/BTN141/</link>
            <guid isPermaLink="true">https://risky.biz/BTN141/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN141.mp3" length="34081544" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>2129</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk to Joe Devanny, senior lecturer from King’s College London, all about India’s missing cyber power. It has all the ingredients to become a cyber superpower, but so far, hasn’t shown the motivation.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk to Joe Devanny, senior lecturer from King’s College London, all about India’s missing cyber power. It has all the ingredients to become a cyber superpower, but so far, hasn’t shown the motivation.</p>

<p>This episode is also available on <a href="https://youtu.be/NJwy2sUKlHk">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://carnegieendowment.org/research/2025/03/interpreting-indias-cyber-statecraft?lang=en">Interpreting India&#39;s Cyber Statecraft by Joe Devanny and Arthur Laudrain</a></li>
										
                    	<li><a href="https://www.kcl.ac.uk/people/dr-joseph-devanny">Dr Joeseph Devanny</a></li>
										
                    	<li><a href="https://risky.biz/RBNEWSSI104/">Sponsor interview: How AI turbocharges SOC analysts h</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Prisoner hacks his prison IT system, goes wild!</title>
            <pubDate>Mon, 20 Oct 2025 13:33:44 +1100</pubDate>
            <link>https://risky.biz/RBNEWS493/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS493/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS493.mp3" length="6547684" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>387</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                A Romanian inmate hacks his prison’s IT system, hackers leak the data of DHS and DOJ employees, classified material was stolen from John Bolton’s AOL account and authorities seize a SIM farm in Latvia.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>A Romanian inmate hacks his prison’s IT system, hackers leak the data of DHS and DOJ employees, classified material was stolen from John Bolton’s AOL account and authorities seize a SIM farm in Latvia.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-prisoner-hacks-prison-it-system-goes-wild/">Risky Bulletin: Prisoner hacks prison IT system, goes wild!</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: How AI turbocharges SOC analysts</title>
            <pubDate>Mon, 20 Oct 2025 06:30:51 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI104/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI104/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI104.mp3" length="10822650" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>675</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this sponsor interview, Edward Wu, CEO and founder of Dropzone AI talks to Tom Uren about a study that measured how AI practically helps SOC analysts triage real-world problems. Analysts were faster, more accurate and got less tired with AI assistance. Edward thinks the technology won’t replace human analysts, but will speed their skill development.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this sponsor interview, Edward Wu, CEO and founder of Dropzone AI talks to Tom Uren about a study that measured how AI practically helps SOC analysts triage real-world problems. Analysts were faster, more accurate and got less tired with AI assistance. Edward thinks the technology won’t replace human analysts, but will speed their skill development.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.dropzone.ai/ai-soc-benchmark-study">The Cloud Security Alliance AI SOC study</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: F5 says an APT stole source code, vulnerability reports</title>
            <pubDate>Fri, 17 Oct 2025 10:23:43 +1100</pubDate>
            <link>https://risky.biz/RBNEWS492/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS492/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS492.mp3" length="7579555" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>447</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                An APT stole source code and vulnerability reports from F5, a European MP files a criminal hacking complaint against Hungary’s Prime Minister, airport PA systems are hijacked in Canada and the US, and the PowerSchool hacker gets prison time.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>An APT stole source code and vulnerability reports from F5, a European MP files a criminal hacking complaint against Hungary’s Prime Minister, airport PA systems are hijacked in Canada and the US, and the PowerSchool hacker gets prison time.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-f5-says-an-apt-stole-source-code-vulnerability-reports/">Risky Bulletin: F5 says an APT stole source code, vulnerability reports</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Small beer surveillance firms escape crackdown, for now</title>
            <pubDate>Thu, 16 Oct 2025 13:31:40 +1100</pubDate>
            <link>https://risky.biz/SRB141/</link>
            <guid isPermaLink="true">https://risky.biz/SRB141/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB141.mp3" length="19817952" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1235</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about First Wap, a Jakarta-based company that is selling surveillance-as-a-service. The good news is that it appears that government and media attention has had an impact on high-profile spyware vendors like NSO Group. The bad news is that these smaller players are flying under the radar and aren’t afraid of selling to sketchy customers.

They also talk about how the Chinese government has harnessed the power of its exploit development community with hacking contests.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about First Wap, a Jakarta-based company that is selling surveillance-as-a-service. The good news is that it appears that government and media attention has had an impact on high-profile spyware vendors like NSO Group. The bad news is that these smaller players are flying under the radar and aren’t afraid of selling to sketchy customers.</p>

<p>They also talk about how the Chinese government has harnessed the power of its exploit development community with hacking contests.</p>

<p>This episode is also available on <a href="https://youtu.be/pvZIQ0fgqFU">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Windows 10 reaches End-of-Life</title>
            <pubDate>Wed, 15 Oct 2025 14:45:35 +1100</pubDate>
            <link>https://risky.biz/RBNEWS491/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS491/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS491.mp3" length="8722789" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>519</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Windows 10 reaches End-of-Life, CISA cyber personnel avoided last week’s layoffs, the US seizes $15 billion dollars from a cyber-scam-compound operator, and a Secure Boot bypass impacts 200,000 Framework computers.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Windows 10 reaches End-of-Life, CISA cyber personnel avoided last week’s layoffs, the US seizes $15 billion dollars from a cyber-scam-compound operator, and a Secure Boot bypass impacts 200,000 Framework computers.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://news.risky.biz/risky-bulletin-windows-10-reaches-end-of-life/">Risky Bulletin: Windows 10 reaches End-of-Life</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Between Two Nerds: The Keyser Soze of Scattered Spider</title>
            <pubDate>Tue, 14 Oct 2025 07:45:44 +1100</pubDate>
            <link>https://risky.biz/BTN140/</link>
            <guid isPermaLink="true">https://risky.biz/BTN140/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN140.mp3" length="21684101" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1354</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this edition of Between Two Nerds Tom Uren and The Grugq talk about how different cybercriminal groups are after insiders to provide network access.

This episode is available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this edition of Between Two Nerds Tom Uren and The Grugq talk about how different cybercriminal groups are after insiders to provide network access.</p>

<p>This episode is available on <a href="https://youtu.be/qDjA9nF_nJw">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://nebulock.io/">Nebulock sponsor episode</a></li>
										
                    	<li><a href="https://x.com/ReliaQuestTR/status/1975566513328341326/history">Scattered Spider insiders tweet</a></li>
										
                    	<li><a href="https://www.bbc.com/news/articles/c3w5n903447o">BBC&#39;s Joe Tidy approached by ransomware gang</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Microsoft revamps Edge&apos;s &quot;IE Mode&quot; after zero-day attacks</title>
            <pubDate>Mon, 13 Oct 2025 13:18:07 +1100</pubDate>
            <link>https://risky.biz/RBNEWS490/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS490/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS490.mp3" length="7525927" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>444</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Microsoft revamps Edge-IE-Mode after zero-day attacks, the FBI seizes the extortion site targeting Salesforce, a new round of layoffs hits CISA, and Apple doubles its bug bounty rewards.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Microsoft revamps Edge-IE-Mode after zero-day attacks, the FBI seizes the extortion site targeting Salesforce, a new round of layoffs hits CISA, and Apple doubles its bug bounty rewards.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/microsoft-revamps-edges-ie-mode-after-zero-day-attacks/">Risky Bulletin: Microsoft revamps Edge&#39;s &quot;IE Mode&quot; after zero-day attacks</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Sponsored: Fighting fire with fire</title>
            <pubDate>Mon, 13 Oct 2025 06:50:58 +1100</pubDate>
            <link>https://risky.biz/RBNEWSSI103/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWSSI103/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI103.mp3" length="14055537" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>877</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                In this Risky Business sponsored interview, Tom Uren talks to Damien Lewke, CEO and founder of Nebulock about countering adversary use of AI… with AI. They talk about how threat actors are rapidly adopting AI and what defenders should be doing in response.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>In this Risky Business sponsored interview, Tom Uren talks to Damien Lewke, CEO and founder of Nebulock about countering adversary use of AI… with AI. They talk about how threat actors are rapidly adopting AI and what defenders should be doing in response.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic&#39;s August threat report</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: EU scraps Chat Control vote</title>
            <pubDate>Fri, 10 Oct 2025 13:56:31 +1100</pubDate>
            <link>https://risky.biz/RBNEWS489/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS489/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS489.mp3" length="6755305" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>396</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                The EU scraps its upcoming vote on Chat Control, Ukraine establishes a Cyber Force, CISA workers are reassigned to immigration enforcement, and two teens are arrested over the UK nursery hacks.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>The EU scraps its upcoming vote on Chat Control, Ukraine establishes a Cyber Force, CISA workers are reassigned to immigration enforcement, and two teens are arrested over the UK nursery hacks.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-eu-scraps-chat-control-vote/">Risky Bulletin: EU scraps Chat Control vote</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Srsly Risky Biz: Clop is a big fish, but not worth hunting</title>
            <pubDate>Thu, 09 Oct 2025 12:27:04 +1100</pubDate>
            <link>https://risky.biz/SRB140/</link>
            <guid isPermaLink="true">https://risky.biz/SRB140/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SRB140.mp3" length="16174890" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>1007</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Tom Uren and Amberleigh Jack talk about the Clop ransomware gang. It is interesting because the group has arrived at a strategy that rinses a whole lot of enterprises  at once and comes with a decent pay day, But it’s actually the least damaging kind of ransomware. Tom wonders why can’t more gangs be like Clop?

They also discuss the US government having second thoughts about ignoring foreign influence operations. Its adversaries run them all the time, so perhaps just sticking its head in the sand isn’t the best strategy.

This episode is also available on Youtube.

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Tom Uren and Amberleigh Jack talk about the Clop ransomware gang. It is interesting because the group has arrived at a strategy that rinses a whole lot of enterprises  at once and comes with a decent pay day, But it’s actually the least damaging kind of ransomware. Tom wonders why can’t more gangs be like Clop?</p>

<p>They also discuss the US government having second thoughts about ignoring foreign influence operations. Its adversaries run them all the time, so perhaps just sticking its head in the sand isn’t the best strategy.</p>

<p>This episode is also available on <a href="https://youtu.be/4E3gvFeYgw8">Youtube</a>.</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
        <item>
            <title>Risky Bulletin: Redis vulnerability impacts all versions released in the last 13 years</title>
            <pubDate>Wed, 08 Oct 2025 10:42:55 +1100</pubDate>
            <link>https://risky.biz/RBNEWS488/</link>
            <guid isPermaLink="true">https://risky.biz/RBNEWS488/</guid>
            <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS488.mp3" length="6435499" type="audio/mpeg" />
            
            <itunes:explicit>false</itunes:explicit>
						
							<itunes:duration>376</itunes:duration>
						
            <itunes:summary>
            	<![CDATA[
                Redis patches a remote code execution vulnerability, Oracle out-of-band-fixes a zero-day used in a recent extortion campaign, Medusa ransomware group was behind a recent Fortra zero-day, and India fixes a tax filing system flaw;

                ]]>
            </itunes:summary>
            <description>
            	<![CDATA[
                <p>Redis patches a remote code execution vulnerability, Oracle out-of-band-fixes a zero-day used in a recent extortion campaign, Medusa ransomware group was behind a recent Fortra zero-day, and India fixes a tax filing system flaw;</p>

                
                
                <h3 class="panel-title">Show notes</h3>
                	<ul>
                  	
                    	<li><a href="https://risky.biz/risky-bulletin-redis-vulnerability-impacts-all-versions-released-in-the-last-13-years/">Risky Bulletin: Redis vulnerability impacts all versions released in the last 13 years</a></li>
										
                 	</ul>
                
                ]]>
            </description>
        </item>
            
        
    </channel>
</rss>
