Podcasts

News, analysis and commentary

Risky Bulletin: NIST gives up enriching most CVEs

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

NIST says it won’t be enriching most CVEs, Russian hackers tried to disrupt a Swedish power plant, the EU releases its age verification app, and OpenAI announces its own private cyber model.

Risky Bulletin: NIST gives up enriching most CVEs
0:00 / 9:55

Mythos and 0day: Fixing exploits is not safety

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode, James Wilson is joined by Brad Arkin who provides a CISO’s perspective on Anthropic’s Mythos. As former CISO at Adobe, Cisco and Salesforce, Brad’s perspective challenges the notion that finding and fixing exploits makes us safer.

Mythos and 0day: Fixing exploits is not safety
0:00 / 21:12

Srsly Risky Biz: Time to ban sale of precise geolocation data

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about a new Citizen Lab report into Webloc, a tool to identify and track mobile devices. It demonstrates how the collection and sale of mobile phone geolocation data presents privacy and national security risks.

They also discuss a deep-dive into how a single hacker was able to breach nine Mexican government agencies in just weeks using AI assistants. They enabled the attacker to move much faster.

Srsly Risky Biz: Time to ban sale of precise geolocation data
0:00 / 20:48

Risky Bulletin: Malicious LLM proxy routers found in the wild

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Researchers find malicious LLM proxy routers, a fake Ledger crypto-wallet on the Mac App Store stole $10 million dollars, a ransomware crew leaks data from 38 law firms, and Google cracks down on back button hijacking.

Risky Bulletin: Malicious LLM proxy routers found in the wild
0:00 / 7:42

Risky Business #833 -- The Great Mythos Freakout of 2026

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:

  • Everyone has an opinion about Claude Mythos… even though almost nobody has used it yet
  • CISA adds a 2009 Excel bug to the KEV list, u wot?
  • Adobe also parties like it’s the 2000s, and fixes an Acrobat Reader bug
  • Disgraced former Trenchant exec Peter Williams’ sob story fails to resonate with … anyone
  • Remember those crosswalk buttons hacked to play audio mocking Trump and Zuck? They were “secured” by the password: 1234.

This week’s episode is sponsored by mobile network operator, Cape. Ajit Gokhale talks with James about the ways to get being a telco right when you’re starting from scratch and solving the security problems of 2026.

This episode is also available on Youtube.

Risky Business #833 -- The Great Mythos Freakout of 2026
0:00 / 59:45

Between Two Nerds: How AI will upset state cyber competition

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss how the rise of AI, which is very good at vulnerability and exploit development, will change the cyber security industry and competition between states.

This episode is also available on YouTube

Between Two Nerds: How AI will upset state cyber competition
0:00 / 29:52

Mythos and 0day: A hacker’s perspective

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this episode of Risky Business Features, James Wilson chats to professional hacker Jamieson O’Reilly about Anthropic’s Mythos and the impact it could have on offensive security. Jamieson is CEO of DVULN and co-founder of Aether AI. He’s been hacking into organisations for more than a decade, and knows a thing or two about combining AI and offensive security.

Mythos and 0day: A hacker’s perspective
0:00 / 32:54

Risky Bulletin: France takes first steps to ditch Windows for Linux

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

France prepares to ditch Windows for Linux, OpenAI was impacted by the Axios supply chain attack, Rockstar Games gets hacked again, and Adobe patches a reader zero-day.

Risky Bulletin: France takes first steps to ditch Windows for Linux
0:00 / 6:36

Sponsored: Corelight Agentic Triage helps defenders stay ahead

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this sponsored interview, Corelight’s Senior Director of Product Management, Dave Getman, tells James Wilson how Corelight Agentic Triage helps defenders stay ahead of AI-powered attacks.

Corelight makes NDR hardware that runs a heavily optimised version of the Zeek network monitoring tool. Corelight Agentic Triage integrates with EDR and other data sources, and helps defenders make sense of all the data that NDR can generate.

Sponsored: Corelight Agentic Triage helps defenders stay ahead
0:00 / 16:19

Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

The FBI extracted Signal chats from iPhone notifications logs, Los Angeles police data was leaked online, a former Meta employee is under investigation for downloading private photos, and an Adobe Reader zero-day is being exploited in the wild.

Risky Bulletin: FBI extracted Signal chats from iPhone notifications logs
0:00 / 6:49