Podcasts

News, analysis and commentary

Risky Bulletin: RPKI infrastructure sits on shaky ground

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

RPKI relies on vulnerable servers, the French Ministry of Economy discloses a data breach, the UK gives tech platforms 48 hours to remove revenge porn, and ClickFix-attacks are responsible for 50% of malware infections.

Risky Bulletin: RPKI infrastructure sits on shaky ground
0:00 / 8:36

Risky Biz Soap Box: The lethal trifecta of AI risks

Presented by

Patrick Gray
Patrick Gray

CEO and Publisher

There’s a lethal trifecta of AI risks: access to private data, exposure to untrusted content, and external communication. In this conversation, Risky Business host Patrick Gray chats with Josh Devon, the co-founder of Sondera, about how to best address these risks.

There is no magic solution to this problem. AI models mix code and data, are non-deterministic, and are crawling around all over your enterprise data and APIs as you read this.

But in this sponsored interview, Josh outlines how we can start to wrap our hands around the problem.

This episode is also available on Youtube.

Risky Biz Soap Box: The lethal trifecta of AI risks
0:00 / 37:33

Former Adobe, Cisco and Salesforce CISO talks AI pentesting

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this debut feature conversation in the Risky Business Features feed James Wilson sits down with Brad Arkin, the former CSO of Adobe, Cisco, and Salesforce, to talk all about AI pentesting.

Finding and fixing bugs is great, but does it materially improve the overall security of a product? What’s the point of a pentest if the tester can’t walk you through their findings when it’s over? Is “bugs per dollar spend” really the measure of value in security testing?

We hope you enjoy this podcast!

Former Adobe, Cisco and Salesforce CISO talks AI pentesting
0:00 / 25:55

Srsly Risky Biz: Cyber bullets can't replace political will

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about a groundswell of calls from European officials to build cyber capabilities to strike back against adversaries. There are good reasons that countries should have their own cyber capabilities, but if you don’t have the political will to strike back, having a magic cyber weapon doesn’t really make a difference.

They also talk about ‘distillation attacks’. They are a way that AI developers can steal the secret sauce of advanced models just by asking questions. It looks like American companies need government assistance if the US wants to keep its AI lead.

This episode is also available on Youtube.

Srsly Risky Biz: Cyber bullets can't replace political will
0:00 / 19:34

Risky Business #825 -- Palo Alto Networks blames it on the boogie

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:

  • Palo Alto threat researchers want to attribute to China, but management says shush
  • An increasing proportion of ransomware is data extortion. Is this good?
  • Cambodia says it’s going to dismantle scam compounds
  • CISA sufferers through yet another shutdown
  • Google Gemini’s training secrets are being systematically harvested to improve other LLMs
  • Academics assess SaaS password managers’ resilience against a malicious server

This episode is sponsored by SSO-firewall integration vendor Knocknoc. Chief exec Adam Pointon joins to talk about the latest in defences… which is to say Knocknoc for Solaris/Sparc and HPUX on PA-RISC?! Okay also that other little known OS… Windows.

This episode is also available on Youtube.

Risky Business #825 -- Palo Alto Networks blames it on the boogie
0:00 / 63:13

Risky Bulletin: Supply chain attack plants backdoor on Android tablets

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A supply chain attack plants backdoors on Android tablets, the EU blocks AI from lawmakers’ devices, Cellebrite was used against a Kenyan politician, and a Chinese APT is exploiting a Dell zero-day.

Risky Bulletin: Supply chain attack plants backdoor on Android tablets
0:00 / 8:18

History Repeats: Security in the AI Agent Era

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

AI agents are being deployed with the same trust-by-default architecture the early internet had. Same mistakes, MUCH faster timeline.

OpenClaw has hit 180K+ GitHub stars. But in the past week:

  • 341 malicious skills on ClawHub were distributing Atomic Stealer
  • ZeroPath disclosed a Browser Relay vuln enabling cross-tab cookie theft
  • CrowdStrike, Cisco, and Bitdefender all published enterprise advisories
  • VirusTotal partnered with ClawHub to scan uploads
  • Korean tech firms (Kakao, Naver, Karrot) banned it on corporate networks
  • 1,000+ Open PRs, 250+ less than 24 hours old.

But how does this thing actually work? Join James Wilson as he explains why banning these types of agents doesn’t work, why browser sessions are now API surfaces, and why your organisation needs to think of these issues early or be condemned to decades of catch-up programs.

History Repeats: Security in the AI Agent Era
0:00 / 29:56

Between Two Nerds: Buying the magic weapon

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.

This episode is also available on Youtube

Between Two Nerds: Buying the magic weapon
0:00 / 28:18

Risky Bulletin: Cambodia promises to dismantle scam compounds by April

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.

Risky Bulletin: Cambodia promises to dismantle scam compounds by April
0:00 / 8:52

Sponsored: Filtering the KEV was really hard … Until now!

Presented by

Casey Ellis
Casey Ellis

Founder, Bugcrowd

In this sponsored interview Casey Ellis chats to Tod Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.

Sponsored: Filtering the KEV was really hard … Until now!
0:00 / 23:58