Podcasts

News, analysis and commentary

Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

Iran attempts to hack security cameras to support its missile strikes, Israel bombs Iran’s cyber headquarters, authorities take down LeakBase and Tycoon 2FA, and TikTok says ‘no’ to encrypted private messaging.

Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes
0:00 / 6:47

Being a wartime CISO

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this edition of Risky Business Features James Wilson chats with cohost Brad Arkin about what it’s like being a CISO for a global company when a war starts.

How do you deal with a branch office full of important key material being abandoned? What about cloud infrastructure that’s in a data centre that falls into enemy hands? And if your staff are okay, are any of your key suppliers going to face problems?

As you’ll hear, being a wartime CISO is less about adjusting your SIEM sensitivity because the Iranians are coming to get you, and more about figuring out how to deal with very real threats to life and infrastructure.

Being a wartime CISO
0:00 / 31:36

Srsly Risky Biz: The four hour cyber war on Iran

Presented by

Amberleigh Jack
Amberleigh Jack

Producer and Editor

Tom Uren
Tom Uren

Policy & Intelligence

Tom Uren and Amberleigh Jack talk about how cyber operations were used in the first hours of the US-Israeli attack on Iran. They were instrumental in the attack on Iranian Supreme Leader Ali Khamenei, but they didn’t last long. The Iranian regime implemented an internet blackout within four hours of the first bombs.

They also discuss how threat actors are using AI. It’s not game-changing so far, but it is very much altering the balance between attack and defence.

This episode is also available on Youtube.

Srsly Risky Biz: The four hour cyber war on Iran
0:00 / 20:56

Risky Business #827 -- Iranian cyber threat actors are down but not out

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

Adam Boileau
Adam Boileau

Technology Editor

Patrick Gray
Patrick Gray

CEO and Publisher

On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover:

  • The US-Israeli attack on Iran had a whole lot of cyber. It’s clearly in the playbook now!
  • The NSA Triangulation / L3 Harris Trenchant iOS exploit kit is on the loose, and being used by Chinese crypto scammers
  • So long Maddhu Gottumukkala, but CISA’s annus horribilis continues
  • Adam “humbug” Boileau complains about the Airsnitch wifi attack just being three ethernets in a trenchcoat
  • ASD’s Cisco SD-WAN threat hunting guide is clearly borne of … experience

This week’s episode is sponsored by AI threat hunting platform Nebulock. Sydney Marrone joins to talk about how useful AI models are on the hunt, and her work building out an open source framework and maturity model. It’s methodology agnostic, so you can adapt it for your environment, and the github link is in the show notes!

This episode is also available on Youtube.

Risky Business #827 -- Iranian cyber threat actors are down but not out
0:00 / 61:24

Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

The US conducted cyberattacks ahead of strikes on Iran, Russia aims for internet independence by 2028, Google finds a new iOS exploit kit in the wild, and Chrome moves to a two-week release cycle.

Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes
0:00 / 7:12

Between Two Nerds: The evolution of cyber ops in Ukraine

Presented by

The Grugq
The Grugq

Independent Security Researcher

Tom Uren
Tom Uren

Policy & Intelligence

In this edition of Between Two Nerds Tom Uren and The Grugq how the use of cyber operations in the war in Ukraine has evolved over time.

This episode is also available on Youtube.

Between Two Nerds: The evolution of cyber ops in Ukraine
0:00 / 27:48

Risky Bulletin: LLMs can deanonymize internet users based on their comments

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

LLMs can deanonymize internet users based on their comments, CISA gets a new acting director, hackers steal 15 million records from the French Ministry of Health, and Google takes down an ad fraud botnet.

Risky Bulletin: LLMs can deanonymize internet users based on their comments
0:00 / 8:59

Sponsored: AI Agents need distinct identities

Presented by

Casey Ellis
Casey Ellis

Founder, Bugcrowd

In this sponsored interview Casey Ellis chats to Harish Peri, SVP and general manager for AI security at Okta, a cloud-based identity and access management company. The pair chat about the fact that AI is forcing enterprises to relearn the basics around identity security, and how Okta for AI Agents can help.

Sponsored: AI Agents need distinct identities
0:00 / 15:14

What to do about North Korean remote workers

Presented by

James Wilson
James Wilson

Enterprise Technology Editor

In this podcast James Wilson chats with Brad Arkin about North Korea’s sprawling fake IT worker ecosystem. From fake interviews, to stolen identities, basement laptop farms and IP-KVM tricks, the North Koreans are operating a whole employment fraud industry.

Brad and James discuss how the scheme works in practice and the technical detection challenges defenders now face, like dealing with stolen or borrowed identities, bribed verification checks and multi-person operational chains. They also dig into why enterprises are largely on the back foot, and why there’s no single product you can buy to solve this.

As the former CISO of Adobe, Cisco and Salesforce, Brad has some firsthand experience dealing with this stuff!

What to do about North Korean remote workers
0:00 / 27:55

Risky Bulletin: Russian man extorts Conti ransomware group

Presented by

Catalin Cimpanu
Catalin Cimpanu

News Editor

Claire Aird
Claire Aird

Newsreader

A Russian man prosecuted for extorting the Conti ransomware group, Google takes down a Chinese cyber-espionage operation, Anthropic tells Department of War to pound sand over AI restrictions, and a Cisco zero-day was exploited in the wild for three years.

Risky Bulletin: Russian man extorts Conti ransomware group
0:00 / 8:39