Player FM - Internet Radio Done Right
90 subscribers
Checked 20h ago
Menambahkan three tahun yang lalu
Konten disediakan oleh Risky.biz. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Risky.biz atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Player FM - Aplikasi Podcast
Offline dengan aplikasi Player FM !
Offline dengan aplikasi Player FM !
Risky Bulletin
Tandai semua (belum/sudah) diputar ...
Manage series 3343211
Konten disediakan oleh Risky.biz. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Risky.biz atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
835 episode
Tandai semua (belum/sudah) diputar ...
Manage series 3343211
Konten disediakan oleh Risky.biz. Semua konten podcast termasuk episode, grafik, dan deskripsi podcast diunggah dan disediakan langsung oleh Risky.biz atau mitra platform podcast mereka. Jika Anda yakin seseorang menggunakan karya berhak cipta Anda tanpa izin, Anda dapat mengikuti proses yang diuraikan di sini https://id.player.fm/legal.
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
835 episode
Semua episod
×R
Risky Bulletin

1 Srsly Risky Biz: US investment in spyware skyrockets 15:56
15:56
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai15:56
Tom Uren and Amberleigh Jack talk about why it is good news that US investment in spyware vendors has skyrocketed. They also discuss the in-principle agreement for TikTok to remain in the US. It’s a win-win: a win for China and a win for TikTok, but not so much a win for US national security. This episode is also available on YouTube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: Android switches to risk-based security updates 7:11
7:11
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai7:11
Android will only issue monthly updates for high-risk vulnerabilities, a self-replicating attack hits the npm registry, BreachForums’ admin resentenced on appeal, and hackers breach Gucci’s parent company. Show notes Risky Bulletin: AI chatbot disinformation doubles in a year
R
Risky Bulletin

1 Between Two Nerds: The limits of cyber power 30:47
30:47
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai30:47
In this edition of Between Two Nerds Tom Uren and The Grugq talk about the limits of a state’s cyber power. This episode is also available on YouTube Show notes Dave Aitel's CyberSecPolitics post on cyber power metrics Lawfare Post BTN 117, The fate of nations BTN 120, Should US spies steal Chinese commercial secrets…
R
Risky Bulletin

1 Risky Bulletin: DC sues crypto ATM operator for profiting from scams 6:41
6:41
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai6:41
The US sues a crypto ATM operator for profiting from scams, SMS blasters make their way into Switzerland, the US and Portugal tussle over the extradition of the RaidForums admin, and Samsung patches a zero-day in its phones. Show notes Risky Bulletin: US largest crypto ATM operator sued for profiting from scams…
R
Risky Bulletin

1 Sponsored: The challenge of managing browser extensions 19:50
19:50
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai19:50
In this sponsored interview, Casey Ellis chats to David Cottingham and Daniel Schell from Airlock Digital. They discuss the challenge of browser extension management for enterprises, why it’s a priority and how Airlock can help. Show notes
R
Risky Bulletin

1 Risky Bulletin: Apple notifies French users of spyware attacks 7:08
7:08
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai7:08
Apple notifies French users of spyware attacks, China will increase fines for data breaches Google pays $1.6mil for cloud bugs at a hackathon event, and no more hacked free laundry for Dutch students Show notes Risky Bulletin: Most UK school hacks are caused by their own students
R
Risky Bulletin

1 Srsly Risky Biz: Exploiting authorisation sprawl is the new black 17:54
17:54
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai17:54
Tom Uren and Amberleigh Jack talk about the Salesloft Drift incident. It is a great example of the sprawling impact that the breach of a single service provider can have. We expect these single-compromise-large-blast-radius attacks will become the new norm. They also talk about Apple’s Memory Integrity Enforcement, which promises to be a big step forward for memory safety on Apple devices. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: White House to keep CyberCom and NSA dual role 8:38
8:38
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai8:38
The White House will keep the CyberCom and NSA dual-hat leadership arrangement, the US charges a major ransomware figure, Apple ships a memory safety protection feature and yet another supply chain attack hits the npm world. Show notes Risky Bulletin: US charges major ransomware figure
R
Risky Bulletin

1 Between Two Nerds: The death of the exploit 25:47
25:47
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai25:47
In this edition of Between Two Nerds Tom Uren and The Grugq talk about the trend toward outrageously complicated exploits and what it means for hacking and cyber espionage. This episode is also available on YouTube Show notes
R
Risky Bulletin

1 Risky Bulletin: New APT group turns out to be a phishing test 7:51
7:51
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai7:51
A new APT group turns out to be a phishing test, Qantas cuts executives’ bonuses after a recent breach, Anthropic stops selling AI tools to Chinese firms, and Nepal blocks 26 social media sites. Show notes Risky Bulletin: APT report? No, just a phishing test!
R
Risky Bulletin

1 Sponsored: Why prompt injection is an intractable problem 16:30
16:30
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai16:30
In this sponsored interview Casey Ellis chats with Keith Hoodlet from Trail of Bits. Keith is Trail of Bits’ director of engineering for AI, machine learning and application security and he joined Casey to talk about why prompt injection attack techniques that target AI are an unsolvable problem. Show notes…
R
Risky Bulletin

1 Risky Bulletin: Cyberattack disrupts Bridgestone tyre factories across North America 9:00
9:00
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai9:00
A cyberattack disrupts Bridgestone tyre factories in North America, a new infostealer takes your photo while you watch porn, bad certificates for Cloudflare infrastructure went undetected for more than a year, and Brazil deals with another payment system hack. Show notes Risky Bulletin: Chrome 140 comes with new hardened cookies…
R
Risky Bulletin

1 Srsly Risky Biz: Google sharpens its cyber knife 17:38
17:38
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai17:38
Tom Uren and Amberleigh Jack talk about Google starting a cyber disruption unit. It’s a sign of the times but could also point the way forward for policymakers looking to involve the private sector in government-endorsed efforts to strike back in cyberspace. They also talk about cyber security authorities from 13 different countries pegging Salt Typhoon to three Chinese companies. That’s a lot of countries, but Tom wonders whether attribution is just viewed as a cost of doing business for the Chinese government. And it turns out that Apple’s dispute with the UK government about encrypted iCloud data has not yet been resolved, despite media reports to the contrary. This episode is also available on Youtube . Show notes…
R
Risky Bulletin

1 Risky Bulletin: YouTubers unmask and help dismantle Chinese scam ring 4:24
4:24
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai4:24
Two YouTube channels help dismantle a Chinese scam operation, Cloudflare, Zscaler, and Palo Alto disclose Salesloft-related breaches, a ransomware attack disrupts vehicle production at Jaguar Land Rover, and we have a new record DDoS attack. Show notes Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring…
R
Risky Bulletin

1 Between Two Nerds: How threat actors are using AI to run wild 32:17
32:17
Putar Nanti
Putar Nanti
Daftar
Suka
Menyukai32:17
In this edition of Between Two Nerds Tom Uren and The Grugq talk about how cyber threat actors are using AI tools to fill in resource and skills gaps that they have. This episode is also available on Youtube . Show notes Anthropic's August 2025 Threat Report BTN episode 50
Selamat datang di Player FM!
Player FM memindai web untuk mencari podcast berkualitas tinggi untuk Anda nikmati saat ini. Ini adalah aplikasi podcast terbaik dan bekerja untuk Android, iPhone, dan web. Daftar untuk menyinkronkan langganan di seluruh perangkat.