Powered by RND
PodcastsNewsRisky Bulletin

Risky Bulletin

risky.biz
Risky Bulletin
Latest episode

Available Episodes

5 of 248
  • Risky Bulletin: APTs go after the React2Shell vulnerability within hours
    APTs go after the React2Shell vulnerability just hours after public disclosure. CISA remains without a director after the nomination stalls again, NSA is down 2,000 staff this year, and Intellexa is still active despite sanctions. Show notes
    --------  
    8:18
  • Srsly Risky Biz: When cyber campaigns cross a line
    Tom Uren and Patrick Gray discuss a new report proposing a framework for deciding when cyber operations raise red flags. It suggests seven red flags and could help clarify thinking about how to respond to different operations. They also discuss Anthropic testifying to Congress and Iran using cyber intelligence to target missile strikes including by sharing it with Houthi rebels who fired at a specific ship. And finally, we are not reassured by China’s white paper about being a good cyber citizen. This episode is also available of Youtube. Show notes Assessing Irresponsibility in Cyber Operations AWS on state actors bridging cyber and kinetic warfare
    --------  
    16:18
  • Between Two Nerds: Beating back state espionage
    In this edition of Between Two Nerds Tom Uren and The Grugq wonder whether it is possible to deter states from cyber espionage with doxxing and other disruption measures. This episode is also available on Youtube. Show notes Department 40 exposed Charming Kitten exposed
    --------  
    27:51
  • Sponsored: Why Mastercard got into threat intel
    In this Risky Business News sponsor interview, Mike Lashlee, CSO of Mastercard talks to Tom Uren about why the company got into threat intelligence. Mike talks about bringing together payments insights with threat intel to get strong signals about fraud or crime, the benefits of international collaboration and when it makes sense for your CSO to also be the CISO. Show notes
    --------  
    14:05
  • Srsly Risky Biz: DeepSeek and Musk's Grok both toe the party line
    Tom Uren and Amberleigh Jack talk about new research that shows the Chinese-made DeepSeek-R1 AI model produces insecure code when prompts include topics that the Chinese Communist Party dislikes. It’s interesting research, but the CCP doesn’t have a monopoly on imposing AI bias. They also discuss the complete doxxing of the Iranian cyber espionage group known as APT35 or Charming Kitten. This episode is also available on Youtube. Show notes
    --------  
    21:25

More News podcasts

About Risky Bulletin

Regular cybersecurity news updates from the Risky Business team...
Podcast website

Listen to Risky Bulletin, NPR News Now and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.0.7 | © 2007-2025 radio.de GmbH
Generated: 12/8/2025 - 4:16:49 AM