Couverture de Risky Business

Risky Business

Risky Business

De : Risky Business Media
Écouter gratuitement

À propos de ce contenu audio

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.Copyright Risky Business Media 2007-2026 Politique et gouvernement
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • Risky Business #826 -- A week of AI mishaps and skulduggery
      Feb 25 2026
      On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: Low skill actors compromise 600 Fortinets with AI-generated playbooksAnthropic calls out Chinese AI firms over model distillationMeta’s director of AI safety tells her ClawdBot not to delete her mail… so of course it doesPeter Williams cops 7 years in jail for selling L3 Harris Trenchant’s exploits to RussiaIvanti got hacked in 2021 via… bugs in Ivanti This episode is sponsored by line-rate network capture system Corelight. CEO Brian Dye joins to discuss what AI can do for defenders, and what it can’t. This episode is also available on Youtube. Show notes AI-augmented threat actor accesses FortiGate devices at scale"this reads to me like: they ran existing tools.... but with a cool dashboard :D"Anthropic accuses Chinese labs of trying to illicitly take Claude’s capabilities | CyberScoopDetecting and preventing distillation attacksHegseth warns Anthropic to let the military use the company’s AI tech as it sees fit, AP sources sayAnthropic Rolls Out Embedded Security Scanning for ClaudeAWS's AI Coding Bot Kiro Caused a 13-Hour OutageRunning OpenClaw safely: identity, isolation, and runtime riskFormer Adobe, Cisco and Salesforce CISO talks AI pentestingHistory Repeats: Security in the AI Agent EraMeta Director of AI Safety Allows AI Agent to Accidentally Delete Her InboxMicrosoft says Office bug exposed customers' confidential emails to Copilot AI | TechCrunchThe (tangential) fix: Microsoft adds Copilot data controls to all storage locationsEx-L3Harris executive sentenced to 87 months in prison for selling zero-day exploits to Russian brokerTreasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber ToolsRisky Bulletin: Russia starts criminal probe of Telegram founder Pavel DurovUkraine pushes tighter Telegram regulation, citing Russian recruitment of localsThe watchers: how openai, the US government, and persona built an identity surveillance machine that files reports on you to the fedsPersona emails customers saying they don’t work with ICE or DHS amid ‘surveillance’ claimsInside the Fix: Analysis of In-the-Wild Exploit of CVE-2026-21513Ivanti hacked in 2021 via its own productFed agencies ordered to patch Dell bug by Saturday after exploitation warning | The Record from Recorded Future NewsFrom BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
      Afficher plus Afficher moins
      1 h et 6 min
    • Risky Biz Soap Box: The lethal trifecta of AI risks
      Feb 19 2026

      There’s a lethal trifecta of AI risks: access to private data, exposure to untrusted content, and external communication. In this conversation, Risky Business host Patrick Gray chats with Josh Devon, the co-founder of Sondera, about how to best address these risks.

      There is no magic solution to this problem. AI models mix code and data, are non-deterministic, and are crawling around all over your enterprise data and APIs as you read this.

      But in this sponsored interview, Josh outlines how we can start to wrap our hands around the problem.

      This episode is also available on Youtube.

      Show notes
        Afficher plus Afficher moins
        38 min
      • Risky Business #825 -- Palo Alto Networks blames it on the boogie
        Feb 18 2026
        On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They cover: Palo Alto threat researchers want to attribute to China, but management says shushAn increasing proportion of ransomware is data extortion. Is this good?Cambodia says it’s going to dismantle scam compoundsCISA sufferers through yet another shutdownGoogle Gemini’s training secrets are being systematically harvested to improve other LLMsAcademics assess SaaS password managers’ resilience against a malicious server This episode is sponsored by SSO-firewall integration vendor Knocknoc. Chief exec Adam Pointon joins to talk about the latest in defences… which is to say Knocknoc for Solaris/Sparc and HPUX on PA-RISC?! Okay also that other little known OS… Windows. This episode is also available on Youtube. Show notes Data-only extortion grows as ransomware gangs seek better profits | Cybersecurity DiveArctic Wolf Threat Report 2026Exclusive: Palo Alto chose not to tie China to hacking campaign for fear of retaliation from Beijing, sources sayRisky Bulletin: Cambodia promises to dismantle scam networks by April - Risky Business MediaAge of the ‘scam state’: how an illicit, multibillion-dollar industry has taken root in south-east Asia | Cybercrime | The GuardianCritical flaw in BeyondTrust Remote Support sees early signs of exploitation | Cybersecurity DiveCISA Navigates DHS Shutdown With Reduced Staff - SecurityWeekKimwolf Botnet Swamps Anonymity Network I2P – Krebs on SecurityBADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign — Elastic Security LabsOver 500,000 VKontakte accounts hijacked through malicious Chrome extensions | The Record from Recorded Future NewsPassword managers' promise that they can't see your vaults isn't always true - Ars TechnicaZero Knowledge (About) Encryption: A Comparative Security Analysis of Three Cloud-based Password ManagersGoogle finds state-sponsored hackers use AI at 'all stages' of attack cycle | CyberScoopGoogle: Gemini hit with 100,000+ prompts in cloning attemptProofpoint acquires Acuvity to tackle the security risks of agentic AI | CyberScoopCisco Redefines Security for the Agentic Era with AI Defense Expansion and AI-Aware SASESophos Acquires Arco Cyber to Bring CISO-Level, Agentic AI-Powered Expertise to Every OrganizationDave Kennedy on X: "Regarding this, there was a couple questions on does the pacemaker continue to advertise - most BLE implantable devices go into a sleep type mode. In this case, we are lucky - it does not. We know based on law enforcement answers that she is using a more modern pacemaker with" / XClash Report on X: "BIG: Dutch Defence Minister Gijs Tuinman hints that software independence is possible for F-35 jets. He literally said you can “jailbreak” an F-35. When asked if Europe can modify it without US approval: “That’s not the point… we’ll see whether the Americans will show https://t.co/f11cGvtYsO" / XDutch police arrest man who refused to delete confidential files shared by mistake | The Record from Recorded Future News
        Afficher plus Afficher moins
        1 h et 3 min
      Aucun commentaire pour le moment