Player FM - Internet Radio Done Right
97 subscribers
Checked 3d ago
Додано three роки тому
Вміст надано Risky.biz. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Risky.biz або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Player FM - додаток Podcast
Переходьте в офлайн за допомогою програми Player FM !
Переходьте в офлайн за допомогою програми Player FM !
Подкасти, які варто послухати
РЕКЛАМА
<
<div class="span index">1</div> <span><a class="" data-remote="true" data-type="html" href="/series/biscuits-jam-2787342">Biscuits & Jam</a></span>


In the South, food and music go hand in hand. They define much of what we think of as Southern culture, and they say a lot about our past, our present, and our future. Each week, Sid Evans, Editor in Chief of Southern Living, sits down with musicians, chefs, and other Southern icons to hear the stories of how they grew up, what inspires them, and why they feel connected to the region. Through honest conversations, Sid explores childhood memories, the family meals they still think about, and the intersection of food and music in their lives. Always surprising, always engaging, Biscuits & Jam is a celebration of the South—and the people who are moving it forward every day. New episodes every Tuesday.
Risky Bulletin
Відзначити всі (не)відтворені ...
Manage series 3343211
Вміст надано Risky.biz. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Risky.biz або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
757 епізодів
Відзначити всі (не)відтворені ...
Manage series 3343211
Вміст надано Risky.biz. Весь вміст подкастів, включаючи епізоди, графіку та описи подкастів, завантажується та надається безпосередньо компанією Risky.biz або його партнером по платформі подкастів. Якщо ви вважаєте, що хтось використовує ваш захищений авторським правом твір без вашого дозволу, ви можете виконати процедуру, описану тут https://uk.player.fm/legal.
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
757 епізодів
כל הפרקים
×Intellexa is alive and well despite US sanctions, Paragon spyware used a zero-click iMessage exploit, South Korea’s largest online bookstore gets ransomwared, and law enforcement takes down several cybercrime operations. Show notes
Tom Uren and Patrick Gray talk about how a Trump executive order has scaled back the government’s cyber security ambitions. The carrots and sticks that would have been used to encourage organisations to adopt stricter security standards are gone. They also discuss North Korea’s use of AI in its IT worker scam and the emergence of espionage-as-a-service… perhaps. This episode is also available on Youtube . Show notes…
SentinelOne dodges a Chinese APT hack, anonymous sources point to more Salt Typhoon victims, a cyberattack disrupts grocery deliveries in the US, and 140 arrested in Kazakhstan for selling citizens’ data. Show notes
In this edition of Between Two Nerds Tom Uren and The Grugq take a look at the hackers of Unit 29155, Russian military intelligence’s sabotage and assassination group. This episode is also available on Youtube . Show notes The Insider 'Hidden Bear' investigation Japanese Tokuryū Ukraine SSSCIP report H1 2023…
The EU launches its own DNS service, Trump revises previous administrations’ cyber executive orders, a supply chain attack hits popular NPM packages, and mysterious iOS attacks spotted in the wild. Show notes
In this sponsored interview, Casey Ellis interviews Push Security co-founder and Chief Product Officer Jacques Louw about how good phishing crews have gotten at evading detection. Attackers are hiding their payloads behind legitimate bot-detection tools to stop things like email security gateways from seeing them, as well as locking up phishing pages behind OAuth challenges. Push sees all this because it’s installed as a browser plugin and sees what users see. Show notes…
A hacking group goes after Salesforce data, the FBI takes down the BidenCash carding forum, China offers rewards for Taiwanese military hackers, and high risk bugs are patched in enterprise software from HPE and Infoblox. Show notes
Tom Uren and Patrick Gray talk about how Operation Endgame, the multinational law enforcement effort to tackle ransomware is approaching the problem holisitically. It’s tackling the enablers of ransomware and although it won’t eliminate the crime, it’ll make it harder for criminals. They also discuss the spyware app that helped to dismantle the Syrian regime, at least maybe a little bit, and how Russian military intelligence’s sabotage and assasination unit got into cyber operations. This episode is also available on Youtube . Show notes…
A spyware app infected the Syrian Army’s soldiers before the regime collapsed, NSO appeals its WhatsApp verdict, Chrome and Qual-comm patch zero-days, and an emergency services information sharing group shuts down. Show notes
In this edition of Between Two Nerds Tom Uren and The Grugq look at NSA’s take on information warfare, all the way back from 1997. This episode is also available on Youtube . Show notes Cryptolog, The Journal of Technical Health, from NSA in 1997
Law enforcement agencies take down A-V-Check, four US Senators urge for the reinstatement of the Cyber Safety Review Board, Germany identifies the leader of the TrickBot gang, and an AI-vibe-coding platform leaks user data and API keys. Show notes
In this sponsored interview, Risky Business Media’s brand new interviewer Casey Ellis chats with runZero founder and CEO HD Moore about why vuln scanning tech is awful and broken. He also talks about how they’re trying to do something better by glueing their own discovery product to the nuclei open source vulnerability scanner. Show notes…
Windows Update will deliver third party app updates, a public database exposed Russia’s nuclear secrets, US banks ask the SEC to rescind cyber breach disclosure rule, and ConnectWise discloses an APT breach. Show notes
Tom Uren and Patrick Gray talk about Russian DanaBot malware developers making a tailored variant of their malware specifically for espionage. This fills in some of the blanks on the exact relationship between Russian criminals and the country’s intelligence services. They also discuss a US Director of National Intelligence initiative to centralise the purchase of commercially acquired information. Although this information can be used maliciously, having a one-stop-shop should make it easier to check that it is being used responsibly. This episode is also available on Youtube . Show notes…
Dutch intelligence discovers a new Russian APT, a ransomware attack hits the maker of MATLAB, 20 arrested in Nigeria over hacking exam results, and an Iranian pleads guilty for the Robbinhood ransomware attacks. Show notes
In this edition of Between Two Nerds Tom Uren and The Grugq talk about cyber’s ‘hard problems’ and why they are intractable. This episode is also available on Youtube . Show notes Cyber Hard Problems, from the National Academies of Sciences
A major exodus of leadership is underway at CISA, the US government will audit NIST over its vulnerability backlog; an ancient and mysterious APT has been linked to Spain’s government, and the SVG image format is great for phishing. Show notes
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Bobby Filar, Head of Machine Learning at Sublime Security. Bobby takes us through the rising problem of spam bombing, or email bombing, a technique threat actors are increasingly using for initial access into corporate environments. Show notes Bobby Filar Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing” Ongoing Social Engineering Campaign Linked to Black Basta Ransomware Operators Storm-1811 exploits RMM tools to drop Black Basta ransomware Massive Email Bombs Target .Gov Addresses A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist…
Law enforcement takes down the DanaBot and Lumma Stealer malware operations, the US government wants a centralized data broker platform, Turkey dismantles a Chinese IMSI catcher spy ring, and Russia hacked border cameras to track Ukrainian military aid. Show notes
Tom Uren and Patrick Gray talk about how Telegram took down the two largest ever criminal marketplaces recently. They used Telegram for all their communications and had collectively sold over USD$30 billion in illicit products. The pair discuss why Telegram is now cooperating with authorities after historically being reluctant and whether this assistance will continue. They also discuss how Meta is awash with scam advertisements and how Chinese mobile app encryption is suspiciously awful. This episode is also available on Youtube . Show notes…
DDoSecrets archives 400GB of stolen TeleMessage data, the FBI closes its FISA watchdog office, Predatorgate lawsuit delayed due to interpreter shortage, and a wave of DDoS attacks disrupt Russian government portals. Show notes
In this edition of Between Two Nerds Tom Uren and The Grugq examine what makes it hard for even competent hackers to contribute to state-backed espionage agencies. This episode is also available on Youtube . Show notes The I-Soon cyber espionage contractor data leak
Japan passes a new active cyber defense law, printer software gets shipped with malware, a UK telco leaks user data and geolocation via its 4G network, and Volkswagen patches major bugs in its mobile app. Show notes
In this Risky Bulletin sponsor interview Justin Kohler, Chief Product Officer at SpecterOps talks to Tom Uren about the impossible challenge of managing identity directory services securely. Organisations try to implement the principle of least privilege but have no idea if they have done a good job. Justin talks about approaches SpecterOps is developing to address this problem. Show notes…
Coinbase was extorted by hackers who bribed employees for user data, America’s largest steel producer halts production after a cyberattack, Scattered Spider shifts to targeting US retailers, and the US abandons plans to protect Americans from data brokers. Show notes
In this special edition of the Seriously Risky Business podcast Patrick Gray speaks with former NSA Cybersecurity Director Rob Joyce and former director of the CIA’s Center for Cyber Intelligence Andy Boyd. The talk about what offensive cyber could look like under Trump 2.0, and the shake-up the intelligence community is going through under various White House initiatives. This episode is also available on Youtube . Show notes…
The EU launches its own vulnerability database, a Turkish APT deploys a zero-day in Iraq, North Korea tasks an APT to Ukraine, and Spain will probe cyber’s role in last month’s energy grid collapse. Show notes
In this edition of Between Two Nerds Tom Uren and The Grugq examine whether the US should steal intellectual property from Chinese companies. This episode is also available on Youtube . Show notes Stewart Baker's Lawfare article Bunny Huang's 'Essential Guide to Electronics in Shenzhen' BTN44 on the rights and wrongs of intellectual property theft Corelight sponsor interview with James Pope…
The Kaleidoscope ad fraud network infects 2.5 million devices a month, Germany seizes the eXch crypto-mixing service, the US takes down the Anyproxy botnet, and Chrome will use on-device AI to detect tech support scams. Show notes
In this Risky Bulletin sponsor interview James Pope, Director of Technical Enablement, talks to Tom Uren about his experience running networks and security centres at Black Hat conferences around the world. Pope talks about the challenges of running a SOC at a hacker conference, how conference networks around the world have a different character and talks about all the weird and wonderful security snafus he has found. Show notes…
Ласкаво просимо до Player FM!
Player FM сканує Інтернет для отримання високоякісних подкастів, щоб ви могли насолоджуватися ними зараз. Це найкращий додаток для подкастів, який працює на Android, iPhone і веб-сторінці. Реєстрація для синхронізації підписок між пристроями.