Episodios

  • Risky Business #833 -- The Great Mythos Freakout of 2026
    Apr 15 2026
    On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: Everyone has an opinion about Claude Mythos… even though almost nobody has used it yetCISA adds a 2009 Excel bug to the KEV list, u wot?Adobe also parties like it’s the 2000s, and fixes an Acrobat Reader bugDisgraced former Trenchant exec Peter Williams’ sob story fails to resonate with … anyoneRemember those crosswalk buttons hacked to play audio mocking Trump and Zuck? They were “secured” by the password: 1234. This week’s episode is sponsored by mobile network operator, Cape. Ajit Gokhale talks with James about the ways to get being a telco right when you’re starting from scratch and solving the security problems of 2026. This episode is also available on Youtube. Show notes Lab SpaceThe “AI Vulnerability Storm”: Building a “Mythosready” Security ProgramPolymarket on X: "JUST IN: Goldman Sachs is reportedly ramping up its cyber defenses in preparation for Claude Mythos." Ananay on X: "Marcus Hutchins probably has the best take on Mythos doing vulnerability research"solst/ICE of Astarte on X: "Th vast majority of CISOs do not work at Google-sized companies, and will not have to worry about 0days"Charlie Miller on X: "we’ve gone through this before with early fuzzers, afl, etc"James Kettle on X: "'Can AI Do Novel Security Research? Meet the HTTP Terminator' will premiere at Blackhat"jeffrey lee funk on X: "We've been tricked, again. Many of the thousands of bugs and vulnerabilities Mythos found are in older software are impossible to exploit."Claude is getting worse, according to Claude • The RegisterYour Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply ChainOpenAI's Mac apps need updates thanks to the Axios hack | CyberScoopHack at Anodot leaves over a dozen breached companies facing extortion | TechCrunchSnowflake customers hit in data theft attacks after SaaS integrator breachBooking.com confirms hackers accessed customers’ dataCPUID hijacked to serve malware as HWMonitor downloads • The RegisterKnown Exploited Vulnerabilities Catalog | CISAAdobe fixes PDF zero-day security bug that hackers have exploited for months | TechCrunchThe Sad Decline of Trenchant Exec Who Had Everything, Before Deciding to Steal and Sell Zero Days to Russian BuyerFBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification DatabaseUS operation evicts Russia from hacked SOHO routers used to breach critical infrastructure | Cybersecurity DiveTelegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market | WIREDThe Dumbest Hack of the Year Exposed a Very Real Problem | WIRED
    Más Menos
    1 h
  • Snake Oilers: Burp AI, Sondera and Truffle Security
    Apr 9 2026

    In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products:

    • Burp AI and DAST: The founder of PortSwigger and creator of legendary security software Burp Suite, Dafydd Stuttard, drops by to pitch listeners on Burp AI and Burp Suite DAST.

    • Sondera: Josh Devon talks about Sondera, a technology designed to intervene when AI models start doing the wrong thing by statefully tracking their trajectories. This isn’t a permissions suite for AI agents, it’s a way to stick agents in a harness and make sure they adhere to hard policy boundaries.

    • Truffle Security: Dylan Ayrey, the founder of Truffle Security, joins Risky Business again to talk through the latest bells and whistles in Trufflehog, a security tool that searches for exposed secrets and validates them. The Truffle team has done a lot of work on the remediation part of their product over the last few years, and Dylan tells us all about it!

    This episode is also available on YouTube

    Show notes
      Más Menos
      48 m
    • Risky Business #832 -- Anthropic unveils magical 0day computer God
      Apr 8 2026
      On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: Anthropic’s new Mythos model hunts bugs and chains exploits together so well that… you cant have it……Unless you’re one of their Project Glasswing partnersThe world isn’t short on bugs, though. F5, Fortinet, Progress ShareFile, and TrueConf are all getting rekt by humansGPU Rowhammering goes in the GPU, past the IOMMU and back into the host-side Nvidia driverNorth Korea is spending serious time and money on its crypto hackingJust when the US needs CISA most, they slash its budget some more! This week’s episode is sponsored by identity verification firm, Persona. Tying digital actions to actual human identities isn’t just for banking know-your-customer any more. Persona’s Benjamin Crait says know-your-staff checks belong in high-value flows inside your organisation, too. This episode is also available on Youtube. Show notes Claude Mythos Preview \ red.anthropic.comAnthropic Claims Its New A.I. Model, Mythos, Is a Cybersecurity ‘Reckoning’ - The New York TimesAnthropic Teams Up With Its Rivals to Keep AI From Hacking Everything | WIREDFFmpeg on X: "Thank you to @AnthropicAI for sending FFmpeg patches" / XCritical flaw in F5 BIG-IP faces wide exploitation risk | Cybersecurity DiveReact2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data | Cybersecurity DiveCritical flaw in FortiClient EMS under exploitation | Cybersecurity DiveResearchers warn of critical flaws in Progress ShareFile | Cybersecurity DiveCISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers | The Record from Recorded Future NewsNew Rowhammer attacks give complete control of machines running Nvidia GPUs - Ars TechnicaNorth Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunchDrift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea | The Record from Recorded Future NewsDrift on X: "Drift Protocol — Incident Background Update " / XTrump’s FY2027 budget again targets CISA | Cybersecurity DiveCISA’s vulnerability scans, field support on chopping block in Trump budget | Cybersecurity DiveIranian hackers break into U.S. industrial systems, agencies warnFBI labels suspected China hack of law enforcement data 'a major cyber incident'Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on SecurityMassachusetts hospital turning ambulances away after cyberattack | The Record from Recorded Future NewsExclusive | 'Ghost Murmur,' a never-used secret tool, deployed to find lost airman in Iran in daring missionA Secure Chat App’s Encryption Is So Bad It Is ‘Meaningless’
      Más Menos
      54 m
    • How the World Got Owned Episode 2: The 1990s, Part One
      Apr 3 2026

      In this special documentary episode, Patrick Gray and Amberleigh Jack take a look back at hacking throughout the 1990s, from the feel-good vibes of the early hacking communities to the antics of young hackers who wound up on the run from the FBI.

      Part one features recollections from:

      • Jeff Moss (The Dark Tangent), DefCon and Black Hat founder
      • Chris Wysopal (Weld Pond), L0pht member, co-founder, @Stake
      • Kevin Poulsen (Dark Dante), 1990s hacker turned journalist
      • Elias Levy (Aleph One), author of Smashing the Stack for Fun and Profit, Phrack, 1996

      How the World Got Owned is produced in partnership with SentinelOne.

      Show notes
      • Elias Levy (Aleph1), Former Principle Engineer, Google
      • Kevin Poulsen, Journalist
      • Jeff Moss, DefCon founder
      • Chris Wysopal, @Stake founder, L0pht member
      • Hackers testifying at the United States Senate, May 19, 1998
      • Hackers May ‘Net’ Good PR for Studio
      • DefCon Archives | DefCon 1
      • A Not So Terribly Brief History of the Electronic Frontier Foundation
      • Innocent Hackers Want Their Computers Back
      • Breakdowns in Computer Security
      • Unsolved Mysteries, Season 3, Episode 4
      • The Last Hacker: He Called Himself Dark Dante. His Compulsion Led Him to Secret Files and, Eventually, The Bar of Justice
      • Justia appeal summary, Kevin Poulsen, 1994
      • Smashing the Stack for Fun and Profit, Phrack Magazine, November 1996
      • From subversives to CEOs: How radical hackers built today’s cybersecurity industry
      Más Menos
      47 m
    • Risky Business #831 -- The AI bugpocalypse begins
      Apr 1 2026
      On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: Those pesky North Koreans shim a backdoor into a 100M-downloads-a-week npm packageTeamPCP appear to have ransacked Cisco’s source and cloud environmentsAI is getting legitimately good at being told to “just go find some 0day in this”Kaspersky says Coruna and Triangulation do share code lineageIranian hackers dump Kash Patel’s gmail spoolOh, and of course there’s a Citrix Netscaler memory leak being exploited in the wild This week’s episode is sponsored by Dropzone AI, who make automated AI SOC analysts. Head honcho Ed Wu explains how they’ve built pre-canned ‘hunt packs’ to lead the AI off into your environment to find weird, interesting and security relevant things. This episode is also available on Youtube. Show notes Google links axios supply chain attack to North Korean group | The Record from Recorded Future NewsCisco source code stolen in Trivy-linked dev environment breachchiefofautism on X: "someone at ANTHROPIC just showed CLAUDE finding ZERO DAY vulnerabilities in a live conference demo"h0mbre on X: "Claude is somehow better at kernel exploitation than creating meal plans."Vulnerability Research Is Cooked — QuarrelsomeMAD Bugs: vim vs emacs vs Claude - CalifMAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)A Risky Biz Experiment: Hunting for iOS 0day with AI - Risky Business MediaSecurity leaders say the next two years are going to be 'insane' | CyberScoopCoruna framework: an exploit kit and ties to Operation Triangulation | SecurelistApple says no one using Lockdown Mode has been hacked with spyware | TechCrunchReverse engineering Apple’s silent security fixes - CalifJury finds Meta's platforms are harmful to children in 1st wave of social media addiction lawsuits | PBS NewsMeta and YouTube found liable in social media addiction trialIranian hackers publish emails allegedly stolen from Kash PatelIran Us War: 'Legitimate targets': Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia - The Times of IndiaDrop Site on X: "IRGC: From now on, for every assassination, an American company will be destroyed"OSINTtechnical on X: "Starlink shutdowns are forcing Russian troops even deeper into Ubiquiti’s ecosystem. "Citrix NetScaler products confirmed to be under exploitation | Cybersecurity DiveCISA tells federal agencies to patch Citrix NetScaler bug by Thursday | The Record from Recorded Future NewsUsing a VPN May Subject You to NSA Spying | WIREDPost reporters called the White House. Their phones showed ‘Epstein Island.’ - The Washington Post
      Más Menos
      1 h
    • Soap Box: Red teaming AI systems with SpecterOps
      Mar 27 2026

      In this sponsored Soap Box edition of the show, Patrick Gray and James Wilson talk about red teaming AI systems with Russel Van Tuyl, Vice President of Services at elite penetration testing firm SpecterOps.

      SpecterOps is the company behind attack path enumeration tool Bloodhound and Bloodhound Enterprise, but they’re also a pentest and red teaming shop with world class expertise in popping shells on all sorts of interesting systems in all sorts of interesting places.

      This episode is also available on Youtube.

      Show notes
        Más Menos
        30 m
      • Risky Business #830 -- LiteLLM and security scanner supply chains compromised
        Mar 25 2026
        On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They talk through: TeamPCP’s supply chain attack on Github, and they threw in an anti-Iran wiper, because why not?!Anthropic hooks up its models to just… use your whole computerAfter Stryker’s Very Bad Day, CISA says maybe add some more controls around your Intune?Another iOS exploit kit shows up in the cyber bargain-binThe FTC decides to ban… all new home routers?! U wot m8?!Supermicro founder was personally sanction-busting Nvidia GPUs into China?! This week’s episode is sponsored by enterprise browser maker, Island. Chief Customer Officer Bradon Rogers joins Pat to explain how its customers are using Island to control the use of personal AI services in regulated industries. This episode is also available on Youtube. Show notes ‘CanisterWorm’ Springs Wiper Attack Targeting IranTeamPCP deploys CanisterWorm on NPM following Trivy compromiseAndrej Karpathy on X: "Software horror: litellm PyPI supply chain" attackCheckmarx KICS GitHub Action Compromised: Malware Injected in All Git TagsFelix Rieseberg on X: "Today, we’re releasing a feature that allows Claude to control your computer"A Top Google Search Result for Claude Plugins Was Planted by HackersLockheed Martin targeted in alleged breach by pro-Iran hacktivistCISA urges companies to secure Microsoft Intune systems after hackers mass-wipe Stryker devicesFBI seems to seize website tied to Iranian cyberattack on StrykerStryker confirms cyberattack is contained and restoration underwayHundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the WildSomeone has publicly leaked an exploit kit that can hack millions of iPhonesRussia-linked hackers use advanced iPhone exploit to target UkrainiansApple rolls out first 'background security' update for iPhones, iPads, and Macs to fix Safari bugPost by @wartranslated.bsky.social — BlueskySignal’s Creator Is Helping Encrypt Meta AIHacker says they compromised millions of confidential police tips held by US company Millions of 'anonymous' crime tips exposed in massive Crime Stoppers hackFeds Disrupt IoT Botnets Behind Huge DDoS Attacks FCC bans import of consumer-grade routers amid national security concernsWhite House pours cold water on cyber ‘letters of marque’ speculationGoogle launches threat disruption unit, stops short of calling it ‘offensive'Supermicro’s cofounder was just arrested for allegedly smuggling $2.5 billion in GPUs to ChinaCyberattack on vehicle breathalyzer company leaves drivers stranded across the USMan pleads guilty to $8 million AI-generated music schemeTwo Israelis AI generated "intelligence" and sold it to Iran
        Más Menos
        1 h y 4 m
      • Risky Business #829 -- Sneaky lobsters: Why AI is the new insider threat
        Mar 18 2026
        On this week’s show, Patrick Gray, Adam Boileau and James WIlson discuss the week’s cybersecurity news. They discuss: Iran’s Intune-based wiper attack on medical device maker StrykerQihoo 360’s AI publishes its own wildcard TLS cert private keyInstagram is canning its end-to-end encrypted messagingWhat’s going on with mobile internet access in Moscow?The Xbox One’s bootloader gets voltage glitched into submissionOh Qualys! We love you! (At least, whoever is in the basement writing these beautiful .txt files…) This week’s episode is sponsored by browser-based detection and response company, Push Security. Researcher Dan Green and Field CTO Mark Orlando join Pat to talk through the InstallFix variant of the *Fix attack technique. This episode is also available on Youtube. Show notes Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped SystemsStryker says it's restoring systems after pro-Iran hackers wiped thousands of employee devices | TechCrunchStryker attack raises concerns about role of device management tool | Cybersecurity DiveStryker tells SEC that timeline for recovery from cyberattack unknown | The Record from Recorded Future NewsHow ‘Handala’ Became the Face of Iran’s Hacker Counterattacks | WIREDU.S Strikes Killed Iranian Cyber Chiefs, But The Hacks ContinuedRisky Business Features: Being a Wartime CISOSupply-chain attack using invisible code hits GitHub and other repositories - Ars TechnicaChina's biggest cybersecurity company, Qihoo 360 just leaked their own wildcard SSL private keyEmergent Cyber Behavior: When AI Agents Become Offensive Threat Actors - IrregularRisky Business Features: MCP is DeadMeasuring AI Agents’ Progress on Multi-Step Cyber Attack ScenariosMeasuring AI Agents' Progress on Multi-Step Cyber Attack ScenariosWhat is end-to-end encryption on Instagram | Instagram Help CenterUS Lawmakers Move to Kill the FBI’s Warrantless Wiretap Access | WIREDWebsite "whitelists" launched in Moscow | Forbes.ruExclusive: Foreign hacker in 2023 compromised Epstein files held by FBI, source and documents show | ReutersFeds say another DigitalMint negotiator ran ransomware attacks and helped extort $75 million | CyberScoopResearchers disclose vulnerabilities in IP KVMs from four manufacturers - Ars TechnicaRE//verse 2026: Hacking the Xbox One by Markus 'doom' Gaasedelen - YouTubeCrackArmor: Multiple vulnerabilities in AppArmor
        Más Menos
        1 h y 4 m