Risky Business Podcast Por Risky Business Media arte de portada

Risky Business

Risky Business

De: Risky Business Media
Escúchala gratis

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.Copyright Risky Business Media 2007-2026 Política y Gobierno
Episodios
  • Risky Business #831 -- The AI bugpocalypse begins
    Apr 1 2026
    On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover: Those pesky North Koreans shim a backdoor into a 100M-downloads-a-week npm packageTeamPCP appear to have ransacked Cisco’s source and cloud environmentsAI is getting legitimately good at being told to “just go find some 0day in this”Kaspersky says Coruna and Triangulation do share code lineageIranian hackers dump Kash Patel’s gmail spoolOh, and of course there’s a Citrix Netscaler memory leak being exploited in the wild This week’s episode is sponsored by Dropzone AI, who make automated AI SOC analysts. Head honcho Ed Wu explains how they’ve built pre-canned ‘hunt packs’ to lead the AI off into your environment to find weird, interesting and security relevant things. This episode is also available on Youtube. Show notes Google links axios supply chain attack to North Korean group | The Record from Recorded Future NewsCisco source code stolen in Trivy-linked dev environment breachchiefofautism on X: "someone at ANTHROPIC just showed CLAUDE finding ZERO DAY vulnerabilities in a live conference demo"h0mbre on X: "Claude is somehow better at kernel exploitation than creating meal plans."Vulnerability Research Is Cooked — QuarrelsomeMAD Bugs: vim vs emacs vs Claude - CalifMAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)A Risky Biz Experiment: Hunting for iOS 0day with AI - Risky Business MediaSecurity leaders say the next two years are going to be 'insane' | CyberScoopCoruna framework: an exploit kit and ties to Operation Triangulation | SecurelistApple says no one using Lockdown Mode has been hacked with spyware | TechCrunchReverse engineering Apple’s silent security fixes - CalifJury finds Meta's platforms are harmful to children in 1st wave of social media addiction lawsuits | PBS NewsMeta and YouTube found liable in social media addiction trialIranian hackers publish emails allegedly stolen from Kash PatelIran Us War: 'Legitimate targets': Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia - The Times of IndiaDrop Site on X: "IRGC: From now on, for every assassination, an American company will be destroyed"OSINTtechnical on X: "Starlink shutdowns are forcing Russian troops even deeper into Ubiquiti’s ecosystem. "Citrix NetScaler products confirmed to be under exploitation | Cybersecurity DiveCISA tells federal agencies to patch Citrix NetScaler bug by Thursday | The Record from Recorded Future NewsUsing a VPN May Subject You to NSA Spying | WIREDPost reporters called the White House. Their phones showed ‘Epstein Island.’ - The Washington Post
    Más Menos
    1 h
  • How the World Got Owned Episode 2: The 1990s, Part One
    Apr 3 2026

    In this special documentary episode, Patrick Gray and Amberleigh Jack take a look back at hacking throughout the 1990s, from the feel-good vibes of the early hacking communities to the antics of young hackers who wound up on the run from the FBI.

    Part one features recollections from:

    • Jeff Moss (The Dark Tangent), DefCon and Black Hat founder
    • Chris Wysopal (Weld Pond), L0pht member, co-founder, @Stake
    • Kevin Poulsen (Dark Dante), 1990s hacker turned journalist
    • Elias Levy (Aleph One), author of Smashing the Stack for Fun and Profit, Phrack, 1996

    How the World Got Owned is produced in partnership with SentinelOne.

    Show notes
    • Elias Levy (Aleph1), Former Principle Engineer, Google
    • Kevin Poulsen, Journalist
    • Jeff Moss, DefCon founder
    • Chris Wysopal, @Stake founder, L0pht member
    • Hackers testifying at the United States Senate, May 19, 1998
    • Hackers May ‘Net’ Good PR for Studio
    • DefCon Archives | DefCon 1
    • A Not So Terribly Brief History of the Electronic Frontier Foundation
    • Innocent Hackers Want Their Computers Back
    • Breakdowns in Computer Security
    • Unsolved Mysteries, Season 3, Episode 4
    • The Last Hacker: He Called Himself Dark Dante. His Compulsion Led Him to Secret Files and, Eventually, The Bar of Justice
    • Justia appeal summary, Kevin Poulsen, 1994
    • Smashing the Stack for Fun and Profit, Phrack Magazine, November 1996
    • From subversives to CEOs: How radical hackers built today’s cybersecurity industry
    Más Menos
    47 m
  • Soap Box: Red teaming AI systems with SpecterOps
    Mar 27 2026

    In this sponsored Soap Box edition of the show, Patrick Gray and James Wilson talk about red teaming AI systems with Russel Van Tuyl, Vice President of Services at elite penetration testing firm SpecterOps.

    SpecterOps is the company behind attack path enumeration tool Bloodhound and Bloodhound Enterprise, but they’re also a pentest and red teaming shop with world class expertise in popping shells on all sorts of interesting systems in all sorts of interesting places.

    This episode is also available on Youtube.

    Show notes
      Más Menos
      30 m
    Todavía no hay opiniones