Risky Business-logo

Risky Business

Technology Podcasts

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.

Location:

United States

Description:

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.

Language:

English


Episodes
Ask host to enable sharing for playback control

Risky Business #746 – Microsoft takes your security seriously*

5/1/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: This week’s sponsor is Zero Networks, who make a network micro-segmentation product that is actually usable. Zero Networks CEO Benny Lakunishok joins us to talk through why firewalling everything everywhere is finally workable. * You’ll forgive us for being… a tad sceptical. Show notes 'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks | WIRED Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO | TechCrunch Microsoft CEO says security is its No. 1 priority | Cybersecurity Dive TrustedSec | Full Disclosure: A Look at a Recently Patched Microsoft… Vintage Microsoft flaw resurfaces, threat actors attack with golden GooseEgg | Cybersecurity Dive FTC commercial surveillance rules could arrive within months, sources say FCC takes $200 million bite out of wireless carriers for sharing location data | CyberScoop Know-your-customer executive order facing stiff opposition from cloud industry Tech companies must help the fight aganst extremists using encryption: ASIO boss Josh Taylor on X: "Yess, excellent question from @Paul_Karp on why AFP et al aren't using the powers they already have. They say one technical assistance or capability notice has recently been issued. https://t.co/pEXrvjK5Q4" / X (720) IN FULL: ASIO and AFP respond to X chairman Elon Musk, issues social media warnings | ABC News - YouTube China-linked PlugX malware infections found in more than 170 countries Belarus secret service website still down after hackers claim to breach it Man Who Mass-Extorted Psychotherapy Patients Gets Six Years – Krebs on Security Sweden's liquor shelves to run empty this week due to ransomware attack Congress picked a direct fight with ByteDance and TikTok. The privacy implications are less clear. Telegram blocks, then unblocks, chatbots used by Ukraine’s intelligence services Elon Musk’s X takeover crushed Twitter’s profit to just $4804 in Australia Australian court orders Elon Musk’s X to hide Sydney church stabbing posts from users globally | Australia news | The Guardian After the Christchurch attacks, Twitter made a deal with Jacinda Ardern over violent content. Elon Musk changed everything - ABC News World on the Brink: How America Can Beat China in the Race for the Twenty-First Century - Kindle edition by Alperovitch, Dmitri, Graff, Garrett M.. Politics & Social Sciences Kindle eBooks @ Amazon.com.

Duration:01:03:12

Ask host to enable sharing for playback control

Snake Oilers: Push Security, Knocknoc and iVerify

4/29/2024
In this edition of Snake Oilers we’ll be hearing from: Push SecurityKnocknociVerify

Duration:00:42:06

Ask host to enable sharing for playback control

Special Edition: Chris Krebs, Alex Stamos and Patrick Gray

4/23/2024
In this special edition of the Risky Business podcast Patrick Gray chats with former Facebook CSO Alex Stamos and founding CISA director Chris Krebs about sovereignty and technology. China and Russia are doing their level best to yeet American tech from their supply chains – hardware, software and cloud services. They’ll be rebuilding these supply chains – for government systems, at least – from components that they have complete visibility into, and control over. Meanwhile, America’s government faces different supply chain challenges. It has a supply chain that won’t be weaponised against it by its adversaries, but it lacks the same sort of visibility and control that its adversaries will eventually achieve over their supply chains. So where does this leave the west? Where does it leave China and Russia?

Duration:00:45:26

Ask host to enable sharing for playback control

Risky Business #745 – Tales from the PANageddon

4/17/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: This week’s sponsor is Panther, a platform that does detection as code on massive amounts of data. Panther’s founder Jack Naglieri is this week’s sponsor guest, and we spoke with him about some common detection-as-code approaches. Show notes Palo Alto Networks releases fixes for zero-day as attackers swarm VPN vulnerabilityCVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtectRapid7 Technical AnalysisWhy CISA is Warning CISOs About a Breach at Sisense – Krebs on SecurityCongress rails against UnitedHealth Group after ransomware attack | CyberScoopThe US Government Has a Microsoft Problem | WIREDHouse GOP bridges divide to reauthorize FISA surveillance bill - The Washington PostTop officials again push back on ransom payment ban | Cybersecurity DiveEx-White House cyber official says ransomware payment ban is a ways off | CyberScoopOver 500 people targeted by Pegasus spyware in Poland, officials sayApple drops term 'state-sponsored' attacks from its threat notification policy“All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ BypassPuTTY vulnerability vuln-p521-biasSecurity engineer jailed for 3 years for $12M crypto hacks | TechCrunchAlleged cryptojacking scheme consumed $3.5M of stolen computing to make just $1M | Ars TechnicaTwitter’s Clumsy Pivot to X.com Is a Gift to Phishers – Krebs on Security

Duration:00:58:10

Ask host to enable sharing for playback control

Risky Business #744 -- Ransomware upstarts jostle in Lockbit's absence

4/10/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: Proofpoint’s chief strategy officer Ryan Kalember is this week’s sponsor guest. He takes aim at some recent vendor trends, like security companies describing themselves as “platforms”. Show notes CyberCX_Report_DFIR 2023 Year in Review_Online.pdfRansomlook StatsVlad Styran 🇺🇦 on X: ".@riskybusiness has noted recently that there is an “orthodox Easter”-like low season in the ransomware village. Although my sources do not support this assessment, if true, there might be a simple explanation https://t.co/kM8lu6KbyY" / XPrice of zero-day exploits rises as companies harden products against hackers | TechCrunchMandiant spots advanced exploit activity in Ivanti devices | Cybersecurity DivePricing - KnocknocALPHV steps up laundering of Change Healthcare ransom payments | CyberScoopExtortion group threatens to sell Change Healthcare data | CyberScoopAttempted hack on NYC continues wave of cyberattacks against municipal governmentsMissouri county declares state of emergency amid suspected ransomware attack | Ars TechnicaMedusa cybercrime gang takes credit for another attack on US municipalityOmni Hotels & Resorts hit by cyberattack | Cybersecurity DiveTargus says cyberattack is causing operational outage | TechCrunchGerman database company Genios confirms ransomware attackResearchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses‘An attack on the reputation of Palau’: officials question who was really behind ransomware incident'They’re lying': Palau denies claims by ransomware gang over recent cyberattackUkrainian security service’s cyber chief suspended following media investigationRussia seeks criminal charges against executives at flight booking service accused of failing to protect consumer dataHouse hurtles toward showdown over expiring surveillance tools | CyberScoopD-Link tells customers to sunset actively exploited storage devices | Cybersecurity DiveA Vigilante Hacker Took Down North Korea’s Internet. Now He’s Taking Off His Mask | WIREDAhoi AttacksLinux Kernel Patched For Branch History Injection "BHI" Intel CPU Vulnerability - PhoronixRansomware gang’s new extortion trick? Calling the front desk | TechCrunchEvolving Threat Landscape: A Deep Dive into Multichannel Attacks Targeting Retailers | Proofpoint US

Duration:01:04:19

Ask host to enable sharing for playback control

Snake Oilers: Kodex, ClearVector and Censys

4/5/2024
In this edition of Snake Oilers you’ll hear pitches from three companies: KodexClearVectorCensys

Duration:00:42:02

Ask host to enable sharing for playback control

Risky Business #743 -- A chat about the xz backdoor with the guy who found it

4/3/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: We have a special guest in this week’s show, Andres Freund, the Postgres developer who discovered the backdoor in the xz Linux compression library. This week’s show is brought to you by Island, a company that makes a security-focussed enterprise browser. Island’s Bradon Rogers is this week’s sponsor guest and he’ll be joining us to talk about how people are swapping out their Virtual Desktop Infrastructure for enterprise-focussed browsers like theirs. Show notes Risky Biz News: Supply chain attack in Linuxlandoss-security - Re: backdoor in upstream xz/liblzma leading to ssh server compromiseAndres Freund (Tech) on X: "@binitamshah FWIW, I didn't actually start looking due to the 500ms - I started looking when I saw failing ssh logins (by the usual automated attempts trying random user/password combinations) using a substantial amount of CPU. Only after that I noticed the slower logins." / XAndres Freund (Tech) on X: "@riskybusiness Absurdly enough, I was listening to the episode on a cooking break while writing the xz issue up. Couldn't make it up." / XGitHub - amlweems/xzbot: notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)research!rsc: The xz attack shell scriptDHS report rips Microsoft for ‘cascade’ of errors in China hack - The Washington PostReview of the Summer 2023 Microsoft Exchange Online IntrusionRussian researchers say espionage operation using WinRAR bug is linked to UkraineRecent ‘MFA Bombing’ Attacks Targeting Apple Users – Krebs on SecurityRansomware gang leaks stolen Scottish healthcare patient data in extortion bidRoss Anderson, professor and famed author of ‘Security Engineering,’ passes away

Duration:00:57:40

Ask host to enable sharing for playback control

Risky Business #742 -- China bans AMD and Intel, pivots to Linux on the desktop

3/27/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: This week’s show is brought to you by Thinkst Canary. Its founder Haroon Meer joins this week’s show to make a passionate case that security vendors don’t all have to go for explosive growth. Slow and steady with a focus on excellent and relevant products will win the race, he says. Show notes Justice Department indicts 7 accused in 14-year hack campaign by Chinese govParliament network breached in China-led cyberattack, Judith Collins revealsChina blocks use of Intel and AMD chips in government computersAnnouncement of Safety and Reliability Evaluation Results (No. 1, 2023)Unpatchable vulnerability in Apple chip leaks secret encryption keys | Ars TechnicaHow Ukraine is using mobile phones on 6ft poles to stop dronesRussian military intelligence may have deployed wiper against multiple Ukrainian ISPs | CyberScoopUS penalizes Russian fintech firms that helped others evade sanctionsUN probing 58 alleged crypto heists by North Korea worth $3 billionDetained execs, a bold escape, and tax evasion charges: Nigeria takes aim at BinanceThe DOJ Puts Apple's iMessage Encryption in the Antitrust Crosshairs | WIREDMark Zuckerberg told Facebook execs to 'figure out' how to track encrypted usage on rival apps like Snap and YouTube, unsealed documents show‘Far-reaching’ hack stole information from Python developersZenHammer: Rowhammer Attacks on AMD Zen-based PlatformsOne Man’s Army of Streaming Bots Reveals a Whole Industry’s ProblemApex Legends hacker said he hacked tournament games ‘for fun’ | TechCrunch

Duration:01:05:05

Ask host to enable sharing for playback control

Risky Biz Soap Box: Why Azure vulns should get CVEs

3/22/2024
In this Soap Box edition of the podcast Patrick Gray talks to Nucleus Security co-founder Scott Kuffer about whether or not cloud service vulnerabilities should get CVEs, what on earth is happening with NIST’s National Vulnerability Database (NVD) and more.

Duration:00:33:42

Ask host to enable sharing for playback control

Risky Business #741 -- The Mintlify breach and modern supply chains

3/20/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: This week’s show is brought to you by Material Security. In this week’s sponsor interview we speak with Material’s Rajan Kapoor, VP of Customer Experience at Material. We’re also joined by Chaim Sanders, who heads Security and Privacy at Lyft. Show notes Anthropic’s CISO drinks the AI kool aid - backpedals frantically on security analysis claim Incident report on March 13, 2024 - Mintlify Loop DoS: New Denial-of-Service attack targets application-layer protocols State of IP Spoofing Pharmaceutical development company investigating cyberattack after LockBit posting Exclusive: After LockBit’s takedown, its purported leader vows to hack on Russian-Canadian hacker sentenced for global ransomware scheme to be extradited | CTV News A Suspicious Pattern Alarming the Ukrainian Military - The Atlantic Exclusive: Musk's SpaceX is building spy satellite network for US intelligence agency, sources say | Reuters Elon Musk’s SpaceX Forges Closer Ties With U.S. Spy and Military Agencies - WSJ Russians will no longer be able to access Microsoft cloud services, business intelligence tools Rostelecom blocks the SIP protocol for clients of Russian hosters / Sudo Null IT News Researchers spot updated version of malware that hit Viasat | CyberScoop Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US) PRC State-Sponsored Cyber Activity: Actions for Critical Infrastructure Leaders | CISA US is still chasing down pieces of Chinese hacking operation, NSA official says 875 workers rescued in Tarlac POGO raid | Philippine News Agency Fujitsu says it found malware on its corporate network, warns of possible data breach | Ars Technica Mike Lindell must pay a Nevada man after election data dispute - The Washington Post

Duration:00:52:58

Ask host to enable sharing for playback control

Risky Business #740 -- Midnight Blizzard's Microsoft hack isn't over

3/13/2024
On this week’s show Patrick and Adam discuss the week’s security news, including: This week’s feature guest is John P Carlin. He was principal associate deputy attorney general under Deputy Attorney General Lisa Monaco for about 18 months in 2021 and 2022, and also served as Robert Mueller’s chief of staff when he was FBI director. John is joining us this week to talk about all things SEC. He wrote the recent Amicus Brief that says the SEC needs to be careful in its action against Solarwinds. He’ll also be talking to us more generally about these new SEC disclosure requirements, which are in full swing. Rad founder Jimmy Mesta will along in this week’s sponsor segment to talk about some really interesting work they’ve done in baselining cloud workloads. It’s the sort of thing that sounds simple that really, really isn’t. Show notes Risky Biz News: The aftermath of Microsoft's SVR hack is rearing its ugly headSwindled Blackcat affiliate wants money from Change Healthcare ransom - Blog | Menlo SecurityBlackCat Ransomware Group Implodes After Apparent $22M Payment by Change Healthcare – Krebs on SecurityChange Healthcare systems expected to come back online in mid-March | Cybersecurity DiveLockBit takes credit for February shutdown of South African pension fundRansomware gang claims to have made $3.4 million after attacking children’s hospitalJason D. Clinton on X: "Fully automated vulnerability research is changing the cybersecurity landscape Claude 3 Opus is capable of reading source code and identifying complex security vulnerabilities used by APTs. But scaling is still a challenge. Demo: https://t.co/UfLNGdkLp8 This is beginner-level… https://t.co/mMQb2vYln1" / XJason Koebler on X: "Hackers are hacking doctors, then using their digital prescription portals to "legitimately" prescribe themselves & their customers adderall, oxy, and other prescription drugs https://t.co/6elTKQnXSB" / XHow Hackers Dox Doctors to Order Mountains of Oxy and AdderallCISA forced to take two systems offline last month after Ivanti compromiseVMware sandbox escape bugs are so critical, patches are released for end-of-life products | Ars TechnicaA Close Up Look at the Consumer Data Broker Radaris – Krebs on SecurityBrief of Amici Curiae Former Government OfficialsSecurities and Exchange Commission v Solarwinds Corp

Duration:01:04:13

Ask host to enable sharing for playback control

Risky Business #739 -- ALPHV exit scams while Change Healthcare burns

3/6/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: In this week’s sponsor interview Patrick Gray speaks to Karl McGuinness, Okta’s chief architect, about some new security improvements they’ve built into their IDP. Show notes U.S. Air Force employee charged with giving classified information to woman he met on dating siteRansomware attack on U.S. health care payment processor ‘most serious incident of its kind’AlphV’s hit on Change Healthcare strikes a sour note for defenders | Cybersecurity DiveOffice of Public Affairs | Justice Department Disrupts Prolific ALPHV/Blackcat Ransomware Variant | United States Department of JusticeDeveloping: AlphV allegedly scammed Change Healthcare and its own affiliate (1)Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment | WIREDCiaran Martin on X: "“We have to find a way of making a ransom ban work” - me for @thetimes US launches antitrust investigation into UnitedHealth, WSJ reports | ReutersBrett Callow on X: "#Lockbit has de-listed Fulton County. Predator spyware endures even after widespread exposure, analysis shows | CyberScoopPredator spyware infrastructure taken down after exposure | CyberScoopU.S. bans maker of spyware that targeted a senator's phoneSpyware maker NSO Group ordered to turn over Pegasus code in WhatsApp caseWhatsapp Inc vs NSO GroupRussia’s chief propagandist leaks intercepted German military Webex conversationThe White House's Oddly Specific, and Really Quite Good, Software Engineering AdviceA leaky database spilled 2FA codes for the world’s tech giants | TechCrunchIn ConnectWise attacks, Play and LockBit ransomware exploits developed quickly | Cybersecurity DiveHow to Secure the SaaS Apps of the Future | Okta Security

Duration:00:59:24

Ask host to enable sharing for playback control

Risky Business #738 -- LockBit is down but not out. Yet.

2/28/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: Dmitri Alperovitch also joins the show to discuss Starlink, Starshield and a row with Congress about its availability in Taiwan. In this week’s sponsor interview, Airlock Digital’s Daniel Schell talks about his adventures with WDAC, and Dave Cottingham predicts Windows 12 will go all in on signed code. Show notes LockBit group revives operations after takedown | Cybersecurity DiveLockbit ransomware group administrative staff have released a lengthy response to the FBI and bystandersFBI’s LockBit Takedown Postponed a Ticking Time Bomb in Fulton County, Ga. – Krebs on SecurityRussia detains hacker behind Australia’s Medibank attackRussia arrests three alleged SugarLocker ransomware membersChange Healthcare incident drags on as report pins it on ransomware groupRansomware Groups Are Bouncing Back Faster From Law Enforcement Busts‘Alarming’ cyberattack hits Canada’s federal police, criminal investigation launchedConnectWise ScreenConnect faces new attacks involving LockBit ransomware | Cybersecurity DiveMicrosoft rolls out expanded logging six months after Chinese breach | CyberScoopSandvine added to US Entity ListEarth Lusca Uses Geopolitical Lure to Target Taiwan Before ElectionsFACT SHEET: ONCD Report Calls for Adoption of Memory Safe Programming Languages and Addressing the Hard Research Problem of Software MeasurabilityRisky Biz News: Backdoor code found in Tornado CashHouse China committee demands Elon Musk open SpaceX Starshield internet to U.S. troops in TaiwanThe UK Is GPS-Tagging Thousands of Migrants | WIREDHow the Pentagon Learned to Use Targeted Ads to Find Its Targets—and Vladimir Putin | WIREDNew Biden order would stem flow of Americans’ sensitive data to China - The Washington Post

Duration:00:55:26

Ask host to enable sharing for playback control

Risky Business #737 -- LockBit gets absolutely rekt

2/21/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: In this week’s sponsor interview Devicie’s Tom Plant joins the show to talk about problems orgs run into when it comes to Windows policies. There’s an expectation out there that Windows policies are set and forget, but sadly, this is not so. Show notes Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates – Krebs on Security Law enforcement disrupt world’s biggest ransomware operation Shanghai Anxun’s information is unreliable and is a trap for national government agencies. China spy agency renews foreign cyber intelligence warning after data breaches US Justice Department says it disrupted Russian intelligence hacking network | Reuters Several Ukrainian media outlets attacked by Russian hackers Polish PM says previous ruling party used Pegasus spyware against ‘very long’ list of victims Hackers are targeting Asian bank accounts using stolen facial recognition data Signal Finally Rolls Out Usernames, So You Can Keep Your Phone Number Private | WIRED Code injection or backdoor: A new look at Ivanti’s CVE-2021-44529 “the "AB" trigger has similar vibes to the Unreal IRCd and ProFTPD backdoors of the same timeframe.” FLATLINED: ANALYZING PULSE SECURE FIRMWARE AND BYPASSING INTEGRITY CHECKING CVSS 10 RCE in Screen Connect National Security Agency Announces Retirement of Cybersecurity Director Hunting M365 Invaders: Navigating the Shadows of Midnight Blizzard

Duration:00:05:37

Ask host to enable sharing for playback control

Soap Box: A deep dive on how Russia's SVR is hacking Microsoft 365 tenants

2/19/2024
The need to properly secure Entra ID tenants has been made pretty obvious this year thanks to a large-scale attack on them by Russia’s SVR intelligence agency. In this interview Andy Robbins from SpecterOps, the maker of Bloodhound Enterprise, talks through how he thinks those attacks actually went down, about how if you’re an o365 customer you’re using Entra ID whether you like it or not, and about how you can lock down your Entra ID tenant.

Duration:00:39:43

Ask host to enable sharing for playback control

Risky Business #736 -- Azure misconfigurations are 2024's looming threat

2/14/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: In this week’s sponsor interview Feross Aboukhadijeh from Socket joins the show to talk about the sheer volume of malicious packages being committed to code repositories and why older SCA tools aren’t well equipped to deal with them. Show notes Microsoft Azure customers hit by phishing, account takeover attacks | Cybersecurity DiveIvanti publishes urgent warning about new vulnerabilityHow is Pulse Secure FormedAttackers hit more networking gear, this time a critical Fortinet CVE | Cybersecurity DiveEnd Of General Availability of the free vSphere Hypervisor (ESXi 7.x and 8.x) (2107518)Coker: ONCD is studying ‘liability regimes’ for software flawsChinese hackers spent 5 years in US infrastructure, ready to attackCISA, FBI warn of China-linked hackers pre-positioning for ‘destructive cyberattacks against US critical infrastructure’Russia using StarlinkCanada declares Flipper Zero public enemy No. 1 in car-theft crackdown | Ars TechnicaHealth insurance data breach affects nearly half of France’s population, privacy regulator warnsHackers attack 25 Romanian hospitalsCatalin on the Rhysider ransomware decrypter going publicA password manager LastPass calls “fraudulent” booted from App Store | Ars TechnicaFrom Cybercrime Saul Goodman to the Russian GRU – Krebs on Security

Duration:00:53:15

Ask host to enable sharing for playback control

Soap Box: How to dismantle Volt Typhoon-style relay networks

2/12/2024
In this Soap Box interview Greynoise founder and absolute legend Andrew Morris joins the show to talk about: It truly is a great conversation, we hope you enjoy it!

Duration:00:37:35

Ask host to enable sharing for playback control

Risky Business #735 -- AnyDesk fails the transparency test

2/7/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: This week’s feature guest is Eric Goldstein, the executive assistant director for cybersecurity at CISA. He’s joining the show to talk about CISA’s demand that US government agencies unplug their Ivanti appliances. He also chimes in on why the US government is so rattled by Volt Typhoon and addresses a recent report from Politico that claims CISA’s Joint Cyber Defense Collaborative is a bit of a shambles. This week’s sponsor guest is Dan Guido from Trail of Bits. He joins us to talk about their new Testing Handbook. Trail of Bits does a bunch of audit work and they’ve committed to trying to make bug discovery a one time thing – if you find that bug once, you shouldn’t have to manually find it on another client engagement. Semgrep for the win! Show notes AnyDesk initiates extensive credentials reset following cyberattack | Cybersecurity DiveAnyDesk says software ‘safe to use’ after cyberattackFormer CIA officer who gave WikiLeaks state secrets gets 40-year sentenceArrests in $400M SIM-Swap Tied to Heist at FTX? – Krebs on SecurityMicrosoft Breach — What Happened? What Should Azure Admins Do? | by Andy Robbins | Feb, 2024 | Posts By SpecterOps Team MembersCloudflare hit by follow-on attack from previous Okta breach | Cybersecurity DiveThanksgiving 2023 security incidentUS announces visa restriction policy targeting spyware abusesAnnouncement of a Visa Restriction Policy to Promote Accountability for the Misuse of Commercial Spyware - United States Department of StateDeputy Prime Minister hosts first global conference targeting ‘hackers for hire’ and malicious use of commercial cyber tools - GOV.UKNew Google TAG report: How Commercial Surveillance Vendors workA Startup Allegedly ‘Hacked the World.’ Then Came the Censorship—and Now the Backlash | WIREDAmerican businessman settles hacking case in UK against law firmCrime bosses behind Myanmar cyber ‘fraud dens’ handed over to Chinese governmentAnother Chicago hospital announces cyberattackDeepfake scammer walks off with $25 million in first-of-its-kind AI heist | Ars TechnicaAs if 2 Ivanti vulnerabilities under exploit weren’t bad enough, now there are 3 | Ars TechnicaTwo new Ivanti bugs discovered as CISA warns of hackers bypassing mitigationsAgencies using vulnerable Ivanti products have until Saturday to disconnect them | Ars TechnicaThe far right is scaring away Washington's private hacker army - POLITICOOur thoughts on AIxCC’s competition format | Trail of Bits BlogHow CISA can improve OSS security | Trail of Bits BlogSecuring open-source infrastructure with OSTIF | Trail of Bits BlogAnnouncing the Trail of Bits Testing Handbook | Trail of Bits Blog30 new Semgrep rules: Ansible, Java, Kotlin, shell scripts, and more | Trail of Bits BlogPublishing Trail of Bits’ CodeQL queries | Trail of Bits BlogThe Unguarded Moment (2002 Digital Remaster) - YouTubeBoy Swallows Universe | Official Trailer | Netflix - YouTube

Duration:01:02:25

Ask host to enable sharing for playback control

Risky Business #734 -- The number of hacked Microsoft 365 customers is skyrocketing

1/31/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. They talk about: This week’s feature guest is Australia’s assistant foreign minister (and cybersecurity tragic) Tim Watts. He joins us to talk about why the Australian government sanctioned Aleksandr Ermakob. Sublime Security founder and CEO Josh Kamdjou is this week’s sponsor guest. He joins us to talk about combating QR-code phishing. Show notes Exclusive: US disabled Chinese hacking network targeting critical infrastructure | ReutersMedibank’s Attacker: IT Businessman, Claimed Psychologist… | Intel471Who is Alleged Medibank Hacker Aleksandr Ermakov? – Krebs on SecurityFla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider – Krebs on SecurityMicrosoft says Russian hackers also targeted other organizations | TechCrunchHPE hit by a monthslong cyberattack on its cloud-based email | Cybersecurity Dive(99+) Microsoft's Dangerous Addiction To Security Revenue | LinkedInMicrosoft critics accuse the firm of ‘negligence’ in latest breach | CyberScoopN.S.A. Buys Americans’ Internet Data Without Warrants, Letter Says - The New York TimesTrading platform EquiLend down following cyberattack | Cybersecurity DiveIvanti Connect Secure zero-day patches delayed | Cybersecurity DivePopular CI/CD tool Jenkins discloses critical CVE | Cybersecurity DiveMOVEit liabilities mount for Progress Software | Cybersecurity DiveTim Watts bio:Pennywise - Down Under [Men at Work Cover] - YouTube

Duration:01:02:27

Ask host to enable sharing for playback control

Risky Business #733 -- Say cheese, motherf---er

1/24/2024
In this week’s show Patrick Gray and Adam Boileau discuss the week’s security news. DHS undersecretary for policy and Cyber Safety Review Board head Rob Silvers is this week’s feature guest. He joins the show to talk about how the CSRB handles possible conflicts of interests from board members with industry day jobs. In this week’s sponsor interview Resourcely’s founder Travis McPeak talks about why we need to help developers with “paved roads” instead of relying on dashboard products to tell us when things have gone wrong. Show notes Microsoft network breached through password-spraying by Russia-state hackers | Ars TechnicaMicrosoft Actions Following Attack by Nation State Actor Midnight Blizzard | MSRC Blog | Microsoft Security Response CenterMedibank cyber attack: The weakness that saw Medibank hacker Aleksandr Ermakov exposed | ExclusiveRussian man identified as Medibank hacker, hit with sanctions by Australian government - ABC NewsMiddle District of Florida | Palm Coast Man Arrested For Wire Fraud And Aggravated Identity Theft Charges | United States Department of JusticeSEC.gov | SECGov X AccountOwner of BreachedForums sentenced to time served plus 20 years supervised release with special conditionsCISA issues emergency directive for federal agencies to mitigate Ivanti vulnerabilities | Cybersecurity DiveIvanti Connect Secure exploitation accelerates as Moody’s calls impact credit negative | Cybersecurity DiveProgress Software shakes off MOVEit’s financial consequences, maintains customers | Cybersecurity DiveCyberattack on Ukraine’s largest telecom provider will cost it about $100 millionRansomware attacks leave small business owners feeling suicidal, report saysCanadian Man Stuck in Triangle of E-Commerce Fraud – Krebs on SecurityExperts call for US Cyber Safety Review Board rethink • The Register

Duration:01:02:55