PodcastsNachrichtenRisky Bulletin

Risky Bulletin

risky.biz
Risky Bulletin
Neueste Episode

289 Episoden

  • Risky Bulletin

    Between Two Nerds: Buying the magic weapon

    16.2.2026 | 28 Min.
    In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether middle powers should be investing in military cyber capabilities.

    This episode is also available on Youtube



    Show notes



    The Record on Iranian air defences


    Max Smeets No Shortcuts


    RunZero sponsor interview
  • Risky Bulletin

    Risky Bulletin: Cambodia promises to dismantle scam compounds by April

    16.2.2026 | 8 Min.
    Cambodia promises to dismantle cyber scam compounds by April, CISA urges companies to adopt the OpenEoX standard, Linux gets post-quantum crypto support, and Palo Alto Networks avoids attributing an APT to China.



    Show notes



    Risky Bulletin: Cambodia promises to dismantle scam networks by April
  • Risky Bulletin

    Sponsored: Filtering the KEV was really hard … Until now!

    15.2.2026 | 23 Min.
    In this sponsored interview Casey Ellis chats to Todd Beardsley, VP of Security at RunZero about Kevology, the company’s analysis of CISA’s KEV list. Kevology lets you easily identify and fix vulnerabilities from the list that are urgent and relevant to you.



    Show notes



    KEVology: An analysis of exploits, scores, & timelines on the CISA KEV
  • Risky Bulletin

    Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI

    13.2.2026 | 7 Min.
    A Malware developer faked his own death to evade the FBI, Apple patches a zero-day used in a targeted attack, the Tianfu Cup quietly returns, and researchers spot the first malicious Outlook add-in.



    Show notes



    Risky Bulletin: IcedID malware developer fakes his own death to escape the FBI
  • Risky Bulletin

    Srsly Risky Biz: Microsoft forgoes its secure future

    12.2.2026 | 19 Min.
    Tom Uren and Amberleigh Jack talk about Microsoft CEO Satya Nadella’s messaging around personnel changes at the top of its security organisation. These signal a focus on selling security products rather than on making secure products.

    They also discuss Expedition Cloud, a Chinese cyber range that replicated the critical infrastructure of neighbouring countries, apparently to develop and fine-tune cyber disruption operations.

    Finally, they talk about what we’ve learnt about the role of cyber operations in the US bombing of Iranian nuclear facilities. It was far bigger than we previously thought.

    This episode is also available on Youtube.



    Show notes

Weitere Nachrichten Podcasts

Über Risky Bulletin

Regular cybersecurity news updates from the Risky Business team...
Podcast-Website

Höre Risky Bulletin, RONZHEIMER. und viele andere Podcasts aus aller Welt mit der radio.at-App

Hol dir die kostenlose radio.at App

  • Sender und Podcasts favorisieren
  • Streamen via Wifi oder Bluetooth
  • Unterstützt Carplay & Android Auto
  • viele weitere App Funktionen
Rechtliches
Social
v8.5.0 | © 2007-2026 radio.de GmbH
Generated: 2/16/2026 - 10:31:39 PM