Risky Bulletin

Risky Business Media
undefined
Mar 30, 2026 • 7min

Risky Bulletin: Apple adds ClickFix warning to macOS terminal

Apple adds a paste-warning to macOS Terminal to block click-to-execute tricks. A high-profile Gmail breach and a massive EU cloud leak raise fresh data security alarms. A major DeFi platform shuts down after a multimillion-dollar hack. Regulators propose banning non-consensual nudify apps across the EU.
undefined
Mar 29, 2026 • 16min

Sponsored: AI is making old school prevention cool again

Adam Pointon, CEO of Knocknoc, a leader in identity-gated access and just-in-time host protection. He explains how AI is accelerating exploit timelines. He describes hiding services until users authenticate. He outlines deny-by-default controls, limiting exposure, and just-in-time allowances for maintenance.
undefined
Mar 27, 2026 • 7min

Risky Bulletin: Russia to use custom crypto-algorithm for its 5G network

Discussion of Russia mandating a custom NEA7 crypto algorithm for 5G and plans to boost national firewall capacity. Allegations that spyware targeted Hungarian opposition and a large-scale malware infection hit thousands of Luxembourg government phones. Coverage of data-wiping attacks on Israeli firms, a Dutch police phishing breach, and Google's warning about quantum threats to classical encryption.
undefined
Mar 26, 2026 • 21min

Srsly Risky Biz: Why get a warrant when you have Kash?

Tom Uren, policy and intelligence editor who analyzes cybersecurity policy and national security, breaks down the FBI buying Americans’ location data and why commercially sourced tracking raises privacy and oversight concerns. He unpacks FCC moves to restrict foreign-made routers as reshoring politics, not security. He also outlines plans to tap private-sector telemetry for government use.
undefined
Mar 25, 2026 • 7min

Risky Bulletin: The CEO of Intellexa is big mad at Greece

Intellexa’s CEO lashes out at Greek authorities over alleged misuse. New U.S. bureau targets emerging cyber and space threats. FCC moves to ban foreign-made routers for national security. Major hacks and a supply-chain compromise hit governments and dev tools. Google unveils a threat disruption unit. German police woke companies to warn about critical software bugs.
undefined
Mar 23, 2026 • 24min

Between Two Nerds: Its raining iOS exploit kits!

The Grugq, a security researcher known for analyses of threat actor tradecraft, breaks down recent iOS exploit kit sightings. He discusses why top-tier exploits stay hidden. He explains resale and abuse of older tools. He explores geofenced targeting and operator tweaks that add crypto-theft. Practical advice on updating iOS and using Lockdown Mode is also covered.
undefined
Mar 23, 2026 • 7min

Risky Bulletin: Russia's Signal phishing nets thousands of accounts

A deep dive into a mass phishing campaign that linked extra devices to thousands of Signal accounts. A supply-chain sabotage tale where a popular scanner was weaponized to steal credentials and seed an NPM worm. Authorities dismantle massive IoT botnets tied to huge DDoS attacks and seize dark websites. Emergency patches, spyware arrests, and high-profile data breaches round out the briefing.
undefined
Mar 22, 2026 • 11min

Sponsored: What is Extended Identity Access Management?

Fletcher Heisler, founder and CEO of open source identity provider Authentik, explains Extended Identity Access Management (XIAM) and why identity must cover humans, agents, and devices. He discusses stateless, multi‑cloud deployments, risks of proprietary cloud IDPs, and how agentic AI needs identity guardrails. He also touches on consolidation, resiliency, and Authentik’s cautious approach to AI features.
undefined
Mar 20, 2026 • 7min

Risky Bulletin: Second iOS hacking framework found in the wild

A newly discovered iOS hacking framework being used across multiple countries is revealed. Belgium launches a secure government messaging app to replace foreign services. Japan legalises pre-emptive cyber operations with cabinet approval. AWS clamps down on S3 bucketsquatting to stop hijacks. Breathalyser devices and several crypto platforms suffer disruptive cyberattacks.
undefined
7 snips
Mar 19, 2026 • 19min

Srsly Risky Biz: Successful war leaves Iran with one option, its cyber forces

Tom Uren, policy and intelligence editor focused on cyber and platform safety. He explains how a successful war could push Iran to pivot heavily into cyber power. They discuss how Iran might rapidly scale cyber capabilities. They also cover Meta reversing E2EE on Instagram DMs and when encryption helps or harms safety.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app