Risky Bulletin

Risky Business Media
undefined
16 snips
Mar 9, 2026 • 26min

Between Two Nerds: An internet blackout won't stop NSA in Iran

A brisk look at why cutting internet access in Iran may not stop foreign cyber operations. They compare shutdown capabilities across countries and how attackers adapt with contingency access. Cold War spying tech and Starlink contingencies get discussed. The segment weighs intelligence collection priorities versus disruptive effects during network outages.
undefined
15 snips
Mar 9, 2026 • 9min

Risky Bulletin: New White House EO prioritizes fight against scams and cybercrime

Federal agencies ordered to crack down on scams, ransomware and sextortion. A new US cyber strategy prioritizes deregulation, federal modernization and offensive partnerships. Suspected state-backed actors breached an FBI wiretap network. A major Romanian meat exporter went insolvent after a ransomware hit. AI agents and new malware tactics are changing attacker behavior.
undefined
5 snips
Mar 8, 2026 • 15min

Sponsored: What it means to be a learning organisation

Marco Slaviero, CTO of Thinkst, leads technical research and product work. He discusses Thinkst Labs and how it fosters learning and researcher development. He describes Thinkscapes, AI and tooling projects, and how labs build POCs to shape product decisions. He previews new deception token types and approaches to scaling fake credentials for detection.
undefined
Mar 6, 2026 • 7min

Risky Bulletin: Iranian hackers are scanning for security cameras to aid missile strikes

Iranian actors scanning security cameras and other IoT gear to help missile targeting. A reported Israeli strike on Iran’s cyber and electronic warfare facilities. Global takedowns of LeakBase and a phishing-as-a-service network that abused 2FA. Widespread malware shifts into malicious ads and rising ransomware activity. Debates over encrypted messaging policies on major social platforms.
undefined
14 snips
Mar 5, 2026 • 21min

Srsly Risky Biz: The four hour cyber war on Iran

Tom Uren, policy and intelligence editor known for sharp analysis of cyber operations, breaks down how fleeting cyber effects shaped the early US-Israeli strikes on Iran. He describes use of city surveillance and mobile manipulation for pattern-of-life targeting. He also explores AI speeding and scaling phishing and targeted campaigns, and how rapid cyber success can force defensive shutdowns.
undefined
Mar 3, 2026 • 7min

Risky Bulletin: Cyber Command conducted cyberattacks ahead of Iran strikes

Reports on US cyber strikes that targeted Iranian defenses before kinetic attacks. Discussion of Russia's push to split from the global internet by 2028. Coverage of a new iOS exploit kit called Karuna and active Android zero-day fixes. Notes on Chrome moving to a two-week release cycle and government use of ad-bidding location data for tracking.
undefined
9 snips
Mar 2, 2026 • 28min

Between Two Nerds: The evolution of cyber ops in Ukraine

A deep dive into how cyber operations in Ukraine have shifted from loud, destructive stunts to stealthy espionage. Discussion of cyber's role in mapping infrastructure and guiding missile strikes. Exploration of how cyber intelligence integrates with conventional forces and shapes strategic narratives. Talk about hacktivist access, media timing, and cyber’s maturation across tactical, operational, and strategic levels.
undefined
Mar 2, 2026 • 9min

Risky Bulletin: LLMs can deanonymize internet users based on their comments

Researchers built language models that can link pseudonymous comments to real identities. A major French health data breach exposed 15 million patient records. Google dismantled a large ad-fraud botnet and removed hundreds of malicious apps. Tensions over US cyber leadership and policy moves for NATO-classified use of consumer devices are also discussed.
undefined
Mar 1, 2026 • 15min

Sponsored: AI Agents need distinct identities

Harish Peri, SVP and GM for AI security at Okta, leads identity and access strategy for AI agents in enterprises. He discusses how agentic systems force firms to relearn identity basics. He highlights the need for distinct agent identities, fine-grained authorization, token theft risks, and challenges from ephemeral agent swarms and agent-to-agent calls.
undefined
4 snips
Feb 27, 2026 • 9min

Risky Bulletin: Russian man extorts Conti ransomware group

A Russian man accused of extorting a major ransomware crew is discussed. Google dismantled a Chinese cyber-espionage infrastructure targeting telcos and governments. A longstanding Cisco zero-day used in the wild for years is revealed. Massive data thefts and spyware convictions in Europe also make the list.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app