Risky Bulletin

Risky Business Media
undefined
Feb 26, 2026 • 16min

Srsly Risky Biz: Is Claude too woke for war?

A sparring match over an AI assistant's safeguards versus military demands sparks debate about surveillance and lethal autonomous weapons. The trade-offs between value-driven AI and a warrior ethos get unpacked. A persistent Chinese hacking group, Volt Typhoon, is still lurking in critical infrastructure, raising alarms about premature victory claims and the need for sustained private-sector vigilance.
undefined
Feb 25, 2026 • 7min

Risky Bulletin: Russia starts criminal probe of Telegram founder Pavel Durov

Russian authorities opening a criminal investigation into Telegram's founder makes headlines. Teen hackers tied to a South Korean bike-share breach were arrested. Allegations surface that firms scraped and distilled an AI maker's outputs. Major hacks and sanctions ripple through crypto, ISPs, healthcare platforms and exploit brokers.
undefined
Feb 23, 2026 • 27min

Between Two Nerds: How NSA will use AI

A deep look at how elite intelligence services will adopt AI cautiously, favoring stealth and correctness over reckless use. Discussions cover AI-powered espionage trends, task decomposition for intelligence workflows, and which cyber roles are most AI-friendly. They explore AI for continuous monitoring, mapping target networks, speeding coding and malware development, and how AI might complicate attribution.
undefined
Feb 23, 2026 • 6min

Risky Bulletin: AI-driven hacking campaign breaches 600+ Fortinet devices

An AI-assisted campaign used DeepSeek and Claude to compromise 600+ Fortinet firewalls. A VPN product was exploited to gain data center access. Chinese actors stole Italian police officer data. Archive.today was blacklisted after causing DDoS-like traffic. A PayPal loan bug exposed customer data and new malware in NPM packages is stealing credentials.
undefined
Feb 22, 2026 • 25min

Sponsored: The smouldering trashfire of AI and open source

Feross Aboukhadijeh, open-source developer and security expert behind WebTorrent, explains how AI is reshaping open source and swelling dependency webs. He recounts real supply-chain compromises and emergent worm attacks. He also introduces Socket Firewall and a behavior-focused approach to blocking malicious packages at install time.
undefined
13 snips
Feb 20, 2026 • 9min

Risky Bulletin: RPKI infrastructure sits on shaky ground

Researchers found many RPKI backend servers are vulnerable to DNS hijacks and route attacks. A French ministry breach exposed over a million bank records. New UK rules force rapid takedowns of non-consensual explicit images. Click-fix copy-paste attacks now account for about half of malware infections. Several major cyber incidents disrupted hospitals, transport and fintech systems.
undefined
7 snips
Feb 19, 2026 • 20min

Srsly Risky Biz: Cyber bullets can't replace political will

Tom Uren, policy and intelligence editor who analyzes cybersecurity and AI policy. He discusses European debates over building cyber strike capabilities and why political will, not just tools, determines impact. He explains distillation attacks that let rivals clone AI models by querying them and why firms seek government help on chips, compute and export controls.
undefined
8 snips
Feb 18, 2026 • 8min

Risky Bulletin: Supply chain attack plants backdoor on Android tablets

A firmware supply-chain backdoor infecting thousands of Android tablets gets explored. The EU turns off AI features on lawmakers' devices over security and data worries. Reports cover Cellebrite usage against an activist and a Chinese APT exploiting a Dell zero-day. Multiple ransomware, data leak, botnet, and browser zero-day incidents round out the headlines.
undefined
32 snips
Feb 16, 2026 • 28min

Between Two Nerds: Buying the magic weapon

A brisk debate on whether middle powers should build military cyber capabilities. A look at how cyber effects compare to kinetic strikes and when cyber is most useful. Discussion of niche specialization inside alliances and the tradeoffs of using covert tools. Exploration of strategic, non-spectacular cyber impacts on finance, reputation, and regime stability.
undefined
Feb 16, 2026 • 9min

Risky Bulletin: Cambodia promises to dismantle scam compounds by April

Cambodia vows to dismantle cyber scam compounds by April after raids and arrests. CISA pushes the OpenEOX standard amid staffing concerns. Linux, macOS and Windows add post‑quantum signature support. Reports say attribution was softened in an APT report to avoid fallout. A range of breaches, malware botnets and vulnerabilities get spotlighted.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app