Risky Business

Risky Business Media
undefined
Apr 3, 2026 • 47min

How the World Got Owned Episode 2: The 1990s, Part One

Kevin Poulsen, once a notorious 1990s phone phreaker turned security journalist. Jeff Moss, founder of DEF CON and Black Hat who shaped hacker gatherings. They reminisce about the 1990s hacking golden age. Stories cover early DIY culture, physical break‑ins and radio contest schemes. Conversations trace DEF CON’s accidental birth and how curiosity turned into crime and later careers.
undefined
11 snips
Apr 1, 2026 • 60min

Risky Business #831 -- The AI bugpocalypse begins

Ed Wu, founder of Dropzone and builder of an AI SOC platform. He discusses Dropzone’s automated AI analysts and prebuilt 'huntpacks'. Conversation covers AI-driven threat hunting, how automation surfaces weird and security-relevant artifacts, and using models to accelerate vulnerability discovery.
undefined
21 snips
Mar 27, 2026 • 30min

Soap Box: Red teaming AI systems with SpecterOps

Russel Van Tuyl, VP of Services at SpecterOps and red teaming expert behind BloodHound, discusses AI red teaming and testing whole systems. He covers chatbots, RAG integrations, prompt injection risks, non-determinism and logging, explosion of machine identities, AI agents breaking least privilege, and using attack-path tooling across hybrid stacks.
undefined
34 snips
Mar 25, 2026 • 1h 4min

Risky Business #830 -- LiteLLM and security scanner supply chains compromised

Braden Rogers, Chief Customer Officer at Island, helps companies govern employee use of AI while preventing data leaks. He discusses browser-based DLP, tenancy challenges with AI providers, and routing the right model to the right user. Short, sharp takes on preventing sensitive data from being pasted into chatbots and balancing executive access with data safety.
undefined
38 snips
Mar 18, 2026 • 1h 4min

Risky Business #829 -- Sneaky lobsters: Why AI is the new insider threat

A fast-paced dive into recent cyber attacks, from an Intune-based wiper hitting medical device firm systems to supply-chain tricks using invisible Unicode payloads. They unpack a vendor accidentally leaking a wildcard SSL key and debate AI agents acting like insider threats. Other highlights include Instagram dropping E2EE DMs, Moscow’s mobile internet controls, and wild hardware hacks on consoles and forensic tools.
undefined
11 snips
Mar 12, 2026 • 27min

Risky Biz Soap Box: It took a decade, but allowlisting is cool again

Daniel Schell, Airlock Digital co-founder and CTO, builds deep endpoint controls. David Cottingham, co-founder and chief product officer, drives deny-by-default execution control. They discuss AI's role in allowlisting and why deterministic, customer-scoped automation beats LLMs for recommendations. They cover autotrust, assembly reflection, hardening UIs, and making allowlisting operationally practical.
undefined
80 snips
Mar 11, 2026 • 1h 2min

Risky Business #828 -- The Coruna exploits are truly exquisite

Toni de la Fuente, founder and CEO of Prowler, a cloud security scanner creator. He discusses Prowler’s enterprise features while keeping it open source. Conversation touches on the Karuna iOS exploit toolkit and its clever JS-to-payload chaining. They also cover exploit signing bypasses and the role of unusual tool choices and LLMs in modern malware development.
undefined
30 snips
Mar 4, 2026 • 1h 1min

Risky Business #827 -- Iranian cyber threat actors are down but not out

Sydney Maroney, Head of threat hunting at Nebulock and creator of an open-source Agentic Threat Hunting Framework, discusses AI-driven threat hunting and her framework. She covers agent design, session memory and documentation. She explains how AI speeds hunts while stressing verification and shows where to find the framework on GitHub.
undefined
55 snips
Feb 25, 2026 • 1h 6min

Risky Business #826 -- A week of AI mishaps and skulduggery

Brian Dye, CEO of Corelight, explains network detection and AI for defenders. James Wilson, security analyst, provides technical context on AI risks. Adam Boileau, security practitioner, gives hands-on analysis of incidents and tooling. They cover AI-augmented mass Fortinet compromises, model distillation accusations, AI agents causing outages and mailbox deletions, exploit-selling prosecutions, and legacy-product breaches.
undefined
67 snips
Feb 19, 2026 • 38min

Risky Biz Soap Box: The lethal trifecta of AI risks

Josh Devon, co-founder of Sondera and cybersecurity builder, explains the “lethal trifecta” of AI risks. He talks about private data exposure, untrusted content, and agents communicating externally. Short, punchy takes on behavioral controls, policy-as-code harnesses, adversarial testing, and deploying protections across enterprise environments.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app