• Get the App
  • Moon FM - The Ultimate Podcast App
  • Get the App
Risky Business

Risky Business

Risky.biz

Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.

  • 1 hour 5 minutes
    Risky Business #837 -- GitHub Actions footgun claims TanStack

    On this week’s show Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news.

    They cover:

    • Mini Shai-Hulud and the TanStack compromise using Github Actions
    • Instructure pays Canvas elearning platform data extortionists
    • More Linux privilege escalation 0days!
    • CISA helping critical infrastructure operators rearchitect their networks so they work offline

    This week’s episode is sponsored by email security platform Sublime Security. Bobby Filar chats with Patrick about how agentic AI is being evaluated by buyers in a marketplace that’s experiencing “AI fatigue”.

    This episode is also available on Youtube.

    Show notes

    • ‘Mini Shai-Hulud’ malware compromises hundreds of open-source packages in sprawling supply-chain attack | CyberScoop
    • Hardening TanStack After the npm Compromise | TanStack Blog
    • Canvas Breach Disrupts Schools & Colleges Nationwide – Krebs on Security
    • Instructure pays ransom after Canvas incident as Congress announces investigation | The Record from Recorded Future News
    • When DNSSEC goes wrong: how we responded to the .de TLD outage
    • Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access | Google Cloud Blog
    • Mythos smythos! How to find 0day with lesser models - Risky Business Media
    • GitHub - V4bel/dirtyfrag · GitHub
    • retr0.zip
    • NVD - CVE-2026-42511
    • Flaw in Claude’s Chrome extension allowed ‘any’ other plugin to hijack victims’ AI | CyberScoop
    • Ivanti customers confront yet another actively exploited zero-day | CyberScoop
    • Palo Alto warns of critical software bug used in firewall attacks | The Record from Recorded Future News
    • Where Have All the Complex Windows Malware and Their Analyses Gone?
    • Meet Rassvet, Russia’s Answer to Starlink | WIRED
    • DOJ says ransomware gang tapped into Russian government databases | TechCrunch
    • Iranian government hackers using Chaos ransomware as cover, researchers say | The Record from Recorded Future News
    • Foxconn confirms cyberattack impacting North American factories | The Record from Recorded Future News
    • New CISA initiative aims for critical infrastructure to operate offline during cyberattacks | The Record from Recorded Future News
    • ‘HELLO BOSS’: Inside the Chinese Realtime Deepfake Software Powering Scams Around the World
    • How to Disable Google's Gemini in Chrome | WIRED
    • FCC pushes ban on security updates for foreign-made routers, drones to 2029 | The Record from Recorded Future News
    13 May 2026, 5:08 am
  • 1 hour 1 minute
    Risky Business #836 -- You can't patch the bugpocalypse

    On this week’s show, Patrick Gray and James Wilson are joined by special guest co-host Brad Arkin. They discuss the week’s cybersecurity news, including:

    • The US Government says we just have to patch faster, but…
    • Bugs in cPanel, MoveIt and all Linux distributions this week show that patching alone isn’t enough
    • James gets mad about lame AI Agent adoption advice from the US and Australian Governments
    • James Kettle and Niels Provos both showed us that any model can find 0day like Mythos
    • And the cyber-assisted theft of cargo results in an astonishing loss of $725 million dollars

    This week’s show is sponsored by SpecterOps. Their CTO, Jared Atkinson, chats to Pat about the big changes in the threat landscape, brought about by AI, that are causing a pivot away from detection and remediation, and toward prevention.

    This episode is also available on Youtube.

    Show notes

    • Exclusive: US officials weigh cutting deadlines to fix digital flaws amid worries over AI-powered hacking, sources say | Reuters
    • British cyber agency warns of looming ‘patch wave’ as AI speeds flaw discovery | The Record from Recorded Future News
    • Federal agencies must patch cPanel bug by Sunday, CISA says | The Record from Recorded Future News
    • cPanel zero-day exploited for months before patch release (CVE-2026-41940) - Help Net Security
    • The most severe Linux threat to surface in years catches the world flat-footed - Ars Technica
    • New MOVEit vulnerabilities prompt urgent patch warning | Cybersecurity Dive
    • US and allies urge ‘careful adoption’ of AI agents | Cybersecurity Dive
    • careful_adoption_of_agentic_ai_services.pdf
    • User just tricked Grok and Bankrbot to send tokens with Morse code - Cryptopolitan
    • Finding Zero-Days with Any Model
    • (1872) Sponsored: James Kettle built an AI hacker - YouTube
    • Feature Interview: Nicholas Carlini, Anthropic - Risky Business Media
    • Trellix investigating breach of source code repository | Cybersecurity Dive
    • Popular DAEMON Tools software compromised | Securelist
    • Komari Red: The Monitoring Tool with a Built-in Reverse Shell | Huntress
    • Hackers earning millions from hijacked cargo, FBI says | The Record from Recorded Future News
    • Congress punts FISA renewal to June | The Record from Recorded Future News
    • Cops Use Apple Data And Car Bluetooth To Identify Crypto Robbery Suspect
    • Stewart Baker, outspoken voice on cybersecurity and national security law, dies at 78 | IAPP
    6 May 2026, 5:14 am
  • 43 minutes 59 seconds
    Snake Oilers: Ent AI, Spacewalk and Mondoo

    In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products:

    • Ent AI: Co-founder Brandon Dixon pitched Ent, an intent-aware, AI-powered endpoint security control.

    • Spacewalk AI: Founders Chris Fuller and Tim Wenzlau pitch Spacewalk, an AI-powered incident response platform.

    • Mondoo: Co-founder Dominik Richter pitches Mondoo, an AI-powered “service as software” in the vulnerability management space.

    This episode is also available on YouTube.

    Show notes

    1 May 2026, 12:58 am
  • 1 hour 6 minutes
    Risky Business #835 -- Why the Fast16 malware is badass

    On this week’s show, Patrick Gray and James Wilson are joined by special guest-host Dmitri Alperovitch. They discuss the week’s cybersecurity news, including:

    • The US government is mad as hell about Chinese firms stealing American AI technology
    • Dmitri has an opinion or two about the US selling Nvidia chips to China
    • Speaking of Chinese AI, Kimi’s new 2.6 is very interesting
    • The US sanctions a Cambodian senator for earning mega bucks through scam compounds
    • And a ransomware family is promoting itself as being … quantum-safe?

    This week’s show is sponsored by Trail of Bits. CEO and co-founder Dan Guido chats to Pat about how private inference works and Trail of Bits’ audit of WhatsApp’s private AI setup.

    This episode is also available on Youtube.

    Show notes

    • Exclusive: US State Dept orders global warning about alleged AI thefts by DeepSeek, other Chinese firms | Reuters
    • moonshotai/Kimi-K2.6 · Hugging Face
    • Discord Sleuths Gained Unauthorized Access to Anthropic’s Mythos | WIRED
    • Newly Deciphered Sabotage Malware May Have Targeted Iran’s Nuclear Program—and Predates Stuxnet | WIRED
    • Hackers deployed wiper malware in destructive attacks on Venezuela’s energy sector | The Record from Recorded Future News
    • Mystery Around Venezuelan Cyberattack Deepens, with New Discovery of "Highly Destructive" Wiper
    • Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack - Risky Business Media
    • AI Tools Are Helping Mediocre North Korean Hackers Steal Millions | WIRED
    • CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March | The Record from Recorded Future News
    • US, UK authorities warn that Firestarter backdoor malware survives patching | Cybersecurity Dive
    • Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities | CyberScoop
    • UK regulator closes loophole that allowed rogue companies to track phone users' location | Reuters
    • US sanctions Cambodian senator for millions earned through scam compounds | The Record from Recorded Future News
    • Vercel says some of its customers' data was stolen prior to its recent hack | TechCrunch
    • Supply Chain Security Incident Update
    • Apple fixes bug that cops used to extract deleted chat messages from iPhones | TechCrunch
    • Kyle Daigle on X: "Wanted to provide more clarity about this. Yesterday, we had a regression in merge queue behavior where, in some cases, squash or rebase commits were generated from the wrong base state, making earlier changes appear reverted in branch history. 2,804 pull requests out of over 4M" / X
    • Securing the git push pipeline: Responding to a critical remote code execution vulnerability - The GitHub Blog
    • One ransomware crew now drives half of all cyber claims: At-Bay | Insurance Business
    • In a first, a ransomware family is confirmed to be quantum-safe - Ars Technica
    • What we learned about TEE security from auditing WhatsApp's Private Inference
    29 April 2026, 4:43 am
  • 1 hour 33 seconds
    Risky Business #834 -- Vercel gets owned, Mozilla dumps hundreds of Mythos bugs

    On this week’s show, Patrick Gray and James Wilson are joined by special guest The Grugq. They discuss the week’s cybersecurity news, including:

    • Vercel got owned, and there’s a few infostealer and compromised employee dots to connect
    • Mozilla used Mythos to find 271 bugs, which feels like a sign of the bug-pocalypse
    • Speaking of the bug-pocalypse, is that why NIST is noping out of enriching a bunch of bugs?
    • The NSA is using Mythos even though the government did that whole Anthropic blacklisting thing
    • And DDos attacks hit a couple of smaller-player socials

    This week’s episode is sponsored by Permiso. Ian Ahl chats to Pat about the subtle signals Permiso uses to detect ShinyHunters-style activity in cloud and on-prem environments.

    This episode is also available on Youtube.

    Show notes

    • Vercel April 2026 Security incident
    • Vercel breach linked to infostealer infection at Context.ai
    • Vercel confirms breach as hackers claim to be selling stolen data
    • Matt Johansen: “This is not a good look” | X
    • NIST limits vulnerability analysis as CVE backlog swells | Cybersecurity Dive
    • CISA Cyber on X
    • Ransomware attack continues to disrupt healthcare in London nearly two years later | The Record from Recorded Future News
    • Lawmakers ponder terrorism designations, homicide charges over hospital ransomware attacks | CyberScoop
    • In defeat for Trump, House extends electronic spying program for just 10 days | The Record from Recorded Future News
    • Crypto infrastructure company blames $290 million theft on North Korean hackers | The Record from Recorded Future News
    • US-sanctioned currency exchange says $15 million heist done by "unfriendly states" - Ars Technica
    • Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch
    • Mozilla Used Anthropic’s Mythos to Find and Fix 271 Bugs in Firefox | WIRED
    • NSA using Anthropic's Mythos despite Defense Department blacklist
    • Beyond the breach: inside a cargo theft actor’s post-compromise playbook | Proofpoint US
    • Beware scam messages offering ships safe transit through Hormuz Strait, says security firm | The Straits Times
    • New Jersey men given lengthy sentences for running North Korean laptop farms | The Record from Recorded Future News
    • Turns Out We’re Not Alone - Volodymyr Styran
    • US joins nearly two dozen other countries in striking back against DDoS-for-hire platforms | Cybersecurity Dive
    • Bluesky blames app outage on ‘sophisticated’ DDoS attack | The Record from Recorded Future News
    • Mastodon says its flagship server was hit by a DDoS attack | TechCrunch
    • An IT expert explained under what conditions using a VPN can cause a smartphone to explode
    22 April 2026, 9:11 am
  • 59 minutes 45 seconds
    Risky Business #833 -- The Great Mythos Freakout of 2026

    On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:

    • Everyone has an opinion about Claude Mythos… even though almost nobody has used it yet
    • CISA adds a 2009 Excel bug to the KEV list, u wot?
    • Adobe also parties like it’s the 2000s, and fixes an Acrobat Reader bug
    • Disgraced former Trenchant exec Peter Williams’ sob story fails to resonate with … anyone
    • Remember those crosswalk buttons hacked to play audio mocking Trump and Zuck? They were “secured” by the password: 1234.

    This week’s episode is sponsored by mobile network operator, Cape. Ajit Gokhale talks with James about the ways to get being a telco right when you’re starting from scratch and solving the security problems of 2026.

    This episode is also available on Youtube.

    Show notes

    • Lab Space
    • The “AI Vulnerability Storm”: Building a “Mythosready” Security Program
    • Polymarket on X: "JUST IN: Goldman Sachs is reportedly ramping up its cyber defenses in preparation for Claude Mythos."
    • Ananay on X: "Marcus Hutchins probably has the best take on Mythos doing vulnerability research"
    • solst/ICE of Astarte on X: "Th vast majority of CISOs do not work at Google-sized companies, and will not have to worry about 0days"
    • Charlie Miller on X: "we’ve gone through this before with early fuzzers, afl, etc"
    • James Kettle on X: "'Can AI Do Novel Security Research? Meet the HTTP Terminator' will premiere at Blackhat"
    • jeffrey lee funk on X: "We've been tricked, again. Many of the thousands of bugs and vulnerabilities Mythos found are in older software are impossible to exploit."
    • Claude is getting worse, according to Claude • The Register
    • Your Agent Is Mine: Measuring Malicious Intermediary Attacks on the LLM Supply Chain
    • OpenAI's Mac apps need updates thanks to the Axios hack | CyberScoop
    • Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch
    • Snowflake customers hit in data theft attacks after SaaS integrator breach
    • Booking.com confirms hackers accessed customers’ data
    • CPUID hijacked to serve malware as HWMonitor downloads • The Register
    • Known Exploited Vulnerabilities Catalog | CISA
    • Adobe fixes PDF zero-day security bug that hackers have exploited for months | TechCrunch
    • The Sad Decline of Trenchant Exec Who Had Everything, Before Deciding to Steal and Sell Zero Days to Russian Buyer
    • FBI Extracts Suspect’s Deleted Signal Messages Saved in iPhone Notification Database
    • US operation evicts Russia from hacked SOHO routers used to breach critical infrastructure | Cybersecurity Dive
    • Telegram Is Still Hosting a Sanctioned $21 Billion Crypto Scammer Black Market | WIRED
    • The Dumbest Hack of the Year Exposed a Very Real Problem | WIRED
    15 April 2026, 3:34 am
  • 48 minutes
    Snake Oilers: Burp AI, Sondera and Truffle Security

    In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products:

    • Burp AI and DAST: The founder of PortSwigger and creator of legendary security software Burp Suite, Dafydd Stuttard, drops by to pitch listeners on Burp AI and Burp Suite DAST.

    • Sondera: Josh Devon talks about Sondera, a technology designed to intervene when AI models start doing the wrong thing by statefully tracking their trajectories. This isn’t a permissions suite for AI agents, it’s a way to stick agents in a harness and make sure they adhere to hard policy boundaries.

    • Truffle Security: Dylan Ayrey, the founder of Truffle Security, joins Risky Business again to talk through the latest bells and whistles in Trufflehog, a security tool that searches for exposed secrets and validates them. The Truffle team has done a lot of work on the remediation part of their product over the last few years, and Dylan tells us all about it!

    This episode is also available on YouTube

    Show notes

    9 April 2026, 9:33 pm
  • 53 minutes 30 seconds
    Risky Business #832 -- Anthropic unveils magical 0day computer God

    On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:

    • Anthropic’s new Mythos model hunts bugs and chains exploits together so well that… you cant have it…
    • …Unless you’re one of their Project Glasswing partners
    • The world isn’t short on bugs, though. F5, Fortinet, Progress ShareFile, and TrueConf are all getting rekt by humans
    • GPU Rowhammering goes in the GPU, past the IOMMU and back into the host-side Nvidia driver
    • North Korea is spending serious time and money on its crypto hacking
    • Just when the US needs CISA most, they slash its budget some more!

    This week’s episode is sponsored by identity verification firm, Persona. Tying digital actions to actual human identities isn’t just for banking know-your-customer any more. Persona’s Benjamin Chait says know-your-staff checks belong in high-value flows inside your organisation, too.

    This episode is also available on Youtube.

    Show notes

    • Claude Mythos Preview \ red.anthropic.com
    • Anthropic Claims Its New A.I. Model, Mythos, Is a Cybersecurity ‘Reckoning’ - The New York Times
    • Anthropic Teams Up With Its Rivals to Keep AI From Hacking Everything | WIRED
    • FFmpeg on X: "Thank you to @AnthropicAI for sending FFmpeg patches" / X
    • Critical flaw in F5 BIG-IP faces wide exploitation risk | Cybersecurity Dive
    • React2Shell vulnerability helps hackers steal credentials, AI platform keys and other sensitive data | Cybersecurity Dive
    • Critical flaw in FortiClient EMS under exploitation | Cybersecurity Dive
    • Researchers warn of critical flaws in Progress ShareFile | Cybersecurity Dive
    • CISA gives agencies two weeks to patch video conferencing bug exploited by Chinese hackers | The Record from Recorded Future News
    • New Rowhammer attacks give complete control of machines running Nvidia GPUs - Ars Technica
    • North Korea's hijack of one of the web's most used open source projects was likely weeks in the making | TechCrunch
    • Drift crypto platform confirms $280 million stolen in hack as researchers point finger at North Korea | The Record from Recorded Future News
    • Drift on X: "Drift Protocol — Incident Background Update " / X
    • Trump’s FY2027 budget again targets CISA | Cybersecurity Dive
    • CISA’s vulnerability scans, field support on chopping block in Trump budget | Cybersecurity Dive
    • Iranian hackers break into U.S. industrial systems, agencies warn
    • FBI labels suspected China hack of law enforcement data 'a major cyber incident'
    • Russia Hacked Routers to Steal Microsoft Office Tokens – Krebs on Security
    • Massachusetts hospital turning ambulances away after cyberattack | The Record from Recorded Future News
    • Exclusive | 'Ghost Murmur,' a never-used secret tool, deployed to find lost airman in Iran in daring mission
    • A Secure Chat App’s Encryption Is So Bad It Is ‘Meaningless’
    8 April 2026, 4:59 am
  • 46 minutes 46 seconds
    How the World Got Owned Episode 2: The 1990s, Part One

    In this special documentary episode, Patrick Gray and Amberleigh Jack take a look back at hacking throughout the 1990s, from the feel-good vibes of the early hacking communities to the antics of young hackers who wound up on the run from the FBI.

    Part one features recollections from:

    • Jeff Moss (The Dark Tangent), DefCon and Black Hat founder
    • Chris Wysopal (Weld Pond), L0pht member, co-founder, @Stake
    • Kevin Poulsen (Dark Dante), 1990s hacker turned journalist
    • Elias Levy (Aleph One), author of Smashing the Stack for Fun and Profit, Phrack, 1996

    How the World Got Owned is produced in partnership with SentinelOne.

    Show notes

    • Elias Levy (Aleph1), Former Principle Engineer, Google
    • Kevin Poulsen, Journalist
    • Jeff Moss, DefCon founder
    • Chris Wysopal, @Stake founder, L0pht member
    • Hackers testifying at the United States Senate, May 19, 1998
    • Hackers May ‘Net’ Good PR for Studio
    • DefCon Archives | DefCon 1
    • A Not So Terribly Brief History of the Electronic Frontier Foundation
    • Innocent Hackers Want Their Computers Back
    • Breakdowns in Computer Security
    • Unsolved Mysteries, Season 3, Episode 4
    • The Last Hacker: He Called Himself Dark Dante. His Compulsion Led Him to Secret Files and, Eventually, The Bar of Justice
    • Justia appeal summary, Kevin Poulsen, 1994
    • Smashing the Stack for Fun and Profit, Phrack Magazine, November 1996
    • From subversives to CEOs: How radical hackers built today’s cybersecurity industry
    3 April 2026, 12:35 am
  • 59 minutes 40 seconds
    Risky Business #831 -- The AI bugpocalypse begins

    On this week’s show, Patrick Gray, Adam Boileau and James Wilson discuss the week’s cybersecurity news. They cover:

    • Those pesky North Koreans shim a backdoor into a 100M-downloads-a-week npm package
    • TeamPCP appear to have ransacked Cisco’s source and cloud environments
    • AI is getting legitimately good at being told to “just go find some 0day in this”
    • Kaspersky says Coruna and Triangulation do share code lineage
    • Iranian hackers dump Kash Patel’s gmail spool
    • Oh, and of course there’s a Citrix Netscaler memory leak being exploited in the wild

    This week’s episode is sponsored by Dropzone AI, who make automated AI SOC analysts. Head honcho Ed Wu explains how they’ve built pre-canned ‘hunt packs’ to lead the AI off into your environment to find weird, interesting and security relevant things.

    This episode is also available on Youtube.

    Show notes

    • Google links axios supply chain attack to North Korean group | The Record from Recorded Future News
    • Cisco source code stolen in Trivy-linked dev environment breach
    • chiefofautism on X: "someone at ANTHROPIC just showed CLAUDE finding ZERO DAY vulnerabilities in a live conference demo"
    • h0mbre on X: "Claude is somehow better at kernel exploitation than creating meal plans."
    • Vulnerability Research Is Cooked — Quarrelsome
    • MAD Bugs: vim vs emacs vs Claude - Calif
    • MAD Bugs: Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell (CVE-2026-4747)
    • A Risky Biz Experiment: Hunting for iOS 0day with AI - Risky Business Media
    • Security leaders say the next two years are going to be 'insane' | CyberScoop
    • Coruna framework: an exploit kit and ties to Operation Triangulation | Securelist
    • Apple says no one using Lockdown Mode has been hacked with spyware | TechCrunch
    • Reverse engineering Apple’s silent security fixes - Calif
    • Jury finds Meta's platforms are harmful to children in 1st wave of social media addiction lawsuits | PBS News
    • Meta and YouTube found liable in social media addiction trial
    • Iranian hackers publish emails allegedly stolen from Kash Patel
    • Iran Us War: 'Legitimate targets': Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia - The Times of India
    • Drop Site on X: "IRGC: From now on, for every assassination, an American company will be destroyed"
    • OSINTtechnical on X: "Starlink shutdowns are forcing Russian troops even deeper into Ubiquiti’s ecosystem. "
    • Citrix NetScaler products confirmed to be under exploitation | Cybersecurity Dive
    • CISA tells federal agencies to patch Citrix NetScaler bug by Thursday | The Record from Recorded Future News
    • Using a VPN May Subject You to NSA Spying | WIRED
    • Post reporters called the White House. Their phones showed ‘Epstein Island.’ - The Washington Post
    1 April 2026, 3:50 am
  • 30 minutes 11 seconds
    Soap Box: Red teaming AI systems with SpecterOps

    In this sponsored Soap Box edition of the show, Patrick Gray and James Wilson talk about red teaming AI systems with Russel Van Tuyl, Vice President of Services at elite penetration testing firm SpecterOps.

    SpecterOps is the company behind attack path enumeration tool Bloodhound and Bloodhound Enterprise, but they’re also a pentest and red teaming shop with world class expertise in popping shells on all sorts of interesting systems in all sorts of interesting places.

    This episode is also available on Youtube.

    Show notes

    27 March 2026, 1:07 am
  • More Episodes? Get the App

Discover

  • Featured
  • Top Charts
  • Popular

More

  • Get the App
  • News
  • Setting
  • Privacy Policy
  • Submit Your Podcast

Contact

  • [email protected]
  • Twitter
Your feedback is valuable to us. Should you encounter any bugs, glitches, lack of functionality or other problems, please email us at [email protected] or join where you can talk directly to the dev team.
© MoonFM 2026. All rights reserved.