On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
Australia expels Iranian ambassador
Hackers sabotage Iranian shipping satcoms
APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK?
Trail of Bits uses image-downscaling to sneak prompts into Google Gemini
The Com’s King Bob gets ten years in the slammer
It’s a day that ends in -y, so of course there’s a new Citrix Netscaler RCE being used in the wild.
This week’s episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they’ve been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please.
This episode is also available on Youtube.
All content for Risky Business is the property of Patrick Gray and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
Australia expels Iranian ambassador
Hackers sabotage Iranian shipping satcoms
APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK?
Trail of Bits uses image-downscaling to sneak prompts into Google Gemini
The Com’s King Bob gets ten years in the slammer
It’s a day that ends in -y, so of course there’s a new Citrix Netscaler RCE being used in the wild.
This week’s episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they’ve been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please.
This episode is also available on Youtube.
Risky Business #801 -- AI models can hack well now and it's weirding us out
Risky Business
1 hour 6 minutes
3 weeks ago
Risky Business #801 -- AI models can hack well now and it's weirding us out
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut.
This episode explores the rise of AI-powered bug hunting:
Google’s Project Zero and Deepmind team up to find and report 20 bugs to open source projects
The XBOW AI bug hunting platform sees success on HackerOne
Is an AI James Kettle on the horizon?
There’s also plenty of regular cybersecurity news to discuss:
On-prem Sharepoint’s codebase is maintained out of China… awkward!
China frets about the US backdooring its NVIDIA chips, how you like ‘dem apples, China?
SonicWall advises customers to turn off their VPNs
Hardware controlling Dell laptop fingerprint and card readers has nasty driver bugs
Russia uses its ISPs to in-the-middle embassy computers and backdoor ‘em.
The Russian government pushes VK’s Max messenger for everything
This week’s show is sponsored by device management platform Devicie. Head of Solutions Sean Ollerton talks through the impending Windows 10 apocalypse, as Microsoft ends mainstream support. He says Windows 11 isn’t as scary as people make out, but if the update isn’t on your radar now, time is running out.
This episode is also available on Youtube.
Risky Business
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including:
Australia expels Iranian ambassador
Hackers sabotage Iranian shipping satcoms
APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK?
Trail of Bits uses image-downscaling to sneak prompts into Google Gemini
The Com’s King Bob gets ten years in the slammer
It’s a day that ends in -y, so of course there’s a new Citrix Netscaler RCE being used in the wild.
This week’s episode is brought to you by Corelight. Chief Strategy Officer Greg Bell talks through how they’ve been implementing AI for sifting through your network data. A model-context-protocol server that can rummage in all those packet logs for you while you keep investigating? Yes please.
This episode is also available on Youtube.