More Risky Business episodes

Risky Business #838 -- GitHub investigates possible breach thumbnail

Risky Business #838 -- GitHub investigates possible breach

Published 20 May 2026

Duration: 01:02:50

Recent cybersecurity incidents, including GitHub's unauthorized access and a CISA contractor's credential exposure, highlight risks from misconfigurations, human error, legacy malware, AI-driven vulnerabilities, and enterprise tool flaws, alongside emerging threats like deepfakes, ransomware signing, and outdated infrastructure challenges exacerbated by geopolitical conflicts.

Episode Description

On this weeks show Patrick Gray, Adam Boileau and James Wilson discuss the weeks cybersecurity news. They cover: GitHub announced a possible breach CI...

Overview

The podcast covers recent cybersecurity developments, highlighting critical vulnerabilities and incidents. GitHub is investigating unauthorized access to internal repositories, while a CISA contractor mistakenly exposed sensitive credentials in a public GitHub repo, underscoring organizational and human oversight failures. Key themes include security misconfigurations, the limitations of technical controls against human error, and challenges in managing credentials and repositories in large organizations. The breach also raised concerns about "credential sprawl" and the inadequacy of tools like DLP in preventing leaks when data is transmitted over HTTPS. A 20-year-old malware called Fast 16, discovered via Shadowbroker leaks, was analyzed for its potential to manipulate nuclear simulation software, linking it to historical cyber espionage efforts. Meanwhile, discussions on fiber optic shortages, exacerbated by geopolitical conflicts, and Ukraine's innovative use of low-tech solutions in warfare were noted.

The episode also delved into modern cybersecurity challenges, such as the proliferation of vulnerabilities ("vulnpocalypse") driven by AI-generated code, AI's role in bug hunting, and open-source governance issues. Open-source projects faced criticism for lack of structured processes in addressing security flaws, while corporate environments like Microsoft emphasized centralized control. BitLocker encryption was found vulnerable to physical attacks via USB devices, and Signal's security flaws, including phishing risks and UI complexities, sparked debates about secure communication alternatives. Ransomware actors exploited malware signing services like Fox Tempest, which allowed malicious code to bypass security checks, while Cisco, Huawei, and SonicWall were highlighted for recurring security flaws. Defensive strategies emphasized network deception technologies (e.g., canaries) and the need for adaptive approaches to detect rapidly executed attacks, balancing speed with depth in responses. Emerging threats included real-time deepfakes and evolving fraud tools, stressing the importance of updating risk assessments for increasingly realistic social engineering tactics.

What If

Thought Experiment 1: What if you enable GitHubs secret detection and enforce strict policy enforcement for your code repositories?
Move: Implement GitHubs built-in secret scanning, set up automated checks for hardcoded credentials, and enforce policies that block commits containing sensitive data (e.g., API keys, passwords). Integrate these checks with your CI/CD pipeline and use tools like Trivy or Snyk for real-time vulnerability scans.
Why now? The CISA contractor incident highlights how easily misconfigured repositories can leak sensitive data. Enabling secret detection reduces the risk of accidental exposure, especially as more developers work remotely and collaborate across teams.
Expected upside: Prevents data breaches, avoids compliance penalties, and builds trust with stakeholders by demonstrating proactive security practices.


Thought Experiment 2: What if you deploy hardware-based encryption and physical security layers for devices running BitLocker or similar tools?
Move: Use hardware security modules (HSMs) or USB-based encryption keys (e.g., YubiKey) to secure BitLocker-encrypted devices. Combine this with physical access controls (e.g., biometric locks, tamper-evident enclosures) to prevent unauthorized access to devices.
Why now? The BitLocker vulnerability exploited via UDP authentication flaws shows that software-only encryption is insufficient. Adding hardware layers mitigates risks from physical tampering or legacy code exploits.
Expected upside: Reduces the likelihood of attackers bypassing encryption, even if software vulnerabilities are exploited, and aligns with modern zero-trust security models.


Thought Experiment 3: What if you migrate to a secure, open-source messaging platform with better UX/UX than Signal, like Matrix-based alternatives (e.g., M-Cypher or Element)?
Move: Replace Signal with a Matrix-based app that supports end-to-end encryption, clear identity verification, and user-friendly features (e.g., QR code linking, simplified disappearing messages). Ensure the platform is audited and forked with minimal security risks.
Why now? Signals UI/UX flaws and the Polish governments push for M-Cypher highlight the growing risks of relying on a single tool. Migrating to a more transparent, community-driven platform reduces dependency on proprietary systems and avoids fork-related vulnerabilities.
Expected upside: Improves usability and security for teams, reduces risks from forked tools, and future-proofs communication against evolving threats like deepfake scams.

Takeaway

  • Enable GitHub Secret Detection and Use Code Scanning Tools: Actively configure GitHub's secret scanning feature to automatically detect and block exposure of sensitive credentials (e.g., API keys, passwords) in code repositories. Pair this with tools like GitGuardian or Snyk to enforce real-time checks during development and CI/CD pipelines.
    (Based on the CISA contractor incident and GitHub's secret detection bypass.)

  • Avoid Relying Solely on TPM-Backed BitLocker; Opt for Pin-Based Encryption: Mitigate risks from critical vulnerabilities in TPM-backed BitLocker by enabling pin-based encryption as an additional layer of security. Regularly update firmware and ensure hardware modules are from trusted vendors (e.g., avoid legacy code from acquisitions).
    (Based on the Huawei and Cisco SD-WAN vulnerabilities, and the BitLocker patch bypass incident.)

  • Avoid Forking Secure Communication Protocols Without Rigorous Testing: If replacing messaging platforms like Signal (e.g., with M-Cypher), ensure the forked protocol undergoes independent security audits and maintains the same level of testing as the original. Avoid forks tied to government or commercial interests that may introduce logging or vulnerabilities.
    (Based on the risks of Signal forks and Luxembourgs telecom crash due to Huawei bugs.)

  • Deploy Canary Technology for Network Deception: Implement hardware canaries (e.g., Thinkst Canary) to mimic critical assets (e.g., SAP systems) and detect intrusions. Focus on low-setup, high-impact solutions that provide clear signals (e.g., IP addresses, credentials) for immediate response.
    (Based on the canary technology discussion and challenges with modern attack methods.)

  • Update Risk Assessments for Real-Time Deepfake Threats: Integrate protocols for detecting AI-driven social engineering (e.g., real-time deepfakes) into security policies. Train teams on updated Business Email Compromise (BEC) procedures and deploy tools that verify video/audio authenticity during high-stakes communications.
    (Based on the real-time deepfake and reskinning trends, and the evolution of fraud tools.)

Recent Episodes of Risky Business

15 May 2026 Soap Box: Where does AI fit into cloud security?

Open-source cloud security tools like Prowler evolve through community contributions and AI integration, balancing automated security checks with deterministic controls amid challenges like dynamic APIs, enterprise adoption tensions, and the resurgence of foundational security measures in hybrid cloud environments.

13 May 2026 Risky Business #837 -- GitHub Actions footgun claims TanStack

Recommended: Security. Security. Security.

Summary: Cybersecurity risks from misconfigured GitHub Actions, AI-driven threats like autonomous malware, DNSSEC failures, ransomware attacks on education sectors, and challenges in AI model governance and supply chain vulnerabilities are explored, alongside discussions on regulatory responses and infrastructure resilience.

15 Apr 2026 Risky Business #833 -- The Great Mythos Freakout of 2026

Recommended: Discussion of the recent Anthropic Mythos model impact.

Anthropic Mythos AI's impact on cybersecurity, balancing its potential to accelerate vulnerability detection with debates over human expertise, polarized views on practical impact versus existential risks, and the persistence of foundational security practices amid new AI-driven challenges like patch reversal and IoT vulnerabilities.

More Risky Business episodes