About the show

The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks.

Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.

Connect with Ryan on Twitter (Open DMs).

Three Buddy Problem on social media

Episodes

  • Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity

    October 7th, 2025  |  44 mins 54 secs
    cybersecurity, entrepreneurship, pen-test, secure by design, supply chain

    This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode.

    Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.

  • Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout

    October 3rd, 2025  |  2 hrs 3 mins
    apt research, cyberespionage, nation-state, ransomware, zero-day

    Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response.

    Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI’s Sora 2 launch and its implications for social media and human expression; Palo Alto’s “Phantom Taurus” APT report, a follow-up on Cisco’s ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA.

    Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.

  • Cisco firewall zero-days and bootkits in the wild

    September 27th, 2025  |  1 hr 54 mins
    apt research, cyberespionage, nation-state, ransomware, zero-day

    Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.

    Plus, Cisco’s controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.

    Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.

  • Live at LABScon: Aurora Johnson and Trevor Hilligoss on China's 'internet toilets'

    September 24th, 2025  |  22 mins 13 secs
    apt research, cyberespionage, nation-state, ransomware, zero-day

    Three Buddy Problem - Episode 64: SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets," the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).

    Cast: Aurora Johnson, Trevor Hilligoss Ryan Naraine and Juan Andres Guerrero-Saade.

  • Live at LABScon: Visi Stark shares memories of creating the APT1 report

    September 24th, 2025  |  28 mins 50 secs
    apt research, cyberespionage, nation-state, ransomware, zero-day

    Three Buddy Problem - Episode 63: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant's famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025).

    Cast: Visi Stark, Ryan Naraine and Juan Andres Guerrero-Saade.

  • Live at LABScon: Lindsay Freeman on tracking Wagner Group war crimes

    September 24th, 2025  |  31 mins 52 secs
    apt research, cyberespionage, military contractors, nation-state, zero-day

    Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)

    Cast: Lindsay Freeman, Ryan Naraine and Juan Andres Guerrero-Saade.

  • Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?

    September 9th, 2025  |  2 hrs 45 mins
    apt research, cyberespionage, nation-state, spyware, surveillance, zero-day

    Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors.

    Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.

    Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.

  • Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click

    August 29th, 2025  |  2 hrs 24 mins
    apt research, china, microsoft, nation-state, russia, zero-day

    Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.

    Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world.

    We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.

    Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.

  • Zero-day reality check: iOS exploits, MAPP in China and the hack-back temptation

    August 22nd, 2025  |  2 hrs 32 mins
    apt research, cyberespionage, nation-state, ransomware, zero-day

    Three Buddy Problem - Episode 59: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who’s likely using these exploits, why Apple’s guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works.

    Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora’s box?), and dissect two case studies that blur APT and crimeware: PipeMagic’s CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs.

    Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.

  • On AI’s future, security’s failures, and what comes next...

    August 15th, 2025  |  1 hr 57 mins
    ai, apt research, backdoors, nation-state, zero-day

    Three Buddy Problem - Episode 58: Indepth reaction to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold-rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents.

    We revisit the Chinese "cyber militia" discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.

    Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.

  • Live from Black Hat: Brandon Dixon parses the AI security hype

    August 7th, 2025  |  1 hr 30 mins
    ai, apt research, nation-state, zero-day

    Three Buddy Problem - Episode 57: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.

    Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development.

    Cast: Brandon Dixon, Juan Andres Guerrero-Saade and Ryan Naraine.

  • Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service

    August 1st, 2025  |  1 hr 51 mins
    apt research, cyberespionage, nation-state, ransomware, zero-day

    Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire.

    Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.

    Cast: Dakota Cary, Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.