<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 15:18:42 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Ai”</title>
    <link>https://securityconversations.fireside.fm/tags/ai</link>
    <pubDate>Sat, 18 Apr 2026 12:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>The Angry Spark APT Mystery: A Year-Long Backdoor, One Victim, Zero Attribution</title>
  <link>http://securityconversations.fireside.fm/angry-spark-mystery-apex-apt-attribution</link>
  <guid isPermaLink="false">e76fbe12-d6f8-4e86-b598-e7103442b0b5</guid>
  <pubDate>Sat, 18 Apr 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e76fbe12-d6f8-4e86-b598-e7103442b0b5.mp3" length="129806188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals).

Three Buddy Problem - Episode 94: We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage. 

Plus, connecting the dots across AI-driven vulnerability discovery, Microsoft’s massive Patch Tuesday, Jensen Huang talks cybersecurity, Mythos dangers and Chinese chips, and the quiet erosion of CVE enrichment at NIST.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.   

Timestamps:
0:00 – Intros + AI news whiplash 
5:10 – Patch Tuesday breakdown: Microsoft's second-largest CVE release ever
7:32 – AI accelerating vulnerability discovery at record pace
10:00 – Frontier lab cyber models, fine-tuning, guardrail removal &amp; KYC
12:37 – FreeBSD NFS bug: Opus 4.6 was already finding critical vulns
14:26 – Anthropic's infrastructure strain: Is Opus being nerfed?
21:05 – OpenAI's Trusted Access for Cyber vs. Anthropic's Mythos cabal
28:45 – SharePoint zero-day CVE-2026-32201: The endless Microsoft tax
34:36 – Adobe Acrobat zero-day: A rare, real, Russia-linked exploit in the wild
41:36 – VirusTotal mining: The golden age of threat intel hunting
50:03 – ZionSiphon: Vibe-coded OT malware targeting Israeli water infrastructure
55:04 – Paleontology of threat research: When do you publish? Who do you trust?
1:13:53 – Angry Spark: A one-machine, one-year backdoor raises eyebrows
1:49:25 – Jensen Huang vs. Dwarkesh Patel on Mythos, China and chips 
2:14:32 – Chinese AI distillation: 24,000 fake Anthropic accounts, DeepSeek &amp; the catch-up question</itunes:subtitle>
  <itunes:duration>2:35:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e76fbe12-d6f8-4e86-b598-e7103442b0b5/cover.jpg?v=1"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)
Three Buddy Problem - Episode 94: We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage. 
Plus, connecting the dots across AI-driven vulnerability discovery, Microsoft’s massive Patch Tuesday, Jensen Huang talks cybersecurity, Mythos dangers and Chinese chips, and the quiet erosion of CVE enrichment at NIST.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
Timestamps:
0:00 – Intros + AI news whiplash 
5:10 – Patch Tuesday breakdown: Microsoft's second-largest CVE release ever
7:32 – AI accelerating vulnerability discovery at record pace
10:00 – Frontier lab cyber models, fine-tuning, guardrail removal &amp;amp; KYC
12:37 – FreeBSD NFS bug: Opus 4.6 was already finding critical vulns
14:26 – Anthropic's infrastructure strain: Is Opus being nerfed?
21:05 – OpenAI's Trusted Access for Cyber vs. Anthropic's Mythos cabal
28:45 – SharePoint zero-day CVE-2026-32201: The endless Microsoft tax
34:36 – Adobe Acrobat zero-day: A rare, real, Russia-linked exploit in the wild
41:36 – VirusTotal mining: The golden age of threat intel hunting
50:03 – ZionSiphon: Vibe-coded OT malware targeting Israeli water infrastructure
55:04 – Paleontology of threat research: When do you publish? Who do you trust?
1:13:53 – Angry Spark: A one-machine, one-year backdoor raises eyebrows
1:49:25 – Jensen Huang vs. Dwarkesh Patel on Mythos, China and chips 
2:14:32 – Chinese AI distillation: 24,000 fake Anthropic accounts, DeepSeek &amp;amp; the catch-up question
</description>
  <itunes:keywords>Mythos, Anthropic, Claude, Opus 4.7, OpenAI, Aardvark, Codex Security, Calif, TLPBLACK, Patch Tuesday, Microsoft, Jensen Huang, Nvidia, Dwarkesh Patel, China, AI chips, USG</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.</em>)</p>

<p><strong>Three Buddy Problem - Episode 94</strong>: We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage. </p>

<p>Plus, connecting the dots across AI-driven vulnerability discovery, Microsoft’s massive Patch Tuesday, Jensen Huang talks cybersecurity, Mythos dangers and Chinese chips, and the quiet erosion of CVE enrichment at NIST.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>Timestamps:<br>
0:00 – Intros + AI news whiplash <br>
5:10 – Patch Tuesday breakdown: Microsoft&#39;s second-largest CVE release ever<br>
7:32 – AI accelerating vulnerability discovery at record pace<br>
10:00 – Frontier lab cyber models, fine-tuning, guardrail removal &amp; KYC<br>
12:37 – FreeBSD NFS bug: Opus 4.6 was already finding critical vulns<br>
14:26 – Anthropic&#39;s infrastructure strain: Is Opus being nerfed?<br>
21:05 – OpenAI&#39;s Trusted Access for Cyber vs. Anthropic&#39;s Mythos cabal<br>
28:45 – SharePoint zero-day CVE-2026-32201: The endless Microsoft tax<br>
34:36 – Adobe Acrobat zero-day: A rare, real, Russia-linked exploit in the wild<br>
41:36 – VirusTotal mining: The golden age of threat intel hunting<br>
50:03 – ZionSiphon: Vibe-coded OT malware targeting Israeli water infrastructure<br>
55:04 – Paleontology of threat research: When do you publish? Who do you trust?<br>
1:13:53 – Angry Spark: A one-machine, one-year backdoor raises eyebrows<br>
1:49:25 – Jensen Huang vs. Dwarkesh Patel on Mythos, China and chips <br>
2:14:32 – Chinese AI distillation: 24,000 fake Anthropic accounts, DeepSeek &amp; the catch-up question</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1wVB-Ec5EHYAOhsq2B8Zvf8XJju6ztX7blylz-6IvUHM/edit?usp=sharing">Transcript</a></li><li><a title="Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulns" rel="nofollow" href="https://www.securityweek.com/microsoft-patches-exploited-sharepoint-zero-day-and-160-other-vulnerabilities/">Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulns</a></li><li><a title="ZDI: April 2026 Patch Tuesday Review" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2026/4/14/the-april-2026-security-update-review">ZDI: April 2026 Patch Tuesday Review</a></li><li><a title="Inside ZionSiphon: OT Malware Targeting Israeli Water Systems" rel="nofollow" href="https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems">Inside ZionSiphon: OT Malware Targeting Israeli Water Systems</a></li><li><a title="GenDigital: Chasing an Angry Spark" rel="nofollow" href="https://www.gendigital.com/blog/insights/research/chasing-an-angry-spark">GenDigital: Chasing an Angry Spark</a></li><li><a title="MAD Bugs: Month of AI-Discovered Bugs (Calif)" rel="nofollow" href="https://blog.calif.io/p/mad-bugs-month-of-ai-discovered-bugs">MAD Bugs: Month of AI-Discovered Bugs (Calif)</a></li><li><a title="HackerOne: The Vulnerability Apocalypse is a Remediation Crisis" rel="nofollow" href="https://www.hackerone.com/blog/continuous-threat-exposure-management-remediation-crisis">HackerOne: The Vulnerability Apocalypse is a Remediation Crisis</a></li><li><a title="OpenAI scaling up Trusted Access for Cyber (TAC) Program" rel="nofollow" href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/">OpenAI scaling up Trusted Access for Cyber (TAC) Program</a></li><li><a title="OpenAI Commits $10m in API credits for cybersecurity" rel="nofollow" href="https://openai.com/index/accelerating-cyber-defense-ecosystem/">OpenAI Commits $10m in API credits for cybersecurity</a></li><li><a title="Anthropic: Introducing Claude Opus 4.7 " rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-7">Anthropic: Introducing Claude Opus 4.7 </a></li><li><a title="OpenAI confirms Axios developer tool compromise" rel="nofollow" href="https://openai.com/index/axios-developer-tool-compromise/">OpenAI confirms Axios developer tool compromise</a></li><li><a title="Jensen Huang x Jensen Huang on Nvidia’s AI Moat" rel="nofollow" href="https://www.youtube.com/watch?v=Hrbq66XqtCo">Jensen Huang x Jensen Huang on Nvidia’s AI Moat</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="NIST Updates NVD Operations to Address Record CVE Growth" rel="nofollow" href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST Updates NVD Operations to Address Record CVE Growth</a></li><li><a title="Dreadnode Open-Source Tools to Measure AI Offense-Defense Gap" rel="nofollow" href="https://dreadnode.io/research/mine-the-gap-open-source-tools-for-measuring-the-ai-offense-defense-gap/">Dreadnode Open-Source Tools to Measure AI Offense-Defense Gap</a></li><li><a title="LABScon 2026 Call for Papers" rel="nofollow" href="https://www.labscon.io/cfp/">LABScon 2026 Call for Papers</a></li><li><a title="Cyber-Paleontology in the Age of AI (Black Hat Asia 2026)" rel="nofollow" href="https://blackhat.com/asia-26/briefings/schedule/index.html#cyber-paleontology-in-the-age-of-ai-51494">Cyber-Paleontology in the Age of AI (Black Hat Asia 2026)</a></li><li><a title="Ekoparty Miami Schedule" rel="nofollow" href="https://ekoparty.org/schedule-miami-2026/">Ekoparty Miami Schedule</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.</em>)</p>

<p><strong>Three Buddy Problem - Episode 94</strong>: We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage. </p>

<p>Plus, connecting the dots across AI-driven vulnerability discovery, Microsoft’s massive Patch Tuesday, Jensen Huang talks cybersecurity, Mythos dangers and Chinese chips, and the quiet erosion of CVE enrichment at NIST.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>Timestamps:<br>
0:00 – Intros + AI news whiplash <br>
5:10 – Patch Tuesday breakdown: Microsoft&#39;s second-largest CVE release ever<br>
7:32 – AI accelerating vulnerability discovery at record pace<br>
10:00 – Frontier lab cyber models, fine-tuning, guardrail removal &amp; KYC<br>
12:37 – FreeBSD NFS bug: Opus 4.6 was already finding critical vulns<br>
14:26 – Anthropic&#39;s infrastructure strain: Is Opus being nerfed?<br>
21:05 – OpenAI&#39;s Trusted Access for Cyber vs. Anthropic&#39;s Mythos cabal<br>
28:45 – SharePoint zero-day CVE-2026-32201: The endless Microsoft tax<br>
34:36 – Adobe Acrobat zero-day: A rare, real, Russia-linked exploit in the wild<br>
41:36 – VirusTotal mining: The golden age of threat intel hunting<br>
50:03 – ZionSiphon: Vibe-coded OT malware targeting Israeli water infrastructure<br>
55:04 – Paleontology of threat research: When do you publish? Who do you trust?<br>
1:13:53 – Angry Spark: A one-machine, one-year backdoor raises eyebrows<br>
1:49:25 – Jensen Huang vs. Dwarkesh Patel on Mythos, China and chips <br>
2:14:32 – Chinese AI distillation: 24,000 fake Anthropic accounts, DeepSeek &amp; the catch-up question</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1wVB-Ec5EHYAOhsq2B8Zvf8XJju6ztX7blylz-6IvUHM/edit?usp=sharing">Transcript</a></li><li><a title="Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulns" rel="nofollow" href="https://www.securityweek.com/microsoft-patches-exploited-sharepoint-zero-day-and-160-other-vulnerabilities/">Microsoft Patches Exploited SharePoint Zero-Day and 160 Other Vulns</a></li><li><a title="ZDI: April 2026 Patch Tuesday Review" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2026/4/14/the-april-2026-security-update-review">ZDI: April 2026 Patch Tuesday Review</a></li><li><a title="Inside ZionSiphon: OT Malware Targeting Israeli Water Systems" rel="nofollow" href="https://www.darktrace.com/blog/inside-zionsiphon-darktraces-analysis-of-ot-malware-targeting-israeli-water-systems">Inside ZionSiphon: OT Malware Targeting Israeli Water Systems</a></li><li><a title="GenDigital: Chasing an Angry Spark" rel="nofollow" href="https://www.gendigital.com/blog/insights/research/chasing-an-angry-spark">GenDigital: Chasing an Angry Spark</a></li><li><a title="MAD Bugs: Month of AI-Discovered Bugs (Calif)" rel="nofollow" href="https://blog.calif.io/p/mad-bugs-month-of-ai-discovered-bugs">MAD Bugs: Month of AI-Discovered Bugs (Calif)</a></li><li><a title="HackerOne: The Vulnerability Apocalypse is a Remediation Crisis" rel="nofollow" href="https://www.hackerone.com/blog/continuous-threat-exposure-management-remediation-crisis">HackerOne: The Vulnerability Apocalypse is a Remediation Crisis</a></li><li><a title="OpenAI scaling up Trusted Access for Cyber (TAC) Program" rel="nofollow" href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/">OpenAI scaling up Trusted Access for Cyber (TAC) Program</a></li><li><a title="OpenAI Commits $10m in API credits for cybersecurity" rel="nofollow" href="https://openai.com/index/accelerating-cyber-defense-ecosystem/">OpenAI Commits $10m in API credits for cybersecurity</a></li><li><a title="Anthropic: Introducing Claude Opus 4.7 " rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-7">Anthropic: Introducing Claude Opus 4.7 </a></li><li><a title="OpenAI confirms Axios developer tool compromise" rel="nofollow" href="https://openai.com/index/axios-developer-tool-compromise/">OpenAI confirms Axios developer tool compromise</a></li><li><a title="Jensen Huang x Jensen Huang on Nvidia’s AI Moat" rel="nofollow" href="https://www.youtube.com/watch?v=Hrbq66XqtCo">Jensen Huang x Jensen Huang on Nvidia’s AI Moat</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="NIST Updates NVD Operations to Address Record CVE Growth" rel="nofollow" href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">NIST Updates NVD Operations to Address Record CVE Growth</a></li><li><a title="Dreadnode Open-Source Tools to Measure AI Offense-Defense Gap" rel="nofollow" href="https://dreadnode.io/research/mine-the-gap-open-source-tools-for-measuring-the-ai-offense-defense-gap/">Dreadnode Open-Source Tools to Measure AI Offense-Defense Gap</a></li><li><a title="LABScon 2026 Call for Papers" rel="nofollow" href="https://www.labscon.io/cfp/">LABScon 2026 Call for Papers</a></li><li><a title="Cyber-Paleontology in the Age of AI (Black Hat Asia 2026)" rel="nofollow" href="https://blackhat.com/asia-26/briefings/schedule/index.html#cyber-paleontology-in-the-age-of-ai-51494">Cyber-Paleontology in the Age of AI (Black Hat Asia 2026)</a></li><li><a title="Ekoparty Miami Schedule" rel="nofollow" href="https://ekoparty.org/schedule-miami-2026/">Ekoparty Miami Schedule</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>The Claude Mythos, Project Glasswing Shockwave</title>
  <link>http://securityconversations.fireside.fm/claude-mythos-project-glasslight-shockwave</link>
  <guid isPermaLink="false">cc2c69d7-921c-4ac8-b034-4546ab0e3de8</guid>
  <pubDate>Fri, 10 Apr 2026 13:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cc2c69d7-921c-4ac8-b034-4546ab0e3de8.mp3" length="127570297" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals).

Three Buddy Problem - Episode 93: We discuss Anthropic's release of Claude Mythos Preview (an AI model so capable and dangerous they won't release it publicly) and debate the looming patching crisis, bug bounty extinction, possible US government nationalization of frontier labs, and why the NSA might not be thrilled about all this bug-fixing. 

Plus, North Korea's six-month Drift Protocol con job, APT28's retro DNS hijacking campaign, and Microsoft's driver signing mess hitting WireGuard and VeraCrypt.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.   

0:00 — Opening banter
1:36 — Claude Mythos Preview, Project Glasswing Announcement
7:22 — Parsing the Hype: Is Mythos Really a Step Change?
11:31 — Costin's Take: Is This All a PR Stunt?
17:10 — The Patching Problem: What Happens After the Zero Days?
28:11 — Bug Bounty Programs Under Threat from AI
33:37 — What Will Companies Actually Do With Mythos?
45:09 — Geopolitics: Where Is the US Government? Nationalization Talk
53:01 — Source Code vs. Binary: The Real Limits of Mythos
1:00:01 — Model Recklessness, Guardrails and the Psychiatrist
1:06:17 — Fortinet: Another Zero Day, No Patch, No IOCs
1:09:08 — North Korean Drift Protocol Heist: $285 Million Stolen
1:24:39 — SOHO Router DNS Hijacking: APT28 and FBI Disruption
1:32:34 — Microsoft Suspensions Hit WireGuard, VeraCrypt, OSR
1:38:49 — Shout-Outs, Conferences &amp; Closing
</itunes:subtitle>
  <itunes:duration>2:34:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/cc2c69d7-921c-4ac8-b034-4546ab0e3de8/cover.jpg?v=1"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)
Three Buddy Problem - Episode 93: We discuss Anthropic's release of Claude Mythos Preview (an AI model so capable and dangerous they won't release it publicly) and debate the looming patching crisis, bug bounty extinction, possible US government nationalization of frontier labs, and why the NSA might not be thrilled about all this bug-fixing. 
Plus, North Korea's six-month Drift Protocol con job, APT28's retro DNS hijacking campaign, and Microsoft's driver signing mess hitting WireGuard and VeraCrypt.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
00:00 — Opening banter
01:36 — Anthropic Mythos Preview + Project Glasswing
06:17 — USG reaction + Wall Street emergency meeting
10:54 — Mythos capabilities vs hype (technical reality check)
13:44 — PR stunt? Skepticism of Anthropic narrative
20:42 — The patching crisis + “defender advantage”
27:41 — Bug bounty model under threat from AI
33:37 — Mythos practical workflows
45:09 — Geopolitics, NSA angle, and nationalization discussion
01:40:18 — Fortinet zero-day + ongoing failures
01:42:39 — Drift Protocol heist ($285M) + long-term social engineering
01:44:07 — Revisiting XZ Utils / Jia Tan attribution
01:54:07 — Crypto security gaps + need for real CTI in blockchain
02:04:22 — APT28 DNS hijacking + router compromise campaign
02:18:57 — Microsoft driver signing meltdown + ecosystem impact
</description>
  <itunes:keywords>Anthropic, Claude, Mythos, Drift, North Korea, Jia Tan, xzutils, Solana, OpenAI, Codex, ChatGPT, Opus, Lumen, routers, FrostArmada, Project Glasswing, CISA, Microsoft, drivers, WireGuard, Iran, LUA, Cisco Talos</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.</em>)</p>

<p><strong>Three Buddy Problem - Episode 93</strong>: We discuss Anthropic&#39;s release of Claude Mythos Preview (an AI model so capable and dangerous they won&#39;t release it publicly) and debate the looming patching crisis, bug bounty extinction, possible US government nationalization of frontier labs, and why the NSA might not be thrilled about all this bug-fixing. </p>

<p>Plus, North Korea&#39;s six-month Drift Protocol con job, APT28&#39;s retro DNS hijacking campaign, and Microsoft&#39;s driver signing mess hitting WireGuard and VeraCrypt.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>00:00 — Opening banter<br>
01:36 — Anthropic Mythos Preview + Project Glasswing<br>
06:17 — USG reaction + Wall Street emergency meeting<br>
10:54 — Mythos capabilities vs hype (technical reality check)<br>
13:44 — PR stunt? Skepticism of Anthropic narrative<br>
20:42 — The patching crisis + “defender advantage”<br>
27:41 — Bug bounty model under threat from AI<br>
33:37 — Mythos practical workflows<br>
45:09 — Geopolitics, NSA angle, and nationalization discussion<br>
01:40:18 — Fortinet zero-day + ongoing failures<br>
01:42:39 — Drift Protocol heist ($285M) + long-term social engineering<br>
01:44:07 — Revisiting XZ Utils / Jia Tan attribution<br>
01:54:07 — Crypto security gaps + need for real CTI in blockchain<br>
02:04:22 — APT28 DNS hijacking + router compromise campaign<br>
02:18:57 — Microsoft driver signing meltdown + ecosystem impact</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/14G3lVzHmbLtwhI8daMVzH-GWVj8PHI6CO1jVah1dW_g/edit?tab=t.0">Transcript</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Claude Mythos Preview " rel="nofollow" href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview </a></li><li><a title="Accidental data leak reveals existence of Anthropic Mythos" rel="nofollow" href="https://archive.ph/oqiUD">Accidental data leak reveals existence of Anthropic Mythos</a></li><li><a title="Project Glasswing" rel="nofollow" href="https://www.anthropic.com/glasswing">Project Glasswing</a></li><li><a title="System Card: Claude Mythos Preview" rel="nofollow" href="https://www-cdn.anthropic.com/08ab9158070959f88f296514c21b7facce6f52bc.pdf">System Card: Claude Mythos Preview</a></li><li><a title="Axios: OpenAI plans new product for cybersecurity use" rel="nofollow" href="https://www.axios.com/2026/04/09/openai-new-model-cyber-mythos-anthopic">Axios: OpenAI plans new product for cybersecurity use</a></li><li><a title="The $285M Drift Protocol Heist Was ‘6 Months in the Making’" rel="nofollow" href="https://decipher.sc/2026/04/05/the-285m-drift-protocol-heist-was-6-months-in-the-making/">The $285M Drift Protocol Heist Was ‘6 Months in the Making’</a></li><li><a title="Drift Protocol - Incident Report" rel="nofollow" href="https://x.com/DriftProtocol/status/2040611161121370409">Drift Protocol - Incident Report</a></li><li><a title="US Treasury to share threat-intel with crypto companies" rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0437">US Treasury to share threat-intel with crypto companies</a></li><li><a title="Fortinet customers confront actively exploited zero-day" rel="nofollow" href="https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/">Fortinet customers confront actively exploited zero-day</a></li><li><a title="Fortinet advisory: CVE-2026-35616 (exploited in the wild)" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">Fortinet advisory: CVE-2026-35616 (exploited in the wild)</a></li><li><a title="SOHO router compromise leads to DNS hijacking" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/">SOHO router compromise leads to DNS hijacking</a></li><li><a title="APT28 exploit routers to enable DNS hijacking operations" rel="nofollow" href="https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations">APT28 exploit routers to enable DNS hijacking operations</a></li><li><a title="DOJ Conducts Court-Authorized Disruption of DNS Hijacking Network Controlled by a Russian Military" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled">DOJ Conducts Court-Authorized Disruption of DNS Hijacking Network Controlled by a Russian Military</a></li><li><a title="Lumen on &#39;Frost Armada&#39; Forest Blizzard DNS Hijacking" rel="nofollow" href="https://www.lumen.com/blog-and-news/en-us/frostarmada-forest-blizzard-dns-hijacking">Lumen on 'Frost Armada' Forest Blizzard DNS Hijacking</a></li><li><a title="WireGuard (Account Suspended)" rel="nofollow" href="https://news.ycombinator.com/item?id=47687884">WireGuard (Account Suspended)</a></li><li><a title="OSR on Microsoft Driver Signing Lockout" rel="nofollow" href="https://x.com/OSRDrivers/status/2042286973461709183">OSR on Microsoft Driver Signing Lockout</a></li><li><a title="Microsoft: Account Verification for Windows Hardware Program" rel="nofollow" href="https://techcommunity.microsoft.com/blog/hardware-dev-center/action-required-account-verification-for-windows-hardware-program-begins-october/4455452">Microsoft: Account Verification for Windows Hardware Program</a></li><li><a title="US Warns of Iran-Linked Cyber Hacks on Water, Energy Systems" rel="nofollow" href="https://archive.ph/nqUvK">US Warns of Iran-Linked Cyber Hacks on Water, Energy Systems</a></li><li><a title="CISA bulletin: Iranian Hackers Exploiting PLCs Across US Critical Infrastructure" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">CISA bulletin: Iranian Hackers Exploiting PLCs Across US Critical Infrastructure</a></li><li><a title="Watch S4: The Bob Lazar Story" rel="nofollow" href="https://www.amazon.com/S4-Lazar-Story-Luigi-Vendittelli/dp/B0GL9JHLGW">Watch S4: The Bob Lazar Story</a></li><li><a title="YouTube: Dan Guido at [un]prompted" rel="nofollow" href="https://www.youtube.com/watch?v=kgwvAyF7qsA">YouTube: Dan Guido at [un]prompted</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.</em>)</p>

<p><strong>Three Buddy Problem - Episode 93</strong>: We discuss Anthropic&#39;s release of Claude Mythos Preview (an AI model so capable and dangerous they won&#39;t release it publicly) and debate the looming patching crisis, bug bounty extinction, possible US government nationalization of frontier labs, and why the NSA might not be thrilled about all this bug-fixing. </p>

<p>Plus, North Korea&#39;s six-month Drift Protocol con job, APT28&#39;s retro DNS hijacking campaign, and Microsoft&#39;s driver signing mess hitting WireGuard and VeraCrypt.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>00:00 — Opening banter<br>
01:36 — Anthropic Mythos Preview + Project Glasswing<br>
06:17 — USG reaction + Wall Street emergency meeting<br>
10:54 — Mythos capabilities vs hype (technical reality check)<br>
13:44 — PR stunt? Skepticism of Anthropic narrative<br>
20:42 — The patching crisis + “defender advantage”<br>
27:41 — Bug bounty model under threat from AI<br>
33:37 — Mythos practical workflows<br>
45:09 — Geopolitics, NSA angle, and nationalization discussion<br>
01:40:18 — Fortinet zero-day + ongoing failures<br>
01:42:39 — Drift Protocol heist ($285M) + long-term social engineering<br>
01:44:07 — Revisiting XZ Utils / Jia Tan attribution<br>
01:54:07 — Crypto security gaps + need for real CTI in blockchain<br>
02:04:22 — APT28 DNS hijacking + router compromise campaign<br>
02:18:57 — Microsoft driver signing meltdown + ecosystem impact</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/14G3lVzHmbLtwhI8daMVzH-GWVj8PHI6CO1jVah1dW_g/edit?tab=t.0">Transcript</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Claude Mythos Preview " rel="nofollow" href="https://red.anthropic.com/2026/mythos-preview/">Claude Mythos Preview </a></li><li><a title="Accidental data leak reveals existence of Anthropic Mythos" rel="nofollow" href="https://archive.ph/oqiUD">Accidental data leak reveals existence of Anthropic Mythos</a></li><li><a title="Project Glasswing" rel="nofollow" href="https://www.anthropic.com/glasswing">Project Glasswing</a></li><li><a title="System Card: Claude Mythos Preview" rel="nofollow" href="https://www-cdn.anthropic.com/08ab9158070959f88f296514c21b7facce6f52bc.pdf">System Card: Claude Mythos Preview</a></li><li><a title="Axios: OpenAI plans new product for cybersecurity use" rel="nofollow" href="https://www.axios.com/2026/04/09/openai-new-model-cyber-mythos-anthopic">Axios: OpenAI plans new product for cybersecurity use</a></li><li><a title="The $285M Drift Protocol Heist Was ‘6 Months in the Making’" rel="nofollow" href="https://decipher.sc/2026/04/05/the-285m-drift-protocol-heist-was-6-months-in-the-making/">The $285M Drift Protocol Heist Was ‘6 Months in the Making’</a></li><li><a title="Drift Protocol - Incident Report" rel="nofollow" href="https://x.com/DriftProtocol/status/2040611161121370409">Drift Protocol - Incident Report</a></li><li><a title="US Treasury to share threat-intel with crypto companies" rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0437">US Treasury to share threat-intel with crypto companies</a></li><li><a title="Fortinet customers confront actively exploited zero-day" rel="nofollow" href="https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/">Fortinet customers confront actively exploited zero-day</a></li><li><a title="Fortinet advisory: CVE-2026-35616 (exploited in the wild)" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-26-099">Fortinet advisory: CVE-2026-35616 (exploited in the wild)</a></li><li><a title="SOHO router compromise leads to DNS hijacking" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2026/04/07/soho-router-compromise-leads-to-dns-hijacking-and-adversary-in-the-middle-attacks/">SOHO router compromise leads to DNS hijacking</a></li><li><a title="APT28 exploit routers to enable DNS hijacking operations" rel="nofollow" href="https://www.ncsc.gov.uk/news/apt28-exploit-routers-to-enable-dns-hijacking-operations">APT28 exploit routers to enable DNS hijacking operations</a></li><li><a title="DOJ Conducts Court-Authorized Disruption of DNS Hijacking Network Controlled by a Russian Military" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-conducts-court-authorized-disruption-dns-hijacking-network-controlled">DOJ Conducts Court-Authorized Disruption of DNS Hijacking Network Controlled by a Russian Military</a></li><li><a title="Lumen on &#39;Frost Armada&#39; Forest Blizzard DNS Hijacking" rel="nofollow" href="https://www.lumen.com/blog-and-news/en-us/frostarmada-forest-blizzard-dns-hijacking">Lumen on 'Frost Armada' Forest Blizzard DNS Hijacking</a></li><li><a title="WireGuard (Account Suspended)" rel="nofollow" href="https://news.ycombinator.com/item?id=47687884">WireGuard (Account Suspended)</a></li><li><a title="OSR on Microsoft Driver Signing Lockout" rel="nofollow" href="https://x.com/OSRDrivers/status/2042286973461709183">OSR on Microsoft Driver Signing Lockout</a></li><li><a title="Microsoft: Account Verification for Windows Hardware Program" rel="nofollow" href="https://techcommunity.microsoft.com/blog/hardware-dev-center/action-required-account-verification-for-windows-hardware-program-begins-october/4455452">Microsoft: Account Verification for Windows Hardware Program</a></li><li><a title="US Warns of Iran-Linked Cyber Hacks on Water, Energy Systems" rel="nofollow" href="https://archive.ph/nqUvK">US Warns of Iran-Linked Cyber Hacks on Water, Energy Systems</a></li><li><a title="CISA bulletin: Iranian Hackers Exploiting PLCs Across US Critical Infrastructure" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa26-097a">CISA bulletin: Iranian Hackers Exploiting PLCs Across US Critical Infrastructure</a></li><li><a title="Watch S4: The Bob Lazar Story" rel="nofollow" href="https://www.amazon.com/S4-Lazar-Story-Luigi-Vendittelli/dp/B0GL9JHLGW">Watch S4: The Bob Lazar Story</a></li><li><a title="YouTube: Dan Guido at [un]prompted" rel="nofollow" href="https://www.youtube.com/watch?v=kgwvAyF7qsA">YouTube: Dan Guido at [un]prompted</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>LLMs writing exploits, engineers losing skills, and a case for the generative OS</title>
  <link>http://securityconversations.fireside.fm/llm-exploit-engineer-skills-generative-os</link>
  <guid isPermaLink="false">3522bb83-8f21-4dff-abdd-01c9891be4d6</guid>
  <pubDate>Fri, 03 Apr 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3522bb83-8f21-4dff-abdd-01c9891be4d6.mp3" length="113808314" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Three Buddy Problem - Episode 92: Costin walks through real-world ransomware incident response while Juanito makes the case for AI-generated operating systems that never run anyone else's code. Plus, debates on whether vulnerability research is cooked, why nobody should pay ransoms, and what the security industry looks like after the massive AI flood.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.   

0:00 – Introductory banter
2:00 – Costin's ransomware incident response work
3:30 – How attackers break in: Fortinet vulnerabilities everywhere
6:30 – Hunting for ransomware decryption keys 
9:00 – Breaking into ransomware C2s and monitoring leak sites
12:00 – The ransom payment debate: should you ever pay?
16:00 – Why "don't pay the ransom" is overgeneralized
21:00 – How ransomware gangs price their demands
24:00 – The AI-pilling of the security industry
28:30 – Nicholas Carlini, Ptacek, and "vulnerability research is cooked"
35:00 – Towards a generative-first operating system
41:00 – Code factories, trusted computing, and killing dependencies
48:00 – Microsoft and Apple's AI positioning
56:00 – Chris St. Myers' "Cognitive Rust Belt" essay
1:18:00 – Choice, The Matrix, and the illusion of control
1:38:00 – Supply chain attacks, North Korea, and dependency sprawl
</itunes:subtitle>
  <itunes:duration>2:19:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3522bb83-8f21-4dff-abdd-01c9891be4d6/cover.jpg?v=1"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)
Three Buddy Problem - Episode 92: Costin walks through real-world ransomware incident response while Juanito makes the case for AI-generated operating systems that never run anyone else's code. Plus, debates on whether vulnerability research is cooked, why nobody should pay ransoms, and what the security industry looks like after the massive AI flood.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
0:00 – Introductory banter
2:00 – Costin's ransomware incident response work
3:30 – How attackers break in: Fortinet vulnerabilities everywhere
6:30 – Hunting for ransomware decryption keys 
9:00 – Breaking into ransomware C2s and monitoring leak sites
12:00 – The ransom payment debate: should you ever pay?
16:00 – Why "don't pay the ransom" is overgeneralized
21:00 – How ransomware gangs price their demands
24:00 – The AI-pilling of the security industry
28:30 – Nicholas Carlini, Ptacek, and "vulnerability research is cooked"
35:00 – Towards a generative-first operating system
41:00 – Code factories, trusted computing, and killing dependencies
48:00 – Microsoft and Apple's AI positioning
56:00 – Chris St. Myers' "Cognitive Rust Belt" essay
1:18:00 – Choice, The Matrix, and the illusion of control
1:38:00 – Supply chain attacks, North Korea, and dependency sprawl
</description>
  <itunes:keywords>ransomware, decryption, russia, AI, Apple, iOS, Coruna, DarkSword, iOS 18, exploit kit, WhatApp, spyware, axios, npm, north korea, blue noroff, supply chain, Elastic, Thomas Ptacek, Calif, AI bugs, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 92</strong>: Costin walks through real-world ransomware incident response while Juanito makes the case for AI-generated operating systems that never run anyone else&#39;s code. Plus, debates on whether vulnerability research is cooked, why nobody should pay ransoms, and what the security industry looks like after the massive AI flood.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>0:00 – Introductory banter<br>
2:00 – Costin&#39;s ransomware incident response work<br>
3:30 – How attackers break in: Fortinet vulnerabilities everywhere<br>
6:30 – Hunting for ransomware decryption keys <br>
9:00 – Breaking into ransomware C2s and monitoring leak sites<br>
12:00 – The ransom payment debate: should you ever pay?<br>
16:00 – Why &quot;don&#39;t pay the ransom&quot; is overgeneralized<br>
21:00 – How ransomware gangs price their demands<br>
24:00 – The AI-pilling of the security industry<br>
28:30 – Nicholas Carlini, Ptacek, and &quot;vulnerability research is cooked&quot;<br>
35:00 – Towards a generative-first operating system<br>
41:00 – Code factories, trusted computing, and killing dependencies<br>
48:00 – Microsoft and Apple&#39;s AI positioning<br>
56:00 – Chris St. Myers&#39; &quot;Cognitive Rust Belt&quot; essay<br>
1:18:00 – Choice, The Matrix, and the illusion of control<br>
1:38:00 – Supply chain attacks, North Korea, and dependency sprawl</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1U_trUjJ2pr3MFSPJocqpD5zzFoPCq7w_zRqUaqAcoD8/edit?tab=t.0#heading=h.l8bcya3t95p">Transcript</a></li><li><a title="Nicholas Carlini - Black-hat LLMs" rel="nofollow" href="https://www.youtube.com/watch?v=1sd26pWhfmg">Nicholas Carlini - Black-hat LLMs</a></li><li><a title="Ptacek: Vulnerability Research Is Cooked" rel="nofollow" href="https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/">Ptacek: Vulnerability Research Is Cooked</a></li><li><a title="Chris St Myers: Why Organizations Are Confusing Temporary Friction with Permanent Safety" rel="nofollow" href="https://www.sentinelone.com/blog/the-implementation-blind-spot-why-organizations-are-confusing-temporary-friction-with-permanent-safety/">Chris St Myers: Why Organizations Are Confusing Temporary Friction with Permanent Safety</a></li><li><a title="Dan Geer: Children of the Magenta" rel="nofollow" href="https://www.computer.org/csdl/magazine/sp/2015/05/msp2015050104/13rRUxASutL">Dan Geer: Children of the Magenta</a></li><li><a title="Calif: Month of AI-Discovered Bugs" rel="nofollow" href="https://blog.calif.io/p/mad-bugs-month-of-ai-discovered-bugs">Calif: Month of AI-Discovered Bugs</a></li><li><a title="Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell" rel="nofollow" href="https://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd">Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell</a></li><li><a title="Internet Bug Bounty Pauses Bug Bounty Program " rel="nofollow" href="https://hackerone.com/ibb/policy_versions?change=3771829&amp;type=team">Internet Bug Bounty Pauses Bug Bounty Program </a></li><li><a title="Node.js Bug Bounty Program Paused Due to Loss of Funding" rel="nofollow" href="https://nodejs.org/en/blog/announcements/discontinuing-security-bug-bounties">Node.js Bug Bounty Program Paused Due to Loss of Funding</a></li><li><a title="Elastic: How we caught the Axios supply chain attack" rel="nofollow" href="https://www.elastic.co/security-labs/how-we-caught-the-axios-supply-chain-attack">Elastic: How we caught the Axios supply chain attack</a></li><li><a title="Elastic tool: supply-chain-monitor " rel="nofollow" href="https://github.com/elastic/supply-chain-monitor">Elastic tool: supply-chain-monitor </a></li><li><a title="Apple Will Push Out Rare ‘Backported’ Patches to iOS 18 Users" rel="nofollow" href="https://archive.ph/lnKTe">Apple Will Push Out Rare ‘Backported’ Patches to iOS 18 Users</a></li><li><a title="WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware" rel="nofollow" href="https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html">WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware</a></li><li><a title="The Human-Machine Team" rel="nofollow" href="https://www.amazon.com/Human-Machine-Team-Artificial-Intelligence-Revolutionize/dp/B0948LGS3K">The Human-Machine Team</a></li><li><a title="Arsenal Recon Tool" rel="nofollow" href="https://arsenalrecon.com/additional-products">Arsenal Recon Tool</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 92</strong>: Costin walks through real-world ransomware incident response while Juanito makes the case for AI-generated operating systems that never run anyone else&#39;s code. Plus, debates on whether vulnerability research is cooked, why nobody should pay ransoms, and what the security industry looks like after the massive AI flood.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>0:00 – Introductory banter<br>
2:00 – Costin&#39;s ransomware incident response work<br>
3:30 – How attackers break in: Fortinet vulnerabilities everywhere<br>
6:30 – Hunting for ransomware decryption keys <br>
9:00 – Breaking into ransomware C2s and monitoring leak sites<br>
12:00 – The ransom payment debate: should you ever pay?<br>
16:00 – Why &quot;don&#39;t pay the ransom&quot; is overgeneralized<br>
21:00 – How ransomware gangs price their demands<br>
24:00 – The AI-pilling of the security industry<br>
28:30 – Nicholas Carlini, Ptacek, and &quot;vulnerability research is cooked&quot;<br>
35:00 – Towards a generative-first operating system<br>
41:00 – Code factories, trusted computing, and killing dependencies<br>
48:00 – Microsoft and Apple&#39;s AI positioning<br>
56:00 – Chris St. Myers&#39; &quot;Cognitive Rust Belt&quot; essay<br>
1:18:00 – Choice, The Matrix, and the illusion of control<br>
1:38:00 – Supply chain attacks, North Korea, and dependency sprawl</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1U_trUjJ2pr3MFSPJocqpD5zzFoPCq7w_zRqUaqAcoD8/edit?tab=t.0#heading=h.l8bcya3t95p">Transcript</a></li><li><a title="Nicholas Carlini - Black-hat LLMs" rel="nofollow" href="https://www.youtube.com/watch?v=1sd26pWhfmg">Nicholas Carlini - Black-hat LLMs</a></li><li><a title="Ptacek: Vulnerability Research Is Cooked" rel="nofollow" href="https://sockpuppet.org/blog/2026/03/30/vulnerability-research-is-cooked/">Ptacek: Vulnerability Research Is Cooked</a></li><li><a title="Chris St Myers: Why Organizations Are Confusing Temporary Friction with Permanent Safety" rel="nofollow" href="https://www.sentinelone.com/blog/the-implementation-blind-spot-why-organizations-are-confusing-temporary-friction-with-permanent-safety/">Chris St Myers: Why Organizations Are Confusing Temporary Friction with Permanent Safety</a></li><li><a title="Dan Geer: Children of the Magenta" rel="nofollow" href="https://www.computer.org/csdl/magazine/sp/2015/05/msp2015050104/13rRUxASutL">Dan Geer: Children of the Magenta</a></li><li><a title="Calif: Month of AI-Discovered Bugs" rel="nofollow" href="https://blog.calif.io/p/mad-bugs-month-of-ai-discovered-bugs">Calif: Month of AI-Discovered Bugs</a></li><li><a title="Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell" rel="nofollow" href="https://blog.calif.io/p/mad-bugs-claude-wrote-a-full-freebsd">Claude Wrote a Full FreeBSD Remote Kernel RCE with Root Shell</a></li><li><a title="Internet Bug Bounty Pauses Bug Bounty Program " rel="nofollow" href="https://hackerone.com/ibb/policy_versions?change=3771829&amp;type=team">Internet Bug Bounty Pauses Bug Bounty Program </a></li><li><a title="Node.js Bug Bounty Program Paused Due to Loss of Funding" rel="nofollow" href="https://nodejs.org/en/blog/announcements/discontinuing-security-bug-bounties">Node.js Bug Bounty Program Paused Due to Loss of Funding</a></li><li><a title="Elastic: How we caught the Axios supply chain attack" rel="nofollow" href="https://www.elastic.co/security-labs/how-we-caught-the-axios-supply-chain-attack">Elastic: How we caught the Axios supply chain attack</a></li><li><a title="Elastic tool: supply-chain-monitor " rel="nofollow" href="https://github.com/elastic/supply-chain-monitor">Elastic tool: supply-chain-monitor </a></li><li><a title="Apple Will Push Out Rare ‘Backported’ Patches to iOS 18 Users" rel="nofollow" href="https://archive.ph/lnKTe">Apple Will Push Out Rare ‘Backported’ Patches to iOS 18 Users</a></li><li><a title="WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware" rel="nofollow" href="https://thehackernews.com/2026/04/whatsapp-alerts-200-users-after-fake.html">WhatsApp Alerts 200 Users After Fake iOS App Installed Spyware</a></li><li><a title="The Human-Machine Team" rel="nofollow" href="https://www.amazon.com/Human-Machine-Team-Artificial-Intelligence-Revolutionize/dp/B0948LGS3K">The Human-Machine Team</a></li><li><a title="Arsenal Recon Tool" rel="nofollow" href="https://arsenalrecon.com/additional-products">Arsenal Recon Tool</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Cyber Disruption Unit; Coruna is Triangulation, US Bans Foreign-Made Routers</title>
  <link>http://securityconversations.fireside.fm/1</link>
  <guid isPermaLink="false">020fab1b-ad5d-4221-95a4-910623065a2d</guid>
  <pubDate>Sat, 28 Mar 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/020fab1b-ad5d-4221-95a4-910623065a2d.mp3" length="129104025" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Three Buddy Problem - Episode 91: This week we dig into Google's new cyber threat disruption unit announced at RSAC, Kaspersky confirming Coruna is a direct evolution of Operation Triangulation, and a cascading supply chain compromise that chained through LiteLLM, Trivy, and Checkmarx into thousands of software pipelines. 

Plus, VCs and the breathless AI hype, Apple's iOS 26.4 and silent patches, the FCC's ban on foreign-made routers, and Symantec catching an APT looking for Chinese military data.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  

0:00 Intro &amp; Pre-Show Banter
3:08 JAGS in San Francisco: RSAC week recap
6:05 Google Launches Cyber Disruption Unit — What's Actually New?
13:43 Why Separate Disruption Units Matter: ROI &amp; Budget Justification
29:11 Haroon Meer's RSA Reality Check: The AI Hype Machine
32:37 The VC Ponzi Cycle &amp; How Easy Money Hollowed Out Cybersecurity
47:32 ENT.ai &amp; Tenex AI Hackathon at RSAC
53:08 Kaspersky Links Corona Exploit Kit to Operation Triangulation
1:08:09 Trenchant Cleanup &amp; Lessons from Equation Group Burns
1:19:31 Apple iOS Patches, Hong Kong Device Passcode Law 
1:27:53 Handala Hacks FBI Director Kash Patel's Personal Gmail
1:37:32 LeakBase Admin "Chucky" Arrested in Russia — FSB Gets the Data
1:45:38 Supply Chain Attacks: TeamPCP Hits LiteLLM &amp; Trivy
2:04:34 FCC Bans Foreign-Made Routers — But What Do We Buy?</itunes:subtitle>
  <itunes:duration>2:32:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/020fab1b-ad5d-4221-95a4-910623065a2d/cover.jpg?v=1"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)
Three Buddy Problem - Episode 91: This week we dig into Google's new cyber threat disruption unit announced at RSAC, Kaspersky confirming Coruna is a direct evolution of Operation Triangulation, and a cascading supply chain compromise that chained through LiteLLM, Trivy, and Checkmarx into thousands of software pipelines. 
Plus, VCs and the breathless AI hype, Apple's iOS 26.4 and silent patches, the FCC's ban on foreign-made routers, and Symantec catching an APT looking for Chinese military data.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
0:00 Intro &amp;amp; Pre-Show Banter
3:08 JAGS in San Francisco: RSAC week recap
6:05 Google Launches Cyber Disruption Unit — What's Actually New?
13:43 Why Separate Disruption Units Matter: ROI &amp;amp; Budget Justification
29:11 Haroon Meer's RSA Reality Check: The AI Hype Machine
32:37 The VC Ponzi Cycle &amp;amp; How Easy Money Hollowed Out Cybersecurity
47:32 ENT.ai &amp;amp; Tenex AI Hackathon at RSAC
53:08 Kaspersky Links Corona Exploit Kit to Operation Triangulation
1:08:09 Trenchant Cleanup &amp;amp; Lessons from Equation Group Burns
1:19:31 Apple iOS Patches, Hong Kong Device Passcode Law 
1:27:53 Handala Hacks FBI Director Kash Patel's Personal Gmail
1:37:32 LeakBase Admin "Chucky" Arrested in Russia — FSB Gets the Data
1:45:38 Supply Chain Attacks: TeamPCP Hits LiteLLM &amp;amp; Trivy
2:04:34 FCC Bans Foreign-Made Routers — But What Do We Buy? 
</description>
  <itunes:keywords>Apple, iOS, iOS 26.4, Coruna, Triangulation, Kaspersky, Trenchant, DarkSword, Hong Kong, Cisco, Oracle, zero-day, RSAC, AI hype, Stryker, Handala, Russia, Leakbase, LiteLLM, PyPI, Trivy, Checkmarx, Claude, OpenAI, Anthropic, Speagle, google, TP-Link, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 91</strong>: This week we dig into Google&#39;s new cyber threat disruption unit announced at RSAC, Kaspersky confirming Coruna is a direct evolution of Operation Triangulation, and a cascading supply chain compromise that chained through LiteLLM, Trivy, and Checkmarx into thousands of software pipelines. </p>

<p>Plus, VCs and the breathless AI hype, Apple&#39;s iOS 26.4 and silent patches, the FCC&#39;s ban on foreign-made routers, and Symantec catching an APT looking for Chinese military data.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>0:00 Intro &amp; Pre-Show Banter<br>
3:08 JAGS in San Francisco: RSAC week recap<br>
6:05 Google Launches Cyber Disruption Unit — What&#39;s Actually New?<br>
13:43 Why Separate Disruption Units Matter: ROI &amp; Budget Justification<br>
29:11 Haroon Meer&#39;s RSA Reality Check: The AI Hype Machine<br>
32:37 The VC Ponzi Cycle &amp; How Easy Money Hollowed Out Cybersecurity<br>
47:32 ENT.ai &amp; Tenex AI Hackathon at RSAC<br>
53:08 Kaspersky Links Corona Exploit Kit to Operation Triangulation<br>
1:08:09 Trenchant Cleanup &amp; Lessons from Equation Group Burns<br>
1:19:31 Apple iOS Patches, Hong Kong Device Passcode Law <br>
1:27:53 Handala Hacks FBI Director Kash Patel&#39;s Personal Gmail<br>
1:37:32 LeakBase Admin &quot;Chucky&quot; Arrested in Russia — FSB Gets the Data<br>
1:45:38 Supply Chain Attacks: TeamPCP Hits LiteLLM &amp; Trivy<br>
2:04:34 FCC Bans Foreign-Made Routers — But What Do We Buy?</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/11MJU1XFXzjukFrkVnS6FtxHCXwfhX-WcoxmQOhcjYzU/edit?tab=t.0">Transcript</a></li><li><a title="TLPBLACK Solutions" rel="nofollow" href="https://tlpblack.net/#solutions-pdns">TLPBLACK Solutions</a></li><li><a title="Google launches threat disruption unit at RSAC" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/">Google launches threat disruption unit at RSAC</a></li><li><a title="White House downplays cyber ‘letters of marque’ speculation" rel="nofollow" href="https://therecord.media/offensive-cyber-white-house-hacking">White House downplays cyber ‘letters of marque’ speculation</a></li><li><a title="Haroon Meer on RSAC 2026" rel="nofollow" href="https://blog.thinkst.com/2026/03/rsac-infosec-themes-and-crumby-products.html">Haroon Meer on RSAC 2026</a></li><li><a title="Kaspersky on Coruna/Triangulation Connection" rel="nofollow" href="https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/">Kaspersky on Coruna/Triangulation Connection</a></li><li><a title="Apple Security Bulletin - iOS 26.4" rel="nofollow" href="https://support.apple.com/en-us/126792">Apple Security Bulletin - iOS 26.4</a></li><li><a title="Reverse engineering Apple’s silent security fixes" rel="nofollow" href="https://blog.calif.io/p/reverse-engineering-apples-silent">Reverse engineering Apple’s silent security fixes</a></li><li><a title="New Hong Kong Law on Phone/Laptop Passwords" rel="nofollow" href="https://hk.usconsulate.gov/security-alert-2026032601/">New Hong Kong Law on Phone/Laptop Passwords</a></li><li><a title="Iran-linked hackers breach FBI director&#39;s personal email" rel="nofollow" href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/">Iran-linked hackers breach FBI director's personal email</a></li><li><a title="US DOJ Disrupts Iranian Cyber Enabled Psychological Operations" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-iranian-cyber-enabled-psychological-operations">US DOJ Disrupts Iranian Cyber Enabled Psychological Operations</a></li><li><a title="Official Statement on Stryker Network Disruption" rel="nofollow" href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">Official Statement on Stryker Network Disruption</a></li><li><a title="Russia arrests Leakbase admin" rel="nofollow" href="https://tass.ru/proisshestviya/26879969">Russia arrests Leakbase admin</a></li><li><a title="Trivy ecosystem supply chain compromised (Advisory)" rel="nofollow" href="https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23">Trivy ecosystem supply chain compromised (Advisory)</a></li><li><a title="Self-propagating malware poisons open source software and wipes Iran-based machines" rel="nofollow" href="https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/">Self-propagating malware poisons open source software and wipes Iran-based machines</a></li><li><a title="New Malware Targets Users of Cobra DocGuard Software" rel="nofollow" href="https://www.security.com/threat-intelligence/speagle-cobradocguard-infostealer">New Malware Targets Users of Cobra DocGuard Software</a></li><li><a title="FCC bans &#39;foreign made&#39; consumer routers (PDF)" rel="nofollow" href="https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf">FCC bans 'foreign made' consumer routers (PDF)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 91</strong>: This week we dig into Google&#39;s new cyber threat disruption unit announced at RSAC, Kaspersky confirming Coruna is a direct evolution of Operation Triangulation, and a cascading supply chain compromise that chained through LiteLLM, Trivy, and Checkmarx into thousands of software pipelines. </p>

<p>Plus, VCs and the breathless AI hype, Apple&#39;s iOS 26.4 and silent patches, the FCC&#39;s ban on foreign-made routers, and Symantec catching an APT looking for Chinese military data.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>

<p>0:00 Intro &amp; Pre-Show Banter<br>
3:08 JAGS in San Francisco: RSAC week recap<br>
6:05 Google Launches Cyber Disruption Unit — What&#39;s Actually New?<br>
13:43 Why Separate Disruption Units Matter: ROI &amp; Budget Justification<br>
29:11 Haroon Meer&#39;s RSA Reality Check: The AI Hype Machine<br>
32:37 The VC Ponzi Cycle &amp; How Easy Money Hollowed Out Cybersecurity<br>
47:32 ENT.ai &amp; Tenex AI Hackathon at RSAC<br>
53:08 Kaspersky Links Corona Exploit Kit to Operation Triangulation<br>
1:08:09 Trenchant Cleanup &amp; Lessons from Equation Group Burns<br>
1:19:31 Apple iOS Patches, Hong Kong Device Passcode Law <br>
1:27:53 Handala Hacks FBI Director Kash Patel&#39;s Personal Gmail<br>
1:37:32 LeakBase Admin &quot;Chucky&quot; Arrested in Russia — FSB Gets the Data<br>
1:45:38 Supply Chain Attacks: TeamPCP Hits LiteLLM &amp; Trivy<br>
2:04:34 FCC Bans Foreign-Made Routers — But What Do We Buy?</p><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/11MJU1XFXzjukFrkVnS6FtxHCXwfhX-WcoxmQOhcjYzU/edit?tab=t.0">Transcript</a></li><li><a title="TLPBLACK Solutions" rel="nofollow" href="https://tlpblack.net/#solutions-pdns">TLPBLACK Solutions</a></li><li><a title="Google launches threat disruption unit at RSAC" rel="nofollow" href="https://www.nextgov.com/cybersecurity/2026/03/google-launches-threat-disruption-unit-stops-short-calling-it-offensive/412321/">Google launches threat disruption unit at RSAC</a></li><li><a title="White House downplays cyber ‘letters of marque’ speculation" rel="nofollow" href="https://therecord.media/offensive-cyber-white-house-hacking">White House downplays cyber ‘letters of marque’ speculation</a></li><li><a title="Haroon Meer on RSAC 2026" rel="nofollow" href="https://blog.thinkst.com/2026/03/rsac-infosec-themes-and-crumby-products.html">Haroon Meer on RSAC 2026</a></li><li><a title="Kaspersky on Coruna/Triangulation Connection" rel="nofollow" href="https://securelist.com/coruna-framework-updated-operation-triangulation-exploit/119228/">Kaspersky on Coruna/Triangulation Connection</a></li><li><a title="Apple Security Bulletin - iOS 26.4" rel="nofollow" href="https://support.apple.com/en-us/126792">Apple Security Bulletin - iOS 26.4</a></li><li><a title="Reverse engineering Apple’s silent security fixes" rel="nofollow" href="https://blog.calif.io/p/reverse-engineering-apples-silent">Reverse engineering Apple’s silent security fixes</a></li><li><a title="New Hong Kong Law on Phone/Laptop Passwords" rel="nofollow" href="https://hk.usconsulate.gov/security-alert-2026032601/">New Hong Kong Law on Phone/Laptop Passwords</a></li><li><a title="Iran-linked hackers breach FBI director&#39;s personal email" rel="nofollow" href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/">Iran-linked hackers breach FBI director's personal email</a></li><li><a title="US DOJ Disrupts Iranian Cyber Enabled Psychological Operations" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-iranian-cyber-enabled-psychological-operations">US DOJ Disrupts Iranian Cyber Enabled Psychological Operations</a></li><li><a title="Official Statement on Stryker Network Disruption" rel="nofollow" href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">Official Statement on Stryker Network Disruption</a></li><li><a title="Russia arrests Leakbase admin" rel="nofollow" href="https://tass.ru/proisshestviya/26879969">Russia arrests Leakbase admin</a></li><li><a title="Trivy ecosystem supply chain compromised (Advisory)" rel="nofollow" href="https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23">Trivy ecosystem supply chain compromised (Advisory)</a></li><li><a title="Self-propagating malware poisons open source software and wipes Iran-based machines" rel="nofollow" href="https://arstechnica.com/security/2026/03/self-propagating-malware-poisons-open-source-software-and-wipes-iran-based-machines/">Self-propagating malware poisons open source software and wipes Iran-based machines</a></li><li><a title="New Malware Targets Users of Cobra DocGuard Software" rel="nofollow" href="https://www.security.com/threat-intelligence/speagle-cobradocguard-infostealer">New Malware Targets Users of Cobra DocGuard Software</a></li><li><a title="FCC bans &#39;foreign made&#39; consumer routers (PDF)" rel="nofollow" href="https://docs.fcc.gov/public/attachments/DOC-420034A1.pdf">FCC bans 'foreign made' consumer routers (PDF)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>The greatest APT hunter of all time, Apple's exploit kit problem, Microsoft FedRAMP mess</title>
  <link>http://securityconversations.fireside.fm/sergey-mineev-apple-darksword-exploit-kit-fedramp-microsoft</link>
  <guid isPermaLink="false">3faf0dca-154f-4bf1-a297-a945ce9c457c</guid>
  <pubDate>Fri, 20 Mar 2026 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3faf0dca-154f-4bf1-a297-a945ce9c457c.mp3" length="120657732" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 90: We remember GReAT teammate Sergey Mineev, the legendary malware hunter behind discoveries like Equation Group and Project Sauron (Remsec), including stories about his methods and why he was the best to ever do it. 

Plus, another in-the-wild iOS exploit kit discovery and a long overdue conversation about Apple's responsibility to hundreds of millions of users on older iOS versions; the ProPublica Microsoft/FedRAMP bombshell, Interlock ransomware sitting on a Cisco zero-day, the White House AI policy framework, and Supermicro co-founder $2.5 billion AI chip smuggling bust.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:27:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3faf0dca-154f-4bf1-a297-a945ce9c457c/cover.jpg?v=1"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 90: We remember GReAT teammate Sergey Mineev, the legendary malware hunter behind discoveries like Equation Group and Project Sauron (Remsec), including stories about his methods and why he was the best to ever do it. 
Plus, another in-the-wild iOS exploit kit discovery and a long overdue conversation about Apple's responsibility to hundreds of millions of users on older iOS versions; the ProPublica Microsoft/FedRAMP bombshell, Interlock ransomware sitting on a Cisco zero-day, the White House AI policy framework, and Supermicro co-founder $2.5 billion AI chip smuggling bust.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Apple, iOS, exploit kit, Coruna, DarkSword, iVerify, Google, zero-day, AWS, Interlock, ransomware, AI policy, US Gov, Iran, Israel</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 90</strong>: We remember GReAT teammate Sergey Mineev, the legendary malware hunter behind discoveries like Equation Group and Project Sauron (Remsec), including stories about his methods and why he was the best to ever do it. </p>

<p>Plus, another in-the-wild iOS exploit kit discovery and a long overdue conversation about Apple&#39;s responsibility to hundreds of millions of users on older iOS versions; the ProPublica Microsoft/FedRAMP bombshell, Interlock ransomware sitting on a Cisco zero-day, the White House AI policy framework, and Supermicro co-founder $2.5 billion AI chip smuggling bust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript " rel="nofollow" href="https://docs.google.com/document/d/1omZagfRGkZZLy3O_t_YmBl_dfbXPQ03QjnFAM2Sw9XE/edit?tab=t.0">Transcript </a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/">Thinkst Canary</a></li><li><a title="Equation Group: The Crown Creator of Cyber-Espionage" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/equation-group-the-crown-creator-of-cyber-espionage">Equation Group: The Crown Creator of Cyber-Espionage</a></li><li><a title="The Project Sauron APT" rel="nofollow" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07190154/The-ProjectSauron-APT_research_KL.pdf">The Project Sauron APT</a></li><li><a title="Google: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">Google: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</a></li><li><a title="iVerify: Inside DarkSword - A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites" rel="nofollow" href="https://iverify.io/blog/darksword-ios-exploit-kit-explained">iVerify: Inside DarkSword - A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites</a></li><li><a title="Lookout: Attackers Wielding DarkSword Threaten iOS Users" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/darksword">Lookout: Attackers Wielding DarkSword Threaten iOS Users</a></li><li><a title="Apple statement on Coruna, DarkSword" rel="nofollow" href="https://support.apple.com/en-us/126776">Apple statement on Coruna, DarkSword</a></li><li><a title="Amazon discovers Interlock ransomware hitting enterprise firewalls" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/">Amazon discovers Interlock ransomware hitting enterprise firewalls</a></li><li><a title="Cisco Secure Firewall Management Center RCE Flaw" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh">Cisco Secure Firewall Management Center RCE Flaw</a></li><li><a title="CISA Urges Endpoint Management System Hardening After Stryker Attack" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization">CISA Urges Endpoint Management System Hardening After Stryker Attack</a></li><li><a title="Stryker statements on wiper network disruption" rel="nofollow" href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">Stryker statements on wiper network disruption</a></li><li><a title="Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway." rel="nofollow" href="https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government">Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.</a></li><li><a title="White House Unveils National AI Legislative Framework" rel="nofollow" href="https://www.whitehouse.gov/articles/2026/03/president-donald-j-trump-unveils-national-ai-legislative-framework/">White House Unveils National AI Legislative Framework</a></li><li><a title="Supermicro Founder Charged with Diverting AI tech to China" rel="nofollow" href="https://www.justice.gov/opa/pr/three-charged-conspiring-unlawfully-divert-cutting-edge-us-artificial-intelligence">Supermicro Founder Charged with Diverting AI tech to China</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 90</strong>: We remember GReAT teammate Sergey Mineev, the legendary malware hunter behind discoveries like Equation Group and Project Sauron (Remsec), including stories about his methods and why he was the best to ever do it. </p>

<p>Plus, another in-the-wild iOS exploit kit discovery and a long overdue conversation about Apple&#39;s responsibility to hundreds of millions of users on older iOS versions; the ProPublica Microsoft/FedRAMP bombshell, Interlock ransomware sitting on a Cisco zero-day, the White House AI policy framework, and Supermicro co-founder $2.5 billion AI chip smuggling bust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript " rel="nofollow" href="https://docs.google.com/document/d/1omZagfRGkZZLy3O_t_YmBl_dfbXPQ03QjnFAM2Sw9XE/edit?tab=t.0">Transcript </a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/">Thinkst Canary</a></li><li><a title="Equation Group: The Crown Creator of Cyber-Espionage" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/equation-group-the-crown-creator-of-cyber-espionage">Equation Group: The Crown Creator of Cyber-Espionage</a></li><li><a title="The Project Sauron APT" rel="nofollow" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/07190154/The-ProjectSauron-APT_research_KL.pdf">The Project Sauron APT</a></li><li><a title="Google: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/darksword-ios-exploit-chain">Google: The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors</a></li><li><a title="iVerify: Inside DarkSword - A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites" rel="nofollow" href="https://iverify.io/blog/darksword-ios-exploit-kit-explained">iVerify: Inside DarkSword - A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites</a></li><li><a title="Lookout: Attackers Wielding DarkSword Threaten iOS Users" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/darksword">Lookout: Attackers Wielding DarkSword Threaten iOS Users</a></li><li><a title="Apple statement on Coruna, DarkSword" rel="nofollow" href="https://support.apple.com/en-us/126776">Apple statement on Coruna, DarkSword</a></li><li><a title="Amazon discovers Interlock ransomware hitting enterprise firewalls" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-campaign-targeting-enterprise-firewalls/">Amazon discovers Interlock ransomware hitting enterprise firewalls</a></li><li><a title="Cisco Secure Firewall Management Center RCE Flaw" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-rce-NKhnULJh">Cisco Secure Firewall Management Center RCE Flaw</a></li><li><a title="CISA Urges Endpoint Management System Hardening After Stryker Attack" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2026/03/18/cisa-urges-endpoint-management-system-hardening-after-cyberattack-against-us-organization">CISA Urges Endpoint Management System Hardening After Stryker Attack</a></li><li><a title="Stryker statements on wiper network disruption" rel="nofollow" href="https://www.stryker.com/us/en/about/news/2026/a-message-to-our-customers-03-2026.html">Stryker statements on wiper network disruption</a></li><li><a title="Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway." rel="nofollow" href="https://www.propublica.org/article/microsoft-cloud-fedramp-cybersecurity-government">Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway.</a></li><li><a title="White House Unveils National AI Legislative Framework" rel="nofollow" href="https://www.whitehouse.gov/articles/2026/03/president-donald-j-trump-unveils-national-ai-legislative-framework/">White House Unveils National AI Legislative Framework</a></li><li><a title="Supermicro Founder Charged with Diverting AI tech to China" rel="nofollow" href="https://www.justice.gov/opa/pr/three-charged-conspiring-unlawfully-divert-cutting-edge-us-artificial-intelligence">Supermicro Founder Charged with Diverting AI tech to China</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Handala wiper attacks, APT28 implant devs are back, Signal's verification problems</title>
  <link>http://securityconversations.fireside.fm/handala-wiper-stryker-apt28-signal-whatsapp-coruna-patches</link>
  <guid isPermaLink="false">21fe7ed6-897b-4dee-a445-18a9deab022a</guid>
  <pubDate>Fri, 13 Mar 2026 17:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/21fe7ed6-897b-4dee-a445-18a9deab022a.mp3" length="85654180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Three Buddy Problem - Episode 89: We discuss Iran hacktivist group 'Handala' wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran's cyber retaliation is as scary as the headlines suggest.

Plus, ESET's discovery that Russia's APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit's proliferation chain.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>1:44:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/21fe7ed6-897b-4dee-a445-18a9deab022a/cover.jpg?v=1"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)
Three Buddy Problem - Episode 89: We discuss Iran hacktivist group 'Handala' wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran's cyber retaliation is as scary as the headlines suggest.
Plus, ESET's discovery that Russia's APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit's proliferation chain.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>russia, MIVD, AIVD, Signal, WhatsApp, Stryker, Iran, Israel, wiper, Handala, cyberwarfare, cyber strategy, Poland, nuclear, Apple, Coruna, Trenchant, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 89</strong>: We discuss Iran hacktivist group &#39;Handala&#39; wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran&#39;s cyber retaliation is as scary as the headlines suggest.</p>

<p>Plus, ESET&#39;s discovery that Russia&#39;s APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit&#39;s proliferation chain.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (raw, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1zhtku2XeCIhpAs7pa_p34-Rypy9WzyTdZc-pyyx6cTc/edit?tab=t.0">Transcript (raw, AI-generated)</a></li><li><a title="TLPBLACK Solutions" rel="nofollow" href="https://tlpblack.net/#solutions">TLPBLACK Solutions</a></li><li><a title="Kim Zetter: Iranian Hacktivists Strike Medical Device Maker Stryker in &quot;Severe&quot; Attack that Wiped Systems" rel="nofollow" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/">Kim Zetter: Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems</a></li><li><a title="Stryker Cyberattack Adds to Fears of New Front in Iran War" rel="nofollow" href="https://www.nytimes.com/2026/03/12/world/middleeast/stryker-iran-cyberattack.html">Stryker Cyberattack Adds to Fears of New Front in Iran War</a></li><li><a title="Bloomberg: Cyberattack Hits Stryker; Pro-Iran Group Claims Credit" rel="nofollow" href="https://archive.ph/7wpe7">Bloomberg: Cyberattack Hits Stryker; Pro-Iran Group Claims Credit</a></li><li><a title="Who is Handala? (Malpedia)" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/handala">Who is Handala? (Malpedia)</a></li><li><a title="Palo Alto: Increased Risk of Wiper Attacks" rel="nofollow" href="https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks/">Palo Alto: Increased Risk of Wiper Attacks</a></li><li><a title="CISA Advisories on Iran State-Sponsored Cyber Threat" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/iran/publications">CISA Advisories on Iran State-Sponsored Cyber Threat</a></li><li><a title="Russia state actors targets Signal and WhatsApp accounts" rel="nofollow" href="https://english.aivd.nl/latest/news/2026/03/09/russia-targets-signal-and-whatsapp-accounts-in-cyber-campaign">Russia state actors targets Signal and WhatsApp accounts</a></li><li><a title="Dutch intel report on Signal, WhatsApp targeting" rel="nofollow" href="https://drive.google.com/file/d/1ZWvYkM_09GULHogLSlXA4Yb8PPlRfnBP/view">Dutch intel report on Signal, WhatsApp targeting</a></li><li><a title="Signal responds to Dutch Intel report" rel="nofollow" href="https://bsky.app/profile/signal.org/post/3mgnap76pnk2a">Signal responds to Dutch Intel report</a></li><li><a title="ESET: Resurgence of one of Russia’s most notorious APT groups" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/">ESET: Resurgence of one of Russia’s most notorious APT groups</a></li><li><a title="Poland says foiled cyberattack on nuclear centre may have come from Iran" rel="nofollow" href="https://www.reuters.com/world/poland-says-foiled-cyberattack-nuclear-centre-may-have-come-iran-2026-03-12/">Poland says foiled cyberattack on nuclear centre may have come from Iran</a></li><li><a title="Apple ships iOS 16.7.15 to cover &#39;Coruna&#39; exploits" rel="nofollow" href="https://support.apple.com/en-us/126646">Apple ships iOS 16.7.15 to cover 'Coruna' exploits</a></li><li><a title="Apple iOS 15.8.7 covers &#39;Coruna&#39; exploit kit" rel="nofollow" href="https://support.apple.com/en-us/126632">Apple iOS 15.8.7 covers 'Coruna' exploit kit</a></li><li><a title="Detection Engineering #148" rel="nofollow" href="https://www.detectionengineering.net/p/dew-148-detection-pipeline-maturity">Detection Engineering #148</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="Ekoparty Miami (May 21-22, 2026)" rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami (May 21-22, 2026)</a></li><li><a title="PIVOTcon Agenda" rel="nofollow" href="https://pivotcon.org/#agenda">PIVOTcon Agenda</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 89</strong>: We discuss Iran hacktivist group &#39;Handala&#39; wiper attacks against US medical device maker Stryker, Microsoft Intune MDM tool abuse, and whether Iran&#39;s cyber retaliation is as scary as the headlines suggest.</p>

<p>Plus, ESET&#39;s discovery that Russia&#39;s APT28 original implant developers are back after years of silence, Dutch intelligence warnings on Russian campaigns targeting Signal and WhatsApp accounts, Apple finally patching Coruna exploit kit vulnerabilities for older iPhones, and Google sharing Coruna samples that raise new questions about the exploit kit&#39;s proliferation chain.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (raw, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1zhtku2XeCIhpAs7pa_p34-Rypy9WzyTdZc-pyyx6cTc/edit?tab=t.0">Transcript (raw, AI-generated)</a></li><li><a title="TLPBLACK Solutions" rel="nofollow" href="https://tlpblack.net/#solutions">TLPBLACK Solutions</a></li><li><a title="Kim Zetter: Iranian Hacktivists Strike Medical Device Maker Stryker in &quot;Severe&quot; Attack that Wiped Systems" rel="nofollow" href="https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/">Kim Zetter: Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems</a></li><li><a title="Stryker Cyberattack Adds to Fears of New Front in Iran War" rel="nofollow" href="https://www.nytimes.com/2026/03/12/world/middleeast/stryker-iran-cyberattack.html">Stryker Cyberattack Adds to Fears of New Front in Iran War</a></li><li><a title="Bloomberg: Cyberattack Hits Stryker; Pro-Iran Group Claims Credit" rel="nofollow" href="https://archive.ph/7wpe7">Bloomberg: Cyberattack Hits Stryker; Pro-Iran Group Claims Credit</a></li><li><a title="Who is Handala? (Malpedia)" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/handala">Who is Handala? (Malpedia)</a></li><li><a title="Palo Alto: Increased Risk of Wiper Attacks" rel="nofollow" href="https://unit42.paloaltonetworks.com/handala-hack-wiper-attacks/">Palo Alto: Increased Risk of Wiper Attacks</a></li><li><a title="CISA Advisories on Iran State-Sponsored Cyber Threat" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/nation-state-cyber-actors/iran/publications">CISA Advisories on Iran State-Sponsored Cyber Threat</a></li><li><a title="Russia state actors targets Signal and WhatsApp accounts" rel="nofollow" href="https://english.aivd.nl/latest/news/2026/03/09/russia-targets-signal-and-whatsapp-accounts-in-cyber-campaign">Russia state actors targets Signal and WhatsApp accounts</a></li><li><a title="Dutch intel report on Signal, WhatsApp targeting" rel="nofollow" href="https://drive.google.com/file/d/1ZWvYkM_09GULHogLSlXA4Yb8PPlRfnBP/view">Dutch intel report on Signal, WhatsApp targeting</a></li><li><a title="Signal responds to Dutch Intel report" rel="nofollow" href="https://bsky.app/profile/signal.org/post/3mgnap76pnk2a">Signal responds to Dutch Intel report</a></li><li><a title="ESET: Resurgence of one of Russia’s most notorious APT groups" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/sednit-reloaded-back-trenches/">ESET: Resurgence of one of Russia’s most notorious APT groups</a></li><li><a title="Poland says foiled cyberattack on nuclear centre may have come from Iran" rel="nofollow" href="https://www.reuters.com/world/poland-says-foiled-cyberattack-nuclear-centre-may-have-come-iran-2026-03-12/">Poland says foiled cyberattack on nuclear centre may have come from Iran</a></li><li><a title="Apple ships iOS 16.7.15 to cover &#39;Coruna&#39; exploits" rel="nofollow" href="https://support.apple.com/en-us/126646">Apple ships iOS 16.7.15 to cover 'Coruna' exploits</a></li><li><a title="Apple iOS 15.8.7 covers &#39;Coruna&#39; exploit kit" rel="nofollow" href="https://support.apple.com/en-us/126632">Apple iOS 15.8.7 covers 'Coruna' exploit kit</a></li><li><a title="Detection Engineering #148" rel="nofollow" href="https://www.detectionengineering.net/p/dew-148-detection-pipeline-maturity">Detection Engineering #148</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="Ekoparty Miami (May 21-22, 2026)" rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami (May 21-22, 2026)</a></li><li><a title="PIVOTcon Agenda" rel="nofollow" href="https://pivotcon.org/#agenda">PIVOTcon Agenda</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Trenchant, Peter Williams, and the proliferation of a Shadow Brokers-level iOS exploit framework</title>
  <link>http://securityconversations.fireside.fm/trenchant-peter-williams-coruna-ios-exploit-framework</link>
  <guid isPermaLink="false">502a67da-c82e-4e95-bfae-642c47b5faee</guid>
  <pubDate>Fri, 06 Mar 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/502a67da-c82e-4e95-bfae-642c47b5faee.mp3" length="94165630" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 88: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.

Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>1:59:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/502a67da-c82e-4e95-bfae-642c47b5faee/cover.jpg?v=1"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 88: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.
Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Peter Williams, Trenchant, Apple, iOS, Trenchant, iVerify, exploit kit, condor, FBI, San Bernardino, zero-days, Kaspersky, surveillance, Israel, Iran, cyberwar, Anthropic, OpenAI, Aardvark, Codex</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 88</strong>: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.</p>

<p>Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (raw, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1hjqvWGMuFA7K5oQ5ZWC8ZbMRg9sHsHYXEAi-liB2d9w/edit?usp=sharing">Transcript (raw, AI-generated)</a></li><li><a title="Thinkst Canary (how it works)" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary (how it works)</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery" rel="nofollow" href="https://securityconversations.com/episode/matthias-frielingsdorf-on-the-mysterious-coruna-ios-exploit-kit-discovery/">Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery</a></li><li><a title="Matthias Frielingsdorf on Coruna (raw transcript)" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Matthias Frielingsdorf on Coruna (raw transcript)</a></li><li><a title="Coruna-related hashes on VirusTotal" rel="nofollow" href="https://x.com/Now_on_VT/status/2029887800909156681">Coruna-related hashes on VirusTotal</a></li><li><a title="Kaspersky: No signs Coruna iPhone exploit kit made by US" rel="nofollow" href="https://www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/">Kaspersky: No signs Coruna iPhone exploit kit made by US</a></li><li><a title="Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI" rel="nofollow" href="https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/">Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI</a></li><li><a title="2025 Zero-Days in Review (Google)" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review">2025 Zero-Days in Review (Google)</a></li><li><a title="FBI investigating ‘suspicious’ cyber activities on critical surveillance network" rel="nofollow" href="https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network?cid=ios_app">FBI investigating ‘suspicious’ cyber activities on critical surveillance network</a></li><li><a title="Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes" rel="nofollow" href="https://archive.ph/KLQSf">Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes</a></li><li><a title="Interplay between Iranian Targeting of IP Cameras and Physical Warfare" rel="nofollow" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/">Interplay between Iranian Targeting of IP Cameras and Physical Warfare</a></li><li><a title="Israel says it knocked out Iran’s cyber warfare headquarters" rel="nofollow" href="https://archive.ph/4IUgU">Israel says it knocked out Iran’s cyber warfare headquarters</a></li><li><a title="Amazon Bahrain facility targeted for U.S. military support" rel="nofollow" href="https://www.cnbc.com/2026/03/04/amazon-bahrain-data-centers-targeted-iran-drone-strike.html">Amazon Bahrain facility targeted for U.S. military support</a></li><li><a title="Full transcript of Anthropic CEO Dario Amodei interview" rel="nofollow" href="https://www.cbsnews.com/news/anthropic-ceo-dario-amodei-full-transcript/">Full transcript of Anthropic CEO Dario Amodei interview</a></li><li><a title="Codex Security (formerly Aardvark) now in research preview" rel="nofollow" href="https://openai.com/index/codex-security-now-in-research-preview/">Codex Security (formerly Aardvark) now in research preview</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 88</strong>: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.</p>

<p>Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (raw, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1hjqvWGMuFA7K5oQ5ZWC8ZbMRg9sHsHYXEAi-liB2d9w/edit?usp=sharing">Transcript (raw, AI-generated)</a></li><li><a title="Thinkst Canary (how it works)" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary (how it works)</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery" rel="nofollow" href="https://securityconversations.com/episode/matthias-frielingsdorf-on-the-mysterious-coruna-ios-exploit-kit-discovery/">Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery</a></li><li><a title="Matthias Frielingsdorf on Coruna (raw transcript)" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Matthias Frielingsdorf on Coruna (raw transcript)</a></li><li><a title="Coruna-related hashes on VirusTotal" rel="nofollow" href="https://x.com/Now_on_VT/status/2029887800909156681">Coruna-related hashes on VirusTotal</a></li><li><a title="Kaspersky: No signs Coruna iPhone exploit kit made by US" rel="nofollow" href="https://www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/">Kaspersky: No signs Coruna iPhone exploit kit made by US</a></li><li><a title="Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI" rel="nofollow" href="https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/">Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI</a></li><li><a title="2025 Zero-Days in Review (Google)" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review">2025 Zero-Days in Review (Google)</a></li><li><a title="FBI investigating ‘suspicious’ cyber activities on critical surveillance network" rel="nofollow" href="https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network?cid=ios_app">FBI investigating ‘suspicious’ cyber activities on critical surveillance network</a></li><li><a title="Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes" rel="nofollow" href="https://archive.ph/KLQSf">Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes</a></li><li><a title="Interplay between Iranian Targeting of IP Cameras and Physical Warfare" rel="nofollow" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/">Interplay between Iranian Targeting of IP Cameras and Physical Warfare</a></li><li><a title="Israel says it knocked out Iran’s cyber warfare headquarters" rel="nofollow" href="https://archive.ph/4IUgU">Israel says it knocked out Iran’s cyber warfare headquarters</a></li><li><a title="Amazon Bahrain facility targeted for U.S. military support" rel="nofollow" href="https://www.cnbc.com/2026/03/04/amazon-bahrain-data-centers-targeted-iran-drone-strike.html">Amazon Bahrain facility targeted for U.S. military support</a></li><li><a title="Full transcript of Anthropic CEO Dario Amodei interview" rel="nofollow" href="https://www.cbsnews.com/news/anthropic-ceo-dario-amodei-full-transcript/">Full transcript of Anthropic CEO Dario Amodei interview</a></li><li><a title="Codex Security (formerly Aardvark) now in research preview" rel="nofollow" href="https://openai.com/index/codex-security-now-in-research-preview/">Codex Security (formerly Aardvark) now in research preview</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Threat Hunter Greg Linares on the modern ransomware playbook</title>
  <link>http://securityconversations.fireside.fm/greg-linares-modern-ransomware-playbook</link>
  <guid isPermaLink="false">b9815070-450a-43d3-8970-287ef88e305c</guid>
  <pubDate>Tue, 03 Mar 2026 13:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b9815070-450a-43d3-8970-287ef88e305c.mp3" length="42939010" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. 

The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</itunes:subtitle>
  <itunes:duration>49:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b9815070-450a-43d3-8970-287ef88e305c/cover.jpg?v=2"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)
Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. 
The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.
</description>
  <itunes:keywords>huntress, greg linares, ransomware, akira, ransomhub, medusa, qilin, rmm abuse, remote monitoring, lolbins, LOTL</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. </p>

<p>The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Fx1Ez2CK71rmn0RhDXXObDXTxio_aGvRxHByv6WvY0Y/edit?tab=t.0">Transcript</a></li><li><a title="Huntress 2025 Cyber Threat Report" rel="nofollow" href="https://www.huntress.com/resources/2025-cyber-threat-report">Huntress 2025 Cyber Threat Report</a></li><li><a title="Microsoft: Think before you Click(Fix)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">Microsoft: Think before you Click(Fix)</a></li><li><a title="Akira Ransomware" rel="nofollow" href="https://www.ic3.gov/CSA/2025/251113.pdf">Akira Ransomware</a></li><li><a title="CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a">CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software</a></li><li><a title="Ep9: The blurring lines between nation-state APTs and the ransomware epidemic " rel="nofollow" href="https://securityconversations.com/episode/ep9-the-blurring-lines-between-nation-state-apts-and-the-ransomware-epidemic/">Ep9: The blurring lines between nation-state APTs and the ransomware epidemic </a></li><li><a title="Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines" rel="nofollow" href="https://www.securityweek.com/chinese-apt-tools-found-in-ransomware-schemes-blurring-attribution-lines/">Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. </p>

<p>The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Fx1Ez2CK71rmn0RhDXXObDXTxio_aGvRxHByv6WvY0Y/edit?tab=t.0">Transcript</a></li><li><a title="Huntress 2025 Cyber Threat Report" rel="nofollow" href="https://www.huntress.com/resources/2025-cyber-threat-report">Huntress 2025 Cyber Threat Report</a></li><li><a title="Microsoft: Think before you Click(Fix)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">Microsoft: Think before you Click(Fix)</a></li><li><a title="Akira Ransomware" rel="nofollow" href="https://www.ic3.gov/CSA/2025/251113.pdf">Akira Ransomware</a></li><li><a title="CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a">CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software</a></li><li><a title="Ep9: The blurring lines between nation-state APTs and the ransomware epidemic " rel="nofollow" href="https://securityconversations.com/episode/ep9-the-blurring-lines-between-nation-state-apts-and-the-ransomware-epidemic/">Ep9: The blurring lines between nation-state APTs and the ransomware epidemic </a></li><li><a title="Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines" rel="nofollow" href="https://www.securityweek.com/chinese-apt-tools-found-in-ransomware-schemes-blurring-attribution-lines/">Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>War in Iran, Anthropic v Pentagon, Trenchant zero-day sanctions, AI stock market shocks</title>
  <link>http://securityconversations.fireside.fm/war-iran-anthropic-usgov-trenchant-zero-day-sanctions</link>
  <guid isPermaLink="false">7d707098-e32e-45a7-9069-fb8a34620302</guid>
  <pubDate>Sat, 28 Feb 2026 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7d707098-e32e-45a7-9069-fb8a34620302.mp3" length="105895784" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 87:  We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:08:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7d707098-e32e-45a7-9069-fb8a34620302/cover.jpg?v=1"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 87: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Israel, Iran, cyberwar, Peter Williams, Operation Zero, Trenchant, Anthropic, OpenAI, CrowdStrike, Cisco Talos, China, DeepSeek, Meta, cyberespionage</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1pVVw2L0YShpPy1ArqBLUcvApTJcjFxSQBYUepjj1yF0/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/#pricing">Thinkst Canary</a></li><li><a title="Live updates: US and Israel strike Iran" rel="nofollow" href="https://apnews.com/live/live-updates-israel-iran-february-28-2026">Live updates: US and Israel strike Iran</a></li><li><a title="Episode 80: Hamid Kashfi on the situation in Iran" rel="nofollow" href="https://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela">Episode 80: Hamid Kashfi on the situation in Iran</a></li><li><a title="‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers" rel="nofollow" href="https://www.politico.com/news/2026/02/26/incoherent-hegseths-anthropic-ultimatum-confounds-ai-policymakers-00800135">‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers</a></li><li><a title="Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks" rel="nofollow" href="https://www.linkedin.com/pulse/anthropics-new-claude-ai-security-tool-wipes-out-17jje/">Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks</a></li><li><a title="CrowdStrike CEO responds to stock price hit" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:7431417202505064448/">CrowdStrike CEO responds to stock price hit</a></li><li><a title="Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets" rel="nofollow" href="https://www.state.gov/releases/office-of-the-spokesperson/2026/02/designation-of-russia-based-zero-day-exploits-broker-and-affiliates-for-theft-of-u-s-trade-secrets/">Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets</a></li><li><a title="Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools " rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools </a></li><li><a title="Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison" rel="nofollow" href="https://www.zetter-zeroday.com/trenchant-exec-who-sold-his-employers-zero-day-exploits-to-russian-buyer-sentenced-to-7-years-in-prison/">Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison</a></li><li><a title="AWS says AI-augmented threat actor accesses FortiGate devices at scale" rel="nofollow" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AWS says AI-augmented threat actor accesses FortiGate devices at scale</a></li><li><a title="Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" rel="nofollow" href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Active exploitation of Cisco Catalyst SD-WAN by UAT-8616</a></li><li><a title="Anthropic Claud Code Security" rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claud Code Security</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></li><li><a title="iPhone and iPad approved to handle classified NATO information" rel="nofollow" href="https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/">iPhone and iPad approved to handle classified NATO information</a></li><li><a title="Fortinet Achieves Certification for Secure Product Development" rel="nofollow" href="https://www.fortinet.com/blog/operational-technology/fortinet-achieves-iec-62443-4-1-ml2-certification-for-secure-product-development">Fortinet Achieves Certification for Secure Product Development</a></li><li><a title="Cisco SD-WAN threat hunting guide" rel="nofollow" href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Cisco SD-WAN threat hunting guide</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1pVVw2L0YShpPy1ArqBLUcvApTJcjFxSQBYUepjj1yF0/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/#pricing">Thinkst Canary</a></li><li><a title="Live updates: US and Israel strike Iran" rel="nofollow" href="https://apnews.com/live/live-updates-israel-iran-february-28-2026">Live updates: US and Israel strike Iran</a></li><li><a title="Episode 80: Hamid Kashfi on the situation in Iran" rel="nofollow" href="https://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela">Episode 80: Hamid Kashfi on the situation in Iran</a></li><li><a title="‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers" rel="nofollow" href="https://www.politico.com/news/2026/02/26/incoherent-hegseths-anthropic-ultimatum-confounds-ai-policymakers-00800135">‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers</a></li><li><a title="Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks" rel="nofollow" href="https://www.linkedin.com/pulse/anthropics-new-claude-ai-security-tool-wipes-out-17jje/">Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks</a></li><li><a title="CrowdStrike CEO responds to stock price hit" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:7431417202505064448/">CrowdStrike CEO responds to stock price hit</a></li><li><a title="Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets" rel="nofollow" href="https://www.state.gov/releases/office-of-the-spokesperson/2026/02/designation-of-russia-based-zero-day-exploits-broker-and-affiliates-for-theft-of-u-s-trade-secrets/">Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets</a></li><li><a title="Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools " rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools </a></li><li><a title="Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison" rel="nofollow" href="https://www.zetter-zeroday.com/trenchant-exec-who-sold-his-employers-zero-day-exploits-to-russian-buyer-sentenced-to-7-years-in-prison/">Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison</a></li><li><a title="AWS says AI-augmented threat actor accesses FortiGate devices at scale" rel="nofollow" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AWS says AI-augmented threat actor accesses FortiGate devices at scale</a></li><li><a title="Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" rel="nofollow" href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Active exploitation of Cisco Catalyst SD-WAN by UAT-8616</a></li><li><a title="Anthropic Claud Code Security" rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claud Code Security</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></li><li><a title="iPhone and iPad approved to handle classified NATO information" rel="nofollow" href="https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/">iPhone and iPad approved to handle classified NATO information</a></li><li><a title="Fortinet Achieves Certification for Secure Product Development" rel="nofollow" href="https://www.fortinet.com/blog/operational-technology/fortinet-achieves-iec-62443-4-1-ml2-certification-for-secure-product-development">Fortinet Achieves Certification for Secure Product Development</a></li><li><a title="Cisco SD-WAN threat hunting guide" rel="nofollow" href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Cisco SD-WAN threat hunting guide</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>GitLab doxxes North Korea .gov hackers; fresh Ivanti zero-days; AI addiction and human purpose</title>
  <link>http://securityconversations.fireside.fm/gitlab-north-korea-ivanti-zero-day-ai-human-purpose</link>
  <guid isPermaLink="false">6850debe-7ea0-498e-9857-123d30c24e8d</guid>
  <pubDate>Fri, 20 Feb 2026 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6850debe-7ea0-498e-9857-123d30c24e8d.mp3" length="106607056" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Three Buddy Problem - Episode 86: We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  

Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:16:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6850debe-7ea0-498e-9857-123d30c24e8d/cover.jpg?v=1"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)
Three Buddy Problem - Episode 86:  We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  
Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. 
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>GitLab, North Korea, Contageous Interview, China, Russia, Ivanti, Unit 42, zero-day, Mandiant, CVE-2026-22769, Dell, OpenAI, Aardvard, Codex Security, Deutsche Bahn, hybrid war, AIVD, MIVD, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 86</strong>:  We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  </p>

<p>Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions-pdns">TLPBLACK</a></li><li><a title="GitLab exposes North Korean malware tradecraft" rel="nofollow" href="https://about.gitlab.com/blog/gitlab-threat-intelligence-reveals-north-korean-tradecraft/">GitLab exposes North Korean malware tradecraft</a></li><li><a title="Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)" rel="nofollow" href="https://sp4rk.medium.com/beyond-the-backdoor-how-contagious-interview-is-surgically-tampering-with-metamask-wallets-0314ae901d85">Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)</a></li><li><a title="Critical Vulnerabilities in Ivanti EPMM Exploited" rel="nofollow" href="https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/">Critical Vulnerabilities in Ivanti EPMM Exploited</a></li><li><a title="Dell RecoverPoint for Virtual Machines Zero-Day" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day">Dell RecoverPoint for Virtual Machines Zero-Day</a></li><li><a title="Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability" rel="nofollow" href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a></li><li><a title="Critical Dell bug exploited for two years" rel="nofollow" href="https://www.thestack.technology/dell-critical-vulnerability-vmware-cve-202622769/">Critical Dell bug exploited for two years</a></li><li><a title="OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT" rel="nofollow" href="https://openai.com/index/introducing-lockdown-mode-and-elevated-risk-labels-in-chatgpt/">OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT</a></li><li><a title="OpenAI is rebranding Aardvark " rel="nofollow" href="https://x.com/btibor91/status/2024613054638608558">OpenAI is rebranding Aardvark </a></li><li><a title="Anthropic Claude Code Security " rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claude Code Security </a></li><li><a title="Jason Lang: Real Human Concerns In The Age of AI" rel="nofollow" href="https://x.com/curi0usJack/status/2024184571974000984">Jason Lang: Real Human Concerns In The Age of AI</a></li><li><a title="JAGS&#39; batteries-included Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' batteries-included Claude Code SDLC config</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 86</strong>:  We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  </p>

<p>Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions-pdns">TLPBLACK</a></li><li><a title="GitLab exposes North Korean malware tradecraft" rel="nofollow" href="https://about.gitlab.com/blog/gitlab-threat-intelligence-reveals-north-korean-tradecraft/">GitLab exposes North Korean malware tradecraft</a></li><li><a title="Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)" rel="nofollow" href="https://sp4rk.medium.com/beyond-the-backdoor-how-contagious-interview-is-surgically-tampering-with-metamask-wallets-0314ae901d85">Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)</a></li><li><a title="Critical Vulnerabilities in Ivanti EPMM Exploited" rel="nofollow" href="https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/">Critical Vulnerabilities in Ivanti EPMM Exploited</a></li><li><a title="Dell RecoverPoint for Virtual Machines Zero-Day" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day">Dell RecoverPoint for Virtual Machines Zero-Day</a></li><li><a title="Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability" rel="nofollow" href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a></li><li><a title="Critical Dell bug exploited for two years" rel="nofollow" href="https://www.thestack.technology/dell-critical-vulnerability-vmware-cve-202622769/">Critical Dell bug exploited for two years</a></li><li><a title="OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT" rel="nofollow" href="https://openai.com/index/introducing-lockdown-mode-and-elevated-risk-labels-in-chatgpt/">OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT</a></li><li><a title="OpenAI is rebranding Aardvark " rel="nofollow" href="https://x.com/btibor91/status/2024613054638608558">OpenAI is rebranding Aardvark </a></li><li><a title="Anthropic Claude Code Security " rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claude Code Security </a></li><li><a title="Jason Lang: Real Human Concerns In The Age of AI" rel="nofollow" href="https://x.com/curi0usJack/status/2024184571974000984">Jason Lang: Real Human Concerns In The Age of AI</a></li><li><a title="JAGS&#39; batteries-included Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' batteries-included Claude Code SDLC config</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Palo Alto and the uncomfortable politics of APT attribution</title>
  <link>http://securityconversations.fireside.fm/drones-elpaso-palo-alto-china-attribution</link>
  <guid isPermaLink="false">1964971a-bff0-48c5-9d43-8874e3b38d67</guid>
  <pubDate>Fri, 13 Feb 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1964971a-bff0-48c5-9d43-8874e3b38d67.mp3" length="118296559" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 85: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.

Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:30:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1964971a-bff0-48c5-9d43-8874e3b38d67/cover.jpg?v=1"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 85: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.
Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>drones, El Paso, FAA, anti-drone, notepad++, SUO5, Microsoft, Patch Tuesday, zeroday, ios 26.3, Estonia, Russia, China, Palo Alto, Singapore, Germany, Tianfu Cup</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 85</strong>: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.</p>

<p>Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10uh_I7o0vdCt34EWS84SVdt_b6hmyXuigAPkP7HwYJQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="What We Know About the El Paso Airspace Shutdown" rel="nofollow" href="https://archive.ph/7JHqq">What We Know About the El Paso Airspace Shutdown</a></li><li><a title="El Paso Closure Caused by Firing Anti-Drone Laser " rel="nofollow" href="https://archive.ph/xi7BU">El Paso Closure Caused by Firing Anti-Drone Laser </a></li><li><a title="Notepad++ supply chain hack (new IOCs)" rel="nofollow" href="https://notepad-plus-plus.org/assets/data/IoCFromFormerHostingProvider.txt">Notepad++ supply chain hack (new IOCs)</a></li><li><a title="Ukatemi: Notepad++ attack related samples" rel="nofollow" href="https://blog.ukatemi.com/blog/2026-02-12-notepad++-supply-chain-samples/">Ukatemi: Notepad++ attack related samples</a></li><li><a title="Notepad&#39;s new Markdown powers served with a side of RCE" rel="nofollow" href="https://www.theregister.com/2026/02/11/notepad_rce_flaw/">Notepad's new Markdown powers served with a side of RCE</a></li><li><a title="Microsoft: Windows Notepad App RCE Vulnerability " rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841">Microsoft: Windows Notepad App RCE Vulnerability </a></li><li><a title="iOS 26.3 security advisory (exploited 0day)" rel="nofollow" href="https://support.apple.com/en-us/126346">iOS 26.3 security advisory (exploited 0day)</a></li><li><a title="Estonian Foreign Intelligence Service annual report" rel="nofollow" href="https://raport.valisluureamet.ee/2026/en/">Estonian Foreign Intelligence Service annual report</a></li><li><a title="PSIRT | FortiGuard Labs High-Risk Advisory" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1052">PSIRT | FortiGuard Labs High-Risk Advisory</a></li><li><a title="Germany prepares to attack cyber enemies" rel="nofollow" href="https://www.politico.eu/article/germany-prepares-hack-back-cyber-enemies/">Germany prepares to attack cyber enemies</a></li><li><a title="Palo Alto chose not to tie China to hacking campaign for fear of retaliation" rel="nofollow" href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Palo Alto chose not to tie China to hacking campaign for fear of retaliation</a></li><li><a title="The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)</a></li><li><a title="Singapore .gov on nation-state telco hacks" rel="nofollow" href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Singapore .gov on nation-state telco hacks</a></li><li><a title="TLP-BLACK" rel="nofollow" href="https://tlpblack.net/">TLP-BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 85</strong>: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.</p>

<p>Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10uh_I7o0vdCt34EWS84SVdt_b6hmyXuigAPkP7HwYJQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="What We Know About the El Paso Airspace Shutdown" rel="nofollow" href="https://archive.ph/7JHqq">What We Know About the El Paso Airspace Shutdown</a></li><li><a title="El Paso Closure Caused by Firing Anti-Drone Laser " rel="nofollow" href="https://archive.ph/xi7BU">El Paso Closure Caused by Firing Anti-Drone Laser </a></li><li><a title="Notepad++ supply chain hack (new IOCs)" rel="nofollow" href="https://notepad-plus-plus.org/assets/data/IoCFromFormerHostingProvider.txt">Notepad++ supply chain hack (new IOCs)</a></li><li><a title="Ukatemi: Notepad++ attack related samples" rel="nofollow" href="https://blog.ukatemi.com/blog/2026-02-12-notepad++-supply-chain-samples/">Ukatemi: Notepad++ attack related samples</a></li><li><a title="Notepad&#39;s new Markdown powers served with a side of RCE" rel="nofollow" href="https://www.theregister.com/2026/02/11/notepad_rce_flaw/">Notepad's new Markdown powers served with a side of RCE</a></li><li><a title="Microsoft: Windows Notepad App RCE Vulnerability " rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841">Microsoft: Windows Notepad App RCE Vulnerability </a></li><li><a title="iOS 26.3 security advisory (exploited 0day)" rel="nofollow" href="https://support.apple.com/en-us/126346">iOS 26.3 security advisory (exploited 0day)</a></li><li><a title="Estonian Foreign Intelligence Service annual report" rel="nofollow" href="https://raport.valisluureamet.ee/2026/en/">Estonian Foreign Intelligence Service annual report</a></li><li><a title="PSIRT | FortiGuard Labs High-Risk Advisory" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1052">PSIRT | FortiGuard Labs High-Risk Advisory</a></li><li><a title="Germany prepares to attack cyber enemies" rel="nofollow" href="https://www.politico.eu/article/germany-prepares-hack-back-cyber-enemies/">Germany prepares to attack cyber enemies</a></li><li><a title="Palo Alto chose not to tie China to hacking campaign for fear of retaliation" rel="nofollow" href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Palo Alto chose not to tie China to hacking campaign for fear of retaliation</a></li><li><a title="The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)</a></li><li><a title="Singapore .gov on nation-state telco hacks" rel="nofollow" href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Singapore .gov on nation-state telco hacks</a></li><li><a title="TLP-BLACK" rel="nofollow" href="https://tlpblack.net/">TLP-BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>From Epstein to Notepad++: Redactions, Zero-Days and Supply Chain Attacks</title>
  <link>http://securityconversations.fireside.fm/epstein-notepad-plus-zerodays-supply-chain-attacks</link>
  <guid isPermaLink="false">d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8</guid>
  <pubDate>Sun, 08 Feb 2026 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8.mp3" length="113124412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 84:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. 

Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:17:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8/cover.jpg?v=2"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 84:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. 
Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DamIQqfq_QYsYm7xby3ntH4bI30T98emmOSkNnQzY84/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people&#39;?" rel="nofollow" href="https://www.yahoo.com/news/articles/did-renowned-hacker-help-jeffrey-120148711.html">Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people'?</a></li><li><a title="DOJ releases details alleged talented hacker working for Jeffrey Epstein" rel="nofollow" href="https://securityaffairs.com/187515/laws-and-regulations/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein.html">DOJ releases details alleged talented hacker working for Jeffrey Epstein</a></li><li><a title="Claude Opus 4.6 \ Anthropic" rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-6">Claude Opus 4.6 \ Anthropic</a></li><li><a title="0-Days \ red.anthropic.com" rel="nofollow" href="https://red.anthropic.com/2026/zero-days/">0-Days \ red.anthropic.com</a></li><li><a title="JAGS&#39; Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' Claude Code SDLC config</a></li><li><a title="CERT-Ukraine on zero-day attacks via MS Office" rel="nofollow" href="https://cert.gov.ua/article/6287250">CERT-Ukraine on zero-day attacks via MS Office</a></li><li><a title="Executive security shuffle at Microsoft" rel="nofollow" href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/">Executive security shuffle at Microsoft</a></li><li><a title="TLPBLACK: What we know about the Notepad++ supply chain attack" rel="nofollow" href="https://medium.com/@costin.raiu/what-we-know-about-the-notepad-supply-chain-attack-0f428b4aee08">TLPBLACK: What we know about the Notepad++ supply chain attack</a></li><li><a title="Lotus Blossom APT targets critical infrastructure via Notepad++." rel="nofollow" href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Lotus Blossom APT targets critical infrastructure via Notepad++.</a></li><li><a title="Kaspersky: Notepad++ supply chain attack breakdown" rel="nofollow" href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky: Notepad++ supply chain attack breakdown</a></li><li><a title="Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise" rel="nofollow" href="https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/">Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise</a></li><li><a title="Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it" rel="nofollow" href="https://www.hostinger.com/blog/notepad-unauthorized-access">Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it</a></li><li><a title="Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework" rel="nofollow" href="https://blog.talosintelligence.com/knife-cutting-the-edge/">Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework</a></li><li><a title="Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage</a></li><li><a title="FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled" rel="nofollow" href="https://www.404media.co/fbi-couldnt-get-into-wapo-reporters-iphone-because-it-had-lockdown-mode-enabled/">FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled</a></li><li><a title="Court document: FBI Washington Post Lockdown Mode" rel="nofollow" href="https://www.documentcloud.org/documents/26808056-fbi-washington-post-lockdown-mode/">Court document: FBI Washington Post Lockdown Mode</a></li><li><a title="PIVOTcon" rel="nofollow" href="https://pivotcon.org/">PIVOTcon</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="Decipher podcast (Dennis Fisher)" rel="nofollow" href="https://open.spotify.com/episode/5k9xpXyD7YSlJRkYqoCQde">Decipher podcast (Dennis Fisher)</a></li><li><a title="Detection Engineering newsletter (Zack Allen)" rel="nofollow" href="https://www.detectionengineering.net/p/dew-144-pyramid-of-permanence-and">Detection Engineering newsletter (Zack Allen)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DamIQqfq_QYsYm7xby3ntH4bI30T98emmOSkNnQzY84/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people&#39;?" rel="nofollow" href="https://www.yahoo.com/news/articles/did-renowned-hacker-help-jeffrey-120148711.html">Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people'?</a></li><li><a title="DOJ releases details alleged talented hacker working for Jeffrey Epstein" rel="nofollow" href="https://securityaffairs.com/187515/laws-and-regulations/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein.html">DOJ releases details alleged talented hacker working for Jeffrey Epstein</a></li><li><a title="Claude Opus 4.6 \ Anthropic" rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-6">Claude Opus 4.6 \ Anthropic</a></li><li><a title="0-Days \ red.anthropic.com" rel="nofollow" href="https://red.anthropic.com/2026/zero-days/">0-Days \ red.anthropic.com</a></li><li><a title="JAGS&#39; Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' Claude Code SDLC config</a></li><li><a title="CERT-Ukraine on zero-day attacks via MS Office" rel="nofollow" href="https://cert.gov.ua/article/6287250">CERT-Ukraine on zero-day attacks via MS Office</a></li><li><a title="Executive security shuffle at Microsoft" rel="nofollow" href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/">Executive security shuffle at Microsoft</a></li><li><a title="TLPBLACK: What we know about the Notepad++ supply chain attack" rel="nofollow" href="https://medium.com/@costin.raiu/what-we-know-about-the-notepad-supply-chain-attack-0f428b4aee08">TLPBLACK: What we know about the Notepad++ supply chain attack</a></li><li><a title="Lotus Blossom APT targets critical infrastructure via Notepad++." rel="nofollow" href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Lotus Blossom APT targets critical infrastructure via Notepad++.</a></li><li><a title="Kaspersky: Notepad++ supply chain attack breakdown" rel="nofollow" href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky: Notepad++ supply chain attack breakdown</a></li><li><a title="Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise" rel="nofollow" href="https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/">Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise</a></li><li><a title="Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it" rel="nofollow" href="https://www.hostinger.com/blog/notepad-unauthorized-access">Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it</a></li><li><a title="Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework" rel="nofollow" href="https://blog.talosintelligence.com/knife-cutting-the-edge/">Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework</a></li><li><a title="Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage</a></li><li><a title="FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled" rel="nofollow" href="https://www.404media.co/fbi-couldnt-get-into-wapo-reporters-iphone-because-it-had-lockdown-mode-enabled/">FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled</a></li><li><a title="Court document: FBI Washington Post Lockdown Mode" rel="nofollow" href="https://www.documentcloud.org/documents/26808056-fbi-washington-post-lockdown-mode/">Court document: FBI Washington Post Lockdown Mode</a></li><li><a title="PIVOTcon" rel="nofollow" href="https://pivotcon.org/">PIVOTcon</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="Decipher podcast (Dennis Fisher)" rel="nofollow" href="https://open.spotify.com/episode/5k9xpXyD7YSlJRkYqoCQde">Decipher podcast (Dennis Fisher)</a></li><li><a title="Detection Engineering newsletter (Zack Allen)" rel="nofollow" href="https://www.detectionengineering.net/p/dew-144-pyramid-of-permanence-and">Detection Engineering newsletter (Zack Allen)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>A destructive cyberattack in Poland raises NATO 'red-line' questions</title>
  <link>http://securityconversations.fireside.fm/destructive-cyber-poland-nato-red-line-questions</link>
  <guid isPermaLink="false">c425eddb-3de4-49f4-b6da-d3701d26642f</guid>
  <pubDate>Fri, 30 Jan 2026 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c425eddb-3de4-49f4-b6da-d3701d26642f.mp3" length="134749410" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 83:  Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.

Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:53:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c425eddb-3de4-49f4-b6da-d3701d26642f/cover.jpg?v=1"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 83:  Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.
Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>IOS, Apple, Poland, Sandworm, Berserk Bear, FSB, Russia, ESET, NATO, Fortinet, Ivanti, Microsoft, zero-day, WinRAR, China, Google,  WhatsApp, Singapore, CISA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 83</strong>:  Poland&#39;s CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.</p>

<p>Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1imC13dSZLhHk1Lf7fEuVeuajlbgiqk2ypQdJow2qGkI/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (Use Cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (Use Cases)</a></li><li><a title="ESET DynoWiper update: Technical analysis and attribution" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/">ESET DynoWiper update: Technical analysis and attribution</a></li><li><a title="Poland CERT on Russian wiper attacks" rel="nofollow" href="https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf">Poland CERT on Russian wiper attacks</a></li><li><a title="Poland blames two Ukrainians allegedly working for Russia for railway blast" rel="nofollow" href="https://www.aljazeera.com/news/2025/11/18/poland-blames-two-ukrainians-allegedly-working-for-russia-for-railway-blast">Poland blames two Ukrainians allegedly working for Russia for railway blast</a></li><li><a title="Britain’s New Spy Chief Has a New Mission" rel="nofollow" href="https://archive.is/kbx9b">Britain’s New Spy Chief Has a New Mission</a></li><li><a title="Two New Ivanti 0days Exploited" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Two New Ivanti 0days Exploited</a></li><li><a title="Microsoft ships emergency Office patch to thwart attacks" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509">Microsoft ships emergency Office patch to thwart attacks</a></li><li><a title="Analysis of Single Sign-On Abuse on FortiOS" rel="nofollow" href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios">Analysis of Single Sign-On Abuse on FortiOS</a></li><li><a title="Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060">Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass</a></li><li><a title="Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability">Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088</a></li><li><a title="WhatsApp Strict Account Settings" rel="nofollow" href="https://about.fb.com/news/2026/01/whatsapp-strict-account-settings-safeguarding-against-cyber-attacks/">WhatsApp Strict Account Settings</a></li><li><a title="China Executes 11 People Linked to Cyberscam Centers in Myanmar" rel="nofollow" href="https://archive.ph/5UTzW">China Executes 11 People Linked to Cyberscam Centers in Myanmar</a></li><li><a title="Singapore to start caning for scammers" rel="nofollow" href="https://www.police.gov.sg/Knowledge-Hub/Legislation/Caning-for-Scams-and-Scams-related-Offences">Singapore to start caning for scammers</a></li><li><a title="Germany on hacking attacks: &quot;We will strike back, including abroad&quot;" rel="nofollow" href="https://www.welt.de/politik/deutschland/article6973feeaf5499fb954b6401d/hackerangriffe-auf-deutschland-wir-werden-zurueckschlagen-auch-im-ausland-dobrindt-will-cyber-gegenwehr-verschaerfen.html">Germany on hacking attacks: "We will strike back, including abroad"</a></li><li><a title="Acting CISA chief uploaded sensitive files into a public version of ChatGPT" rel="nofollow" href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">Acting CISA chief uploaded sensitive files into a public version of ChatGPT</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="KasperSekrets" rel="nofollow" href="https://x.com/kaspersekrets/">KasperSekrets</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 83</strong>:  Poland&#39;s CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.</p>

<p>Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1imC13dSZLhHk1Lf7fEuVeuajlbgiqk2ypQdJow2qGkI/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (Use Cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (Use Cases)</a></li><li><a title="ESET DynoWiper update: Technical analysis and attribution" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/">ESET DynoWiper update: Technical analysis and attribution</a></li><li><a title="Poland CERT on Russian wiper attacks" rel="nofollow" href="https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf">Poland CERT on Russian wiper attacks</a></li><li><a title="Poland blames two Ukrainians allegedly working for Russia for railway blast" rel="nofollow" href="https://www.aljazeera.com/news/2025/11/18/poland-blames-two-ukrainians-allegedly-working-for-russia-for-railway-blast">Poland blames two Ukrainians allegedly working for Russia for railway blast</a></li><li><a title="Britain’s New Spy Chief Has a New Mission" rel="nofollow" href="https://archive.is/kbx9b">Britain’s New Spy Chief Has a New Mission</a></li><li><a title="Two New Ivanti 0days Exploited" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Two New Ivanti 0days Exploited</a></li><li><a title="Microsoft ships emergency Office patch to thwart attacks" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509">Microsoft ships emergency Office patch to thwart attacks</a></li><li><a title="Analysis of Single Sign-On Abuse on FortiOS" rel="nofollow" href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios">Analysis of Single Sign-On Abuse on FortiOS</a></li><li><a title="Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060">Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass</a></li><li><a title="Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability">Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088</a></li><li><a title="WhatsApp Strict Account Settings" rel="nofollow" href="https://about.fb.com/news/2026/01/whatsapp-strict-account-settings-safeguarding-against-cyber-attacks/">WhatsApp Strict Account Settings</a></li><li><a title="China Executes 11 People Linked to Cyberscam Centers in Myanmar" rel="nofollow" href="https://archive.ph/5UTzW">China Executes 11 People Linked to Cyberscam Centers in Myanmar</a></li><li><a title="Singapore to start caning for scammers" rel="nofollow" href="https://www.police.gov.sg/Knowledge-Hub/Legislation/Caning-for-Scams-and-Scams-related-Offences">Singapore to start caning for scammers</a></li><li><a title="Germany on hacking attacks: &quot;We will strike back, including abroad&quot;" rel="nofollow" href="https://www.welt.de/politik/deutschland/article6973feeaf5499fb954b6401d/hackerangriffe-auf-deutschland-wir-werden-zurueckschlagen-auch-im-ausland-dobrindt-will-cyber-gegenwehr-verschaerfen.html">Germany on hacking attacks: "We will strike back, including abroad"</a></li><li><a title="Acting CISA chief uploaded sensitive files into a public version of ChatGPT" rel="nofollow" href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">Acting CISA chief uploaded sensitive files into a public version of ChatGPT</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="KasperSekrets" rel="nofollow" href="https://x.com/kaspersekrets/">KasperSekrets</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Cheap, AI-generated zero-days and the real meaning of ‘advanced’ malware</title>
  <link>http://securityconversations.fireside.fm/ai-generated-malware-real-meaning-advanced-attacks</link>
  <guid isPermaLink="false">40dc6ef5-03de-4767-ae99-5b8d91ba37f7</guid>
  <pubDate>Fri, 23 Jan 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/40dc6ef5-03de-4767-ae99-5b8d91ba37f7.mp3" length="104173843" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 82:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. 

Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA's new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland's electricity sector.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:09:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/40dc6ef5-03de-4767-ae99-5b8d91ba37f7/cover.jpg?v=1"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 82:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. 
Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA's new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland's electricity sector.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>AI, Check Point, Sean Heelan, VoidLInk, CISA, BRICKSTORM, Node.js, Bard, cURL, zero-days, Microsoft, Google, FBI, BitLocker, Fortinet, Cisco, CISA,  </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 82</strong>:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. </p>

<p>Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA&#39;s new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland&#39;s electricity sector.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VTSffx5pgJQd7V1V2XtIu9BS3AgzPZ82VWSkPNKCsqk/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (use cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (use cases)</a></li><li><a title="Sean Heelan on the coming industrialisation of exploit generation with LLMs" rel="nofollow" href="https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/">Sean Heelan on the coming industrialisation of exploit generation with LLMs</a></li><li><a title="VoidLink Shows AI-Generated Malware Has Begun" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/">VoidLink Shows AI-Generated Malware Has Begun</a></li><li><a title="LLMs in the SOC: Why Benchmarks Fail Security Operations Teams" rel="nofollow" href="https://www.sentinelone.com/labs/llms-in-the-soc-part-1-why-benchmarks-fail-security-operations-teams/">LLMs in the SOC: Why Benchmarks Fail Security Operations Teams</a></li><li><a title="CISA advisory on BRICKSTORM backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/analysis-reports/ar25-338a">CISA advisory on BRICKSTORM backdoor</a></li><li><a title="Node.js — New HackerOne Signal Requirement  " rel="nofollow" href="https://nodejs.org/en/blog/announcements/hackerone-signal-requirement">Node.js — New HackerOne Signal Requirement  </a></li><li><a title="AI slop security reports submitted to cURL" rel="nofollow" href="https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd">AI slop security reports submitted to cURL</a></li><li><a title="Arctic Wolf on FortiGate attacks via SSO accounts" rel="nofollow" href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/">Arctic Wolf on FortiGate attacks via SSO accounts</a></li><li><a title="New Cisco Remote Code Execution Vulnerability" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b">New Cisco Remote Code Execution Vulnerability</a></li><li><a title="From Protest to Peril: Cellebrite Used Against Jordanian Civil Society" rel="nofollow" href="https://citizenlab.ca/research/from-protest-to-peril-cellebrite-used-against-jordanian-civil-society/">From Protest to Peril: Cellebrite Used Against Jordanian Civil Society</a></li><li><a title="Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/">Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint</a></li><li><a title="Microsoft Gave FBI BitLocker Encryption Keys " rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/">Microsoft Gave FBI BitLocker Encryption Keys </a></li><li><a title="The Mastermind: Drugs. Empire. Murder. Betrayal " rel="nofollow" href="https://www.amazon.com/Mastermind-Drugs-Empire-Murder-Betrayal/dp/0399590412">The Mastermind: Drugs. Empire. Murder. Betrayal </a></li><li><a title="Kim Zetter: Cyberattack on Poland’s energy grid used a wiper" rel="nofollow" href="https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/">Kim Zetter: Cyberattack on Poland’s energy grid used a wiper</a></li><li><a title="ESET on &#39;DynoWiper&#39; malware" rel="nofollow" href="https://x.com/ESETresearch/status/2014737644048044267">ESET on 'DynoWiper' malware</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 82</strong>:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. </p>

<p>Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA&#39;s new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland&#39;s electricity sector.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VTSffx5pgJQd7V1V2XtIu9BS3AgzPZ82VWSkPNKCsqk/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (use cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (use cases)</a></li><li><a title="Sean Heelan on the coming industrialisation of exploit generation with LLMs" rel="nofollow" href="https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/">Sean Heelan on the coming industrialisation of exploit generation with LLMs</a></li><li><a title="VoidLink Shows AI-Generated Malware Has Begun" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/">VoidLink Shows AI-Generated Malware Has Begun</a></li><li><a title="LLMs in the SOC: Why Benchmarks Fail Security Operations Teams" rel="nofollow" href="https://www.sentinelone.com/labs/llms-in-the-soc-part-1-why-benchmarks-fail-security-operations-teams/">LLMs in the SOC: Why Benchmarks Fail Security Operations Teams</a></li><li><a title="CISA advisory on BRICKSTORM backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/analysis-reports/ar25-338a">CISA advisory on BRICKSTORM backdoor</a></li><li><a title="Node.js — New HackerOne Signal Requirement  " rel="nofollow" href="https://nodejs.org/en/blog/announcements/hackerone-signal-requirement">Node.js — New HackerOne Signal Requirement  </a></li><li><a title="AI slop security reports submitted to cURL" rel="nofollow" href="https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd">AI slop security reports submitted to cURL</a></li><li><a title="Arctic Wolf on FortiGate attacks via SSO accounts" rel="nofollow" href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/">Arctic Wolf on FortiGate attacks via SSO accounts</a></li><li><a title="New Cisco Remote Code Execution Vulnerability" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b">New Cisco Remote Code Execution Vulnerability</a></li><li><a title="From Protest to Peril: Cellebrite Used Against Jordanian Civil Society" rel="nofollow" href="https://citizenlab.ca/research/from-protest-to-peril-cellebrite-used-against-jordanian-civil-society/">From Protest to Peril: Cellebrite Used Against Jordanian Civil Society</a></li><li><a title="Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/">Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint</a></li><li><a title="Microsoft Gave FBI BitLocker Encryption Keys " rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/">Microsoft Gave FBI BitLocker Encryption Keys </a></li><li><a title="The Mastermind: Drugs. Empire. Murder. Betrayal " rel="nofollow" href="https://www.amazon.com/Mastermind-Drugs-Empire-Murder-Betrayal/dp/0399590412">The Mastermind: Drugs. Empire. Murder. Betrayal </a></li><li><a title="Kim Zetter: Cyberattack on Poland’s energy grid used a wiper" rel="nofollow" href="https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/">Kim Zetter: Cyberattack on Poland’s energy grid used a wiper</a></li><li><a title="ESET on &#39;DynoWiper&#39; malware" rel="nofollow" href="https://x.com/ESETresearch/status/2014737644048044267">ESET on 'DynoWiper' malware</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google Pixel 'zero-click' exploit caused by AI, mysterious Poland grid attacks, China bans US cybersecurity software</title>
  <link>http://securityconversations.fireside.fm/project-zero-click-pixel-attack-surface</link>
  <guid isPermaLink="false">9e16b30e-091e-44f0-bcf0-03e0f74e465f</guid>
  <pubDate>Fri, 16 Jan 2026 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9e16b30e-091e-44f0-bcf0-03e0f74e465f.mp3" length="114472744" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 81:  We dissect New York Times reporting on the "precision" of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and "letters of marque" for private hackers. Plus, a mysterious failed cyber attack on Poland's power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China's ban on US/Israeli cybersecurity software.

We also cover Check Point's research on "VoidLink" (is it a successor to ShadowPad?), Microsoft's threat intelligence sharing practices, and Google Project Zero's disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:24:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9e16b30e-091e-44f0-bcf0-03e0f74e465f/cover.jpg?v=1"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 81: We dissect New York Times reporting on the "precision" of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and "letters of marque" for private hackers. Plus, a mysterious failed cyber attack on Poland's power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China's ban on US/Israeli cybersecurity software.
We also cover Check Point's research on "VoidLink" (is it a successor to ShadowPad?), Microsoft's threat intelligence sharing practices, and Google Project Zero's disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Verizon, Israel, China, Palo Alto, Microsoft, CISA, Poland, Project Zero, Google, Apple, Pixel, zero-click, Venezuela, cyberwar</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 81</strong>: We dissect New York Times reporting on the &quot;precision&quot; of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and &quot;letters of marque&quot; for private hackers. Plus, a mysterious failed cyber attack on Poland&#39;s power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China&#39;s ban on US/Israeli cybersecurity software.</p>

<p>We also cover Check Point&#39;s research on &quot;VoidLink&quot; (is it a successor to ShadowPad?), Microsoft&#39;s threat intelligence sharing practices, and Google Project Zero&#39;s disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/14CwFDiK41p3VK3jeEiHVs9xK0oIF1iVs8midU-nvX7k/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/product">Sponsor: Material Security</a></li><li><a title="Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities " rel="nofollow" href="https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html">Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities </a></li><li><a title="Massive cyberattack on Polish power system in December failed, minister says  " rel="nofollow" href="https://www.reuters.com/sustainability/climate-energy/massive-cyberattack-polish-power-system-december-failed-minister-says-2026-01-13/">Massive cyberattack on Polish power system in December failed, minister says  </a></li><li><a title="What happened in Poland? (Ruben Santamarta)" rel="nofollow" href="https://www.linkedin.com/pulse/what-happened-poland-part-i-ruben-santamarta-bknye/">What happened in Poland? (Ruben Santamarta)</a></li><li><a title="Costin Raiu: What’s Happening in Iran?" rel="nofollow" href="https://medium.com/@costin.raiu/whats-happening-in-iran-93cc103863ab">Costin Raiu: What’s Happening in Iran?</a></li><li><a title="Verizon just had a big outage. Here’s what we know" rel="nofollow" href="https://www.npr.org/2026/01/15/nx-s1-5678889/verizon-outage-what-happened">Verizon just had a big outage. Here’s what we know</a></li><li><a title="Beijing tells Chinese firms to stop using US and Israeli cyber products" rel="nofollow" href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Beijing tells Chinese firms to stop using US and Israeli cyber products</a></li><li><a title=" MS Patch Tuesday CVE-2026-20805 (exploited in the wild)" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805"> MS Patch Tuesday CVE-2026-20805 (exploited in the wild)</a></li><li><a title="VoidLink: The Cloud-Native Malware Framework" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/">VoidLink: The Cloud-Native Malware Framework</a></li><li><a title="Microsoft disrupts global cybercrime subscription service" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2026/01/14/microsoft-disrupts-cybercrime/">Microsoft disrupts global cybercrime subscription service</a></li><li><a title="Project Zero: A 0-click exploit chain for the Pixel 9 " rel="nofollow" href="https://projectzero.google/2026/01/pixel-0-click-part-1.html">Project Zero: A 0-click exploit chain for the Pixel 9 </a></li><li><a title="Joint statement from Google and Apple" rel="nofollow" href="https://blog.google/company-news/inside-google/company-announcements/joint-statement-google-apple/">Joint statement from Google and Apple</a></li><li><a title="Sean Plankey re-nominated to lead CISA " rel="nofollow" href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/">Sean Plankey re-nominated to lead CISA </a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="DistrictCon Agenda" rel="nofollow" href="https://www.districtcon.org/agenda">DistrictCon Agenda</a></li><li><a title="Ekoparty Miami  " rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami  </a></li><li><a title="The Thinking Game (Full Documentary)" rel="nofollow" href="https://www.youtube.com/watch?v=d95J8yzvjbQ">The Thinking Game (Full Documentary)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 81</strong>: We dissect New York Times reporting on the &quot;precision&quot; of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and &quot;letters of marque&quot; for private hackers. Plus, a mysterious failed cyber attack on Poland&#39;s power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China&#39;s ban on US/Israeli cybersecurity software.</p>

<p>We also cover Check Point&#39;s research on &quot;VoidLink&quot; (is it a successor to ShadowPad?), Microsoft&#39;s threat intelligence sharing practices, and Google Project Zero&#39;s disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/14CwFDiK41p3VK3jeEiHVs9xK0oIF1iVs8midU-nvX7k/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/product">Sponsor: Material Security</a></li><li><a title="Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities " rel="nofollow" href="https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html">Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities </a></li><li><a title="Massive cyberattack on Polish power system in December failed, minister says  " rel="nofollow" href="https://www.reuters.com/sustainability/climate-energy/massive-cyberattack-polish-power-system-december-failed-minister-says-2026-01-13/">Massive cyberattack on Polish power system in December failed, minister says  </a></li><li><a title="What happened in Poland? (Ruben Santamarta)" rel="nofollow" href="https://www.linkedin.com/pulse/what-happened-poland-part-i-ruben-santamarta-bknye/">What happened in Poland? (Ruben Santamarta)</a></li><li><a title="Costin Raiu: What’s Happening in Iran?" rel="nofollow" href="https://medium.com/@costin.raiu/whats-happening-in-iran-93cc103863ab">Costin Raiu: What’s Happening in Iran?</a></li><li><a title="Verizon just had a big outage. Here’s what we know" rel="nofollow" href="https://www.npr.org/2026/01/15/nx-s1-5678889/verizon-outage-what-happened">Verizon just had a big outage. Here’s what we know</a></li><li><a title="Beijing tells Chinese firms to stop using US and Israeli cyber products" rel="nofollow" href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Beijing tells Chinese firms to stop using US and Israeli cyber products</a></li><li><a title=" MS Patch Tuesday CVE-2026-20805 (exploited in the wild)" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805"> MS Patch Tuesday CVE-2026-20805 (exploited in the wild)</a></li><li><a title="VoidLink: The Cloud-Native Malware Framework" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/">VoidLink: The Cloud-Native Malware Framework</a></li><li><a title="Microsoft disrupts global cybercrime subscription service" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2026/01/14/microsoft-disrupts-cybercrime/">Microsoft disrupts global cybercrime subscription service</a></li><li><a title="Project Zero: A 0-click exploit chain for the Pixel 9 " rel="nofollow" href="https://projectzero.google/2026/01/pixel-0-click-part-1.html">Project Zero: A 0-click exploit chain for the Pixel 9 </a></li><li><a title="Joint statement from Google and Apple" rel="nofollow" href="https://blog.google/company-news/inside-google/company-announcements/joint-statement-google-apple/">Joint statement from Google and Apple</a></li><li><a title="Sean Plankey re-nominated to lead CISA " rel="nofollow" href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/">Sean Plankey re-nominated to lead CISA </a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="DistrictCon Agenda" rel="nofollow" href="https://www.districtcon.org/agenda">DistrictCon Agenda</a></li><li><a title="Ekoparty Miami  " rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami  </a></li><li><a title="The Thinking Game (Full Documentary)" rel="nofollow" href="https://www.youtube.com/watch?v=d95J8yzvjbQ">The Thinking Game (Full Documentary)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Hamid Kashfi on the situation in Iran; Did cyber cause Venezuela blackouts?</title>
  <link>http://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela</link>
  <guid isPermaLink="false">e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7</guid>
  <pubDate>Fri, 09 Jan 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7.mp3" length="103702632" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 80: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  

Plus, did cyber make the lights go out in Venezuela? 

Cast: Hamid Kashfi, Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:13:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7/cover.jpg?v=1"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 80: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  
Plus, did cyber make the lights go out in Venezuela? 
Cast: Hamid Kashfi (https://twitter.com/hkashfi), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Israel, Charming Kitten, KittenBusters, Hamid Kashfi, Venezuela, hacktivism, cyberwar, kinetic, blackout, CIA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11KT2hDzyOlv3WdxyVfw9pjW2xV56p9dyACgqZenlDBk/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/">Sponsor: Material Security</a></li><li><a title="About Hamid Kashfi" rel="nofollow" href="https://www.darkcell.se/about">About Hamid Kashfi</a></li><li><a title="Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://securityconversations.com/episode/israel-iran-cyberwar-predatory-sparrow-vanishing-crypto-bank-hacks/">Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Venezuela strike marks a turning point for US cyber warfare" rel="nofollow" href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li><li><a title="KittenBusters | CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">KittenBusters | CharmingKitten</a></li><li><a title="Comprehensive Threat Intelligence Report: Charming Kitten" rel="nofollow" href="https://gist.github.com/Hamid-K#comprehensive-threat-intelligence-report-charming-kitten">Comprehensive Threat Intelligence Report: Charming Kitten</a></li><li><a title="Between Three Nerds: The evolution of Iranian cyber espionage" rel="nofollow" href="https://risky.biz/BTN148/">Between Three Nerds: The evolution of Iranian cyber espionage</a></li><li><a title="Trump says U.S. will hit Iran &quot;very hard&quot; if violence continues at protests" rel="nofollow" href="https://www.cbsnews.com/video/trump-says-us-will-hit-iran-very-hard-if-violence-continues-at-protests/">Trump says U.S. will hit Iran "very hard" if violence continues at protests</a></li><li><a title="Venezuelan oil giant PVDSA hit by cyberattack" rel="nofollow" href="https://www.techradar.com/pro/security/venezuelan-oil-giant-pvdsa-hit-by-cyberattack-amid-us-conflict">Venezuelan oil giant PVDSA hit by cyberattack</a></li><li><a title="CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term" rel="nofollow" href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia">CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term</a></li><li><a title="Antiy Report on cyber operations in Venezuela" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/US_military_cyber_ops_in_Venezuela_spectrum_speculation-analysis.html">Antiy Report on cyber operations in Venezuela</a></li><li><a title="Nationwide internet blackout reported in Iran" rel="nofollow" href="https://www.reuters.com/world/middle-east/iran-warns-suppliers-against-overpricing-or-hoarding-goods-2026-01-08/">Nationwide internet blackout reported in Iran</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11KT2hDzyOlv3WdxyVfw9pjW2xV56p9dyACgqZenlDBk/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/">Sponsor: Material Security</a></li><li><a title="About Hamid Kashfi" rel="nofollow" href="https://www.darkcell.se/about">About Hamid Kashfi</a></li><li><a title="Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://securityconversations.com/episode/israel-iran-cyberwar-predatory-sparrow-vanishing-crypto-bank-hacks/">Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Venezuela strike marks a turning point for US cyber warfare" rel="nofollow" href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li><li><a title="KittenBusters | CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">KittenBusters | CharmingKitten</a></li><li><a title="Comprehensive Threat Intelligence Report: Charming Kitten" rel="nofollow" href="https://gist.github.com/Hamid-K#comprehensive-threat-intelligence-report-charming-kitten">Comprehensive Threat Intelligence Report: Charming Kitten</a></li><li><a title="Between Three Nerds: The evolution of Iranian cyber espionage" rel="nofollow" href="https://risky.biz/BTN148/">Between Three Nerds: The evolution of Iranian cyber espionage</a></li><li><a title="Trump says U.S. will hit Iran &quot;very hard&quot; if violence continues at protests" rel="nofollow" href="https://www.cbsnews.com/video/trump-says-us-will-hit-iran-very-hard-if-violence-continues-at-protests/">Trump says U.S. will hit Iran "very hard" if violence continues at protests</a></li><li><a title="Venezuelan oil giant PVDSA hit by cyberattack" rel="nofollow" href="https://www.techradar.com/pro/security/venezuelan-oil-giant-pvdsa-hit-by-cyberattack-amid-us-conflict">Venezuelan oil giant PVDSA hit by cyberattack</a></li><li><a title="CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term" rel="nofollow" href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia">CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term</a></li><li><a title="Antiy Report on cyber operations in Venezuela" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/US_military_cyber_ops_in_Venezuela_spectrum_speculation-analysis.html">Antiy Report on cyber operations in Venezuela</a></li><li><a title="Nationwide internet blackout reported in Iran" rel="nofollow" href="https://www.reuters.com/world/middle-east/iran-warns-suppliers-against-overpricing-or-hoarding-goods-2026-01-08/">Nationwide internet blackout reported in Iran</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>A special mailbag episode with book recommendations</title>
  <link>http://securityconversations.fireside.fm/mongobleed-ai-misuse-books-to-read-mailbag</link>
  <guid isPermaLink="false">3e2f17a7-107f-4709-8697-d066d253fde2</guid>
  <pubDate>Fri, 02 Jan 2026 13:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3e2f17a7-107f-4709-8697-d066d253fde2.mp3" length="146032941" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 79: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.

In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>3:01:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3e2f17a7-107f-4709-8697-d066d253fde2/cover.jpg?v=1"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 79: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.
In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. 
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>mongodb, mongobleed, mailbag, book recommendations, CVE‑2025‑14847, book club, sanctions, intellexa, predator spyware, bluetooth, ransomware</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 79</strong>: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.</p>

<p>In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18T3pUHEZlaSS8CnjRBfeTTpYL9XG4xJaacMu-Z-QTmQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsored by Material Security" rel="nofollow" href="https://material.security/">Sponsored by Material Security</a></li><li><a title="MongoDB Server Security Update (Dec 2025)" rel="nofollow" href="https://www.mongodb.com/company/blog/news/mongodb-server-security-update-december-2025">MongoDB Server Security Update (Dec 2025)</a></li><li><a title="CVE Record: CVE-2025-14847" rel="nofollow" href="https://www.cve.org/CVERecord?id=CVE-2025-14847">CVE Record: CVE-2025-14847</a></li><li><a title="Censys on MongoBleed" rel="nofollow" href="https://docs.censys.com/changelog/december-29-2025">Censys on MongoBleed</a></li><li><a title="European Space Agency hit by cyberattack" rel="nofollow" href="https://www.theregister.com/2025/12/31/european_space_agency_hacked/">European Space Agency hit by cyberattack</a></li><li><a title="Security pros plead guilty to ransomware " rel="nofollow" href="https://www.justice.gov/opa/pr/two-americans-plead-guilty-targeting-multiple-us-victims-using-alphv-blackcat-ransomware">Security pros plead guilty to ransomware </a></li><li><a title="US removes sanctions for three execs tied to spyware maker Intellexa" rel="nofollow" href="https://therecord.media/treasury-sanctions-intellexa-removed">US removes sanctions for three execs tied to spyware maker Intellexa</a></li><li><a title="Bluetooth Headphone Jacking: A Key to Your Phone " rel="nofollow" href="https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone">Bluetooth Headphone Jacking: A Key to Your Phone </a></li><li><a title="Dan Geer Black Hat 2015 keynote" rel="nofollow" href="http://geer.tinho.net/geer.blackhat.6viii14.txt">Dan Geer Black Hat 2015 keynote</a></li><li><a title="Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy" rel="nofollow" href="https://www.securityweek.com/book-review-infected-a-candid-look-at-virustotals-birth-and-legacy/">Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy</a></li><li><a title="Infected: From Side Project to Google: The Journey Behind VirusTotal " rel="nofollow" href="https://www.amazon.com/Infected-Project-Google-Journey-VirusTotal/dp/8409683660">Infected: From Side Project to Google: The Journey Behind VirusTotal </a></li><li><a title="The Human Factor (Inside the CIA&#39;s dysfunctional intelligence culture)" rel="nofollow" href="https://www.encounterbooks.com/books/the-human-factor-inside-the-cias-dysfunctional-intelligence-culture/?srsltid=AfmBOooKdoaZJkHxT2kjEpF8xemImXcVk9w-OtqZ-c4MJRxoyYHB_jve">The Human Factor (Inside the CIA's dysfunctional intelligence culture)</a></li><li><a title="A Killing Art: The Untold History of Tae Kwon Do" rel="nofollow" href="https://akillingart.com/read-the-book/">A Killing Art: The Untold History of Tae Kwon Do</a></li><li><a title="Thou Shall Prosper: Ten Commandments for Making Money" rel="nofollow" href="https://www.goodreads.com/book/show/944278.Thou_Shall_Prosper">Thou Shall Prosper: Ten Commandments for Making Money</a></li><li><a title="Cult of the Dead Cow (by Joseph Menn)" rel="nofollow" href="https://pageaday.com/products/cult-of-the-dead-cow-9781541706118?srsltid=AfmBOoo_14mI_IdJhn7tohBg_w05Y0o0IT0UzLNrekwl_b5kwK-j8mUQ">Cult of the Dead Cow (by Joseph Menn)</a></li><li><a title="The Nvidia Way: Jensen Huang and the Making of a Tech Giant" rel="nofollow" href="https://www.goodreads.com/book/show/218319936-the-nvidia-way">The Nvidia Way: Jensen Huang and the Making of a Tech Giant</a></li><li><a title="From Third World to First: The Singapore Story" rel="nofollow" href="https://www.goodreads.com/book/show/144409.From_Third_World_to_First">From Third World to First: The Singapore Story</a></li><li><a title="Thinking in Systems (PDF)" rel="nofollow" href="https://research.fit.edu/media/site-specific/researchfitedu/coast-climate-adaptation-library/climate-communications/psychology-amp-behavior/Meadows-2008.-Thinking-in-Systems.pdf">Thinking in Systems (PDF)</a></li><li><a title="AI Superpowers: China, Silicon Valley, and the New World Order" rel="nofollow" href="https://www.goodreads.com/book/show/38242135-ai-superpowers">AI Superpowers: China, Silicon Valley, and the New World Order</a></li><li><a title="The Denial of Death: Ernest Becker" rel="nofollow" href="https://www.amazon.com/Denial-Death-Ernest-Becker/dp/0684832402">The Denial of Death: Ernest Becker</a></li><li><a title="Energy and Civilization: A History by Vaclav Smil" rel="nofollow" href="https://www.goodreads.com/book/show/31850765-energy-and-civilization">Energy and Civilization: A History by Vaclav Smil</a></li><li><a title="DeepLearning.AI" rel="nofollow" href="https://www.deeplearning.ai/short-courses/claude-code-a-highly-agentic-coding-assistant/">DeepLearning.AI</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 79</strong>: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.</p>

<p>In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18T3pUHEZlaSS8CnjRBfeTTpYL9XG4xJaacMu-Z-QTmQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsored by Material Security" rel="nofollow" href="https://material.security/">Sponsored by Material Security</a></li><li><a title="MongoDB Server Security Update (Dec 2025)" rel="nofollow" href="https://www.mongodb.com/company/blog/news/mongodb-server-security-update-december-2025">MongoDB Server Security Update (Dec 2025)</a></li><li><a title="CVE Record: CVE-2025-14847" rel="nofollow" href="https://www.cve.org/CVERecord?id=CVE-2025-14847">CVE Record: CVE-2025-14847</a></li><li><a title="Censys on MongoBleed" rel="nofollow" href="https://docs.censys.com/changelog/december-29-2025">Censys on MongoBleed</a></li><li><a title="European Space Agency hit by cyberattack" rel="nofollow" href="https://www.theregister.com/2025/12/31/european_space_agency_hacked/">European Space Agency hit by cyberattack</a></li><li><a title="Security pros plead guilty to ransomware " rel="nofollow" href="https://www.justice.gov/opa/pr/two-americans-plead-guilty-targeting-multiple-us-victims-using-alphv-blackcat-ransomware">Security pros plead guilty to ransomware </a></li><li><a title="US removes sanctions for three execs tied to spyware maker Intellexa" rel="nofollow" href="https://therecord.media/treasury-sanctions-intellexa-removed">US removes sanctions for three execs tied to spyware maker Intellexa</a></li><li><a title="Bluetooth Headphone Jacking: A Key to Your Phone " rel="nofollow" href="https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone">Bluetooth Headphone Jacking: A Key to Your Phone </a></li><li><a title="Dan Geer Black Hat 2015 keynote" rel="nofollow" href="http://geer.tinho.net/geer.blackhat.6viii14.txt">Dan Geer Black Hat 2015 keynote</a></li><li><a title="Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy" rel="nofollow" href="https://www.securityweek.com/book-review-infected-a-candid-look-at-virustotals-birth-and-legacy/">Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy</a></li><li><a title="Infected: From Side Project to Google: The Journey Behind VirusTotal " rel="nofollow" href="https://www.amazon.com/Infected-Project-Google-Journey-VirusTotal/dp/8409683660">Infected: From Side Project to Google: The Journey Behind VirusTotal </a></li><li><a title="The Human Factor (Inside the CIA&#39;s dysfunctional intelligence culture)" rel="nofollow" href="https://www.encounterbooks.com/books/the-human-factor-inside-the-cias-dysfunctional-intelligence-culture/?srsltid=AfmBOooKdoaZJkHxT2kjEpF8xemImXcVk9w-OtqZ-c4MJRxoyYHB_jve">The Human Factor (Inside the CIA's dysfunctional intelligence culture)</a></li><li><a title="A Killing Art: The Untold History of Tae Kwon Do" rel="nofollow" href="https://akillingart.com/read-the-book/">A Killing Art: The Untold History of Tae Kwon Do</a></li><li><a title="Thou Shall Prosper: Ten Commandments for Making Money" rel="nofollow" href="https://www.goodreads.com/book/show/944278.Thou_Shall_Prosper">Thou Shall Prosper: Ten Commandments for Making Money</a></li><li><a title="Cult of the Dead Cow (by Joseph Menn)" rel="nofollow" href="https://pageaday.com/products/cult-of-the-dead-cow-9781541706118?srsltid=AfmBOoo_14mI_IdJhn7tohBg_w05Y0o0IT0UzLNrekwl_b5kwK-j8mUQ">Cult of the Dead Cow (by Joseph Menn)</a></li><li><a title="The Nvidia Way: Jensen Huang and the Making of a Tech Giant" rel="nofollow" href="https://www.goodreads.com/book/show/218319936-the-nvidia-way">The Nvidia Way: Jensen Huang and the Making of a Tech Giant</a></li><li><a title="From Third World to First: The Singapore Story" rel="nofollow" href="https://www.goodreads.com/book/show/144409.From_Third_World_to_First">From Third World to First: The Singapore Story</a></li><li><a title="Thinking in Systems (PDF)" rel="nofollow" href="https://research.fit.edu/media/site-specific/researchfitedu/coast-climate-adaptation-library/climate-communications/psychology-amp-behavior/Meadows-2008.-Thinking-in-Systems.pdf">Thinking in Systems (PDF)</a></li><li><a title="AI Superpowers: China, Silicon Valley, and the New World Order" rel="nofollow" href="https://www.goodreads.com/book/show/38242135-ai-superpowers">AI Superpowers: China, Silicon Valley, and the New World Order</a></li><li><a title="The Denial of Death: Ernest Becker" rel="nofollow" href="https://www.amazon.com/Denial-Death-Ernest-Becker/dp/0684832402">The Denial of Death: Ernest Becker</a></li><li><a title="Energy and Civilization: A History by Vaclav Smil" rel="nofollow" href="https://www.goodreads.com/book/show/31850765-energy-and-civilization">Energy and Civilization: A History by Vaclav Smil</a></li><li><a title="DeepLearning.AI" rel="nofollow" href="https://www.deeplearning.ai/short-courses/claude-code-a-highly-agentic-coding-assistant/">DeepLearning.AI</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning</title>
  <link>http://securityconversations.fireside.fm/quiet-wins-loud-failures-yearend-awards</link>
  <guid isPermaLink="false">1137add6-e8ef-419f-9e3e-ddf5bd1ecefb</guid>
  <pubDate>Fri, 26 Dec 2025 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1137add6-e8ef-419f-9e3e-ddf5bd1ecefb.mp3" length="159884829" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. 

Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>3:19:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1137add6-e8ef-419f-9e3e-ddf5bd1ecefb/cover.jpg?v=1"/>
  <description>(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.)
Three Buddy Problem - Episode 78:  We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. 
Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Israel, Bitcoin, Predatory Sparrow, Bitcoin, Novitex, nuclear, Stuxnet, drone swarms, autonomous warfare, China, Russia, Apple, Microsoft, Cloudflare, Romania</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 78</strong>:  We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. </p>

<p>Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uPUah0en4wBwUMpyQLWpSK26VZ4MeaQBtddaZQmwPec/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker Solutions" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions</a></li><li><a title="Acting CISA director failed a polygraph" rel="nofollow" href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">Acting CISA director failed a polygraph</a></li><li><a title="LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices</a></li><li><a title="Qianxin’s research on the CSDN watering hole attack" rel="nofollow" href="https://mp.weixin.qq.com/s/qQw1DXE25Gkz_P8pEPVaHg">Qianxin’s research on the CSDN watering hole attack</a></li><li><a title="ViciousTrap - Turning edge devices into honeypots en masse" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap - Turning edge devices into honeypots en masse</a></li><li><a title="AyySSHush: Tradecraft of an emergent ASUS botnet" rel="nofollow" href="https://www.labs.greynoise.io/grimoire/2025-03-28-ayysshush/?_ga=2.23890233.202841663.1766426904-1550568476.1766426904">AyySSHush: Tradecraft of an emergent ASUS botnet</a></li><li><a title="Intellexa’s Global Corporate Web (Recorded Future)" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Intellexa’s Global Corporate Web (Recorded Future)</a></li><li><a title="Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia</a></li><li><a title="GitHub - KittenBusters/CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">GitHub - KittenBusters/CharmingKitten</a></li><li><a title="Bunnie Huang Black Hat keynote (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=Nv92TuocnwA">Bunnie Huang Black Hat keynote (YouTube)</a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts" rel="nofollow" href="https://newsletter.semianalysis.com/p/deepseek-debates">DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts</a></li><li><a title="Behind the Dismantling of Hezbollah " rel="nofollow" href="https://archive.ph/xcBeL">Behind the Dismantling of Hezbollah </a></li><li><a title="Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within" rel="nofollow" href="https://www.propublica.org/article/israel-iran-war-mossad-iranian-recruits">Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within</a></li><li><a title="Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets</a></li><li><a title="Code Orange: Cloudflare resilience plan following recent incidents" rel="nofollow" href="https://blog.cloudflare.com/fail-small-resilience-plan/">Code Orange: Cloudflare resilience plan following recent incidents</a></li><li><a title="Apple SEAR: Memory Integrity Enforcement" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple SEAR: Memory Integrity Enforcement</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 78</strong>:  We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. </p>

<p>Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uPUah0en4wBwUMpyQLWpSK26VZ4MeaQBtddaZQmwPec/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker Solutions" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions</a></li><li><a title="Acting CISA director failed a polygraph" rel="nofollow" href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">Acting CISA director failed a polygraph</a></li><li><a title="LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices</a></li><li><a title="Qianxin’s research on the CSDN watering hole attack" rel="nofollow" href="https://mp.weixin.qq.com/s/qQw1DXE25Gkz_P8pEPVaHg">Qianxin’s research on the CSDN watering hole attack</a></li><li><a title="ViciousTrap - Turning edge devices into honeypots en masse" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap - Turning edge devices into honeypots en masse</a></li><li><a title="AyySSHush: Tradecraft of an emergent ASUS botnet" rel="nofollow" href="https://www.labs.greynoise.io/grimoire/2025-03-28-ayysshush/?_ga=2.23890233.202841663.1766426904-1550568476.1766426904">AyySSHush: Tradecraft of an emergent ASUS botnet</a></li><li><a title="Intellexa’s Global Corporate Web (Recorded Future)" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Intellexa’s Global Corporate Web (Recorded Future)</a></li><li><a title="Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia</a></li><li><a title="GitHub - KittenBusters/CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">GitHub - KittenBusters/CharmingKitten</a></li><li><a title="Bunnie Huang Black Hat keynote (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=Nv92TuocnwA">Bunnie Huang Black Hat keynote (YouTube)</a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts" rel="nofollow" href="https://newsletter.semianalysis.com/p/deepseek-debates">DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts</a></li><li><a title="Behind the Dismantling of Hezbollah " rel="nofollow" href="https://archive.ph/xcBeL">Behind the Dismantling of Hezbollah </a></li><li><a title="Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within" rel="nofollow" href="https://www.propublica.org/article/israel-iran-war-mossad-iranian-recruits">Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within</a></li><li><a title="Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets</a></li><li><a title="Code Orange: Cloudflare resilience plan following recent incidents" rel="nofollow" href="https://blog.cloudflare.com/fail-small-resilience-plan/">Code Orange: Cloudflare resilience plan following recent incidents</a></li><li><a title="Apple SEAR: Memory Integrity Enforcement" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple SEAR: Memory Integrity Enforcement</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>What's behind US gov push to 'privatize' offensive cyber operations?</title>
  <link>http://securityconversations.fireside.fm/us-gov-privatization-of-cyber-operations</link>
  <guid isPermaLink="false">7c985910-acfc-4782-aa15-94055ff20afc</guid>
  <pubDate>Sat, 20 Dec 2025 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7c985910-acfc-4782-aa15-94055ff20afc.mp3" length="98212017" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 77:  New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.

Plus, the US government's push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:01:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7c985910-acfc-4782-aa15-94055ff20afc/cover.jpg?v=1"/>
  <description>(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.)
Three Buddy Problem - Episode 77: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.
Plus, the US government's push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>US government, letters of marque, offense, China, Amazon, GRU, iOS 26, Apple, zero-days, Cisco, AI, Russia, Belarus, spyware</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 77</strong>: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.</p>

<p>Plus, the US government&#39;s push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="ThreatLocker Solutions " rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DHHlaWwcW0CyTEEO6anEDavihfIqb7sxklsdXJzBNEQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Trump Admin Turning to Private Firms in Cyber Offensive" rel="nofollow" href="https://archive.ph/GIb8s">Trump Admin Turning to Private Firms in Cyber Offensive</a></li><li><a title="Microsoft on React2Shell" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/">Microsoft on React2Shell</a></li><li><a title="React2Shell and OpenAI (shoutout Andrew MacPherson)" rel="nofollow" href="https://openai.com/index/introducing-gpt-5-2-codex/">React2Shell and OpenAI (shoutout Andrew MacPherson)</a></li><li><a title="Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw" rel="nofollow" href="https://www.securityweek.com/apple-patches-two-zero-days-tied-to-mysterious-exploited-chrome-flaw/">Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw</a></li><li><a title="iOS 26.2 Security Patches" rel="nofollow" href="https://support.apple.com/en-us/125884">iOS 26.2 Security Patches</a></li><li><a title="Reporters Without Borders uncovers new spyware from Belarus" rel="nofollow" href="https://rsf.org/en/exclusive-rsf-uncovers-new-spyware-belarus">Reporters Without Borders uncovers new spyware from Belarus</a></li><li><a title="Cisco Talos on Cisco 0day attacks" rel="nofollow" href="https://blog.talosintelligence.com/uat-9686/">Cisco Talos on Cisco 0day attacks</a></li><li><a title="Hack of Chinese state time center hints at U.S. advanced missile defense" rel="nofollow" href="https://www.washingtontimes.com/news/2025/dec/17/hack-chinese-state-time-center-hints-us-advanced-missile-defense/">Hack of Chinese state time center hints at U.S. advanced missile defense</a></li><li><a title="Amazon on Russian APT targeting Western critical infrastructure" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">Amazon on Russian APT targeting Western critical infrastructure</a></li><li><a title="North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location" rel="nofollow" href="https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location">North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location</a></li><li><a title="Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs" rel="nofollow" href="https://intezer.com/blog/tracing-a-paper-werewolf-campaign-through-ai-generated-decoys-and-excel-xlls/">Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs</a></li><li><a title="Russian defense firms targeted by hackers using AI" rel="nofollow" href="https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/">Russian defense firms targeted by hackers using AI</a></li><li><a title="TLPBLACK looks back at 2025" rel="nofollow" href="https://tlpblack.net/blog/20251218-cybersecurity-year-in-review">TLPBLACK looks back at 2025</a></li><li><a title="Inside Google&#39;s basement in Malaga: ChatGPT of Cybersecurity" rel="nofollow" href="https://www.surinenglish.com/malaga/malaga-city/inside-googles-basement-malaga-bernardo-quintero-and-20250929151803-nt.html">Inside Google's basement in Malaga: ChatGPT of Cybersecurity</a></li><li><a title="GitHub - xdanx/open-klara: Open KLara Project" rel="nofollow" href="https://github.com/xdanx/open-klara">GitHub - xdanx/open-klara: Open KLara Project</a></li><li><a title="Gepetto Web" rel="nofollow" href="https://blog.kwiatkowski.fr/gepetto-web">Gepetto Web</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 77</strong>: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.</p>

<p>Plus, the US government&#39;s push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="ThreatLocker Solutions " rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DHHlaWwcW0CyTEEO6anEDavihfIqb7sxklsdXJzBNEQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Trump Admin Turning to Private Firms in Cyber Offensive" rel="nofollow" href="https://archive.ph/GIb8s">Trump Admin Turning to Private Firms in Cyber Offensive</a></li><li><a title="Microsoft on React2Shell" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/">Microsoft on React2Shell</a></li><li><a title="React2Shell and OpenAI (shoutout Andrew MacPherson)" rel="nofollow" href="https://openai.com/index/introducing-gpt-5-2-codex/">React2Shell and OpenAI (shoutout Andrew MacPherson)</a></li><li><a title="Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw" rel="nofollow" href="https://www.securityweek.com/apple-patches-two-zero-days-tied-to-mysterious-exploited-chrome-flaw/">Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw</a></li><li><a title="iOS 26.2 Security Patches" rel="nofollow" href="https://support.apple.com/en-us/125884">iOS 26.2 Security Patches</a></li><li><a title="Reporters Without Borders uncovers new spyware from Belarus" rel="nofollow" href="https://rsf.org/en/exclusive-rsf-uncovers-new-spyware-belarus">Reporters Without Borders uncovers new spyware from Belarus</a></li><li><a title="Cisco Talos on Cisco 0day attacks" rel="nofollow" href="https://blog.talosintelligence.com/uat-9686/">Cisco Talos on Cisco 0day attacks</a></li><li><a title="Hack of Chinese state time center hints at U.S. advanced missile defense" rel="nofollow" href="https://www.washingtontimes.com/news/2025/dec/17/hack-chinese-state-time-center-hints-us-advanced-missile-defense/">Hack of Chinese state time center hints at U.S. advanced missile defense</a></li><li><a title="Amazon on Russian APT targeting Western critical infrastructure" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">Amazon on Russian APT targeting Western critical infrastructure</a></li><li><a title="North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location" rel="nofollow" href="https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location">North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location</a></li><li><a title="Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs" rel="nofollow" href="https://intezer.com/blog/tracing-a-paper-werewolf-campaign-through-ai-generated-decoys-and-excel-xlls/">Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs</a></li><li><a title="Russian defense firms targeted by hackers using AI" rel="nofollow" href="https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/">Russian defense firms targeted by hackers using AI</a></li><li><a title="TLPBLACK looks back at 2025" rel="nofollow" href="https://tlpblack.net/blog/20251218-cybersecurity-year-in-review">TLPBLACK looks back at 2025</a></li><li><a title="Inside Google&#39;s basement in Malaga: ChatGPT of Cybersecurity" rel="nofollow" href="https://www.surinenglish.com/malaga/malaga-city/inside-googles-basement-malaga-bernardo-quintero-and-20250929151803-nt.html">Inside Google's basement in Malaga: ChatGPT of Cybersecurity</a></li><li><a title="GitHub - xdanx/open-klara: Open KLara Project" rel="nofollow" href="https://github.com/xdanx/open-klara">GitHub - xdanx/open-klara: Open KLara Project</a></li><li><a title="Gepetto Web" rel="nofollow" href="https://blog.kwiatkowski.fr/gepetto-web">Gepetto Web</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Legal corruption, React2Shell exploitation, dual-use AI risks</title>
  <link>http://securityconversations.fireside.fm/legal-corruption-react2shell-dual-use-ai</link>
  <guid isPermaLink="false">19aa0c04-e5f9-41d8-aaf1-ff63afa670c2</guid>
  <pubDate>Thu, 11 Dec 2025 00:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/19aa0c04-e5f9-41d8-aaf1-ff63afa670c2.mp3" length="109850621" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 76:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  

Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:12:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/19aa0c04-e5f9-41d8-aaf1-ff63afa670c2/cover.jpg?v=1"/>
  <description>(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.)
Three Buddy Problem - Episode 76:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  
Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>React, zero-day, Patch Tuesday, Microsoft, Google, Russia, China, Chrome, OpenAI, ChatGPT, Ukraine</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 76</strong>:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  </p>

<p>Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1QvJifziSlBUyaXKXsXw3-hdK5nXZpyi8ucx1YSr60gE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker : A security platform that prevents ransomware" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker : A security platform that prevents ransomware</a></li><li><a title="The Anatomy of a React2Shell Compromise (TLPBLACK)" rel="nofollow" href="https://tlpblack.net/blog/20251209-the-anatomy-of-a-react2shell-compromise">The Anatomy of a React2Shell Compromise (TLPBLACK)</a></li><li><a title="CVE-2025-55182 Analysis Report (GreyNoise)" rel="nofollow" href="https://react2025cve-analysis.pages.dev/">CVE-2025-55182 Analysis Report (GreyNoise)</a></li><li><a title="Exploitation of Critical Vulnerability in React Server Components" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2025-55182-react-and-CVE-2025-66478-next/">Exploitation of Critical Vulnerability in React Server Components</a></li><li><a title="PeerBlight Linux Backdoor Exploits React2Shell (Huntress)" rel="nofollow" href="https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell">PeerBlight Linux Backdoor Exploits React2Shell (Huntress)</a></li><li><a title="Patch Tuesday round-up (ZDI)" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/12/9/the-december-2025-security-update-review">Patch Tuesday round-up (ZDI)</a></li><li><a title="How Two Hackers Went From Cisco Academy to Cisco CVEs" rel="nofollow" href="https://www.sentinelone.com/labs/malicious-apprentice-how-two-hackers-went-from-cisco-academy-to-cisco-cves/">How Two Hackers Went From Cisco Academy to Cisco CVEs</a></li><li><a title="Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ " rel="nofollow" href="https://archive.ph/bpdaU">Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ </a></li><li><a title="OpenAI on dual-use AI risks" rel="nofollow" href="https://openai.com/index/strengthening-cyber-resilience/">OpenAI on dual-use AI risks</a></li><li><a title="Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite" rel="nofollow" href="https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/">Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite</a></li><li><a title="DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal">DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups</a></li><li><a title="Microsoft paying bounties for vulns in third-party code" rel="nofollow" href="https://www.microsoft.com/en-us/msrc/blog/2025/12/in-scope-by-default">Microsoft paying bounties for vulns in third-party code</a></li><li><a title="Cybersecurity 2026 Predictions (SentinelLABS)" rel="nofollow" href="https://www.sentinelone.com/blog/cybersecurity-2026-the-year-ahead-in-ai-adversaries-and-global-change/">Cybersecurity 2026 Predictions (SentinelLABS)</a></li><li><a title="Dakota Cary is in the &quot;anti-China Chorus&quot;" rel="nofollow" href="https://www.linkedin.com/posts/dakotacary_thanks-for-the-love-china-happy-to-be-part-activity-7402094307261706240-Bjr6/">Dakota Cary is in the "anti-China Chorus"</a></li><li><a title="Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing" rel="nofollow" href="https://arxiv.org/abs/2512.09882">Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing</a></li><li><a title="Automated React2Shell vulnerability patching is now available - Vercel" rel="nofollow" href="https://vercel.com/changelog/automated-react2shell-vulnerability-patching-is-now-available">Automated React2Shell vulnerability patching is now available - Vercel</a></li><li><a title="Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research" rel="nofollow" href="https://www.itweb.co.za/article/computer-olympiad-enters-new-era-as-iitpsa-hands-over-to-thinkst-applied-research/j5alrMQALdWMpYQk">Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 76</strong>:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  </p>

<p>Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1QvJifziSlBUyaXKXsXw3-hdK5nXZpyi8ucx1YSr60gE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker : A security platform that prevents ransomware" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker : A security platform that prevents ransomware</a></li><li><a title="The Anatomy of a React2Shell Compromise (TLPBLACK)" rel="nofollow" href="https://tlpblack.net/blog/20251209-the-anatomy-of-a-react2shell-compromise">The Anatomy of a React2Shell Compromise (TLPBLACK)</a></li><li><a title="CVE-2025-55182 Analysis Report (GreyNoise)" rel="nofollow" href="https://react2025cve-analysis.pages.dev/">CVE-2025-55182 Analysis Report (GreyNoise)</a></li><li><a title="Exploitation of Critical Vulnerability in React Server Components" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2025-55182-react-and-CVE-2025-66478-next/">Exploitation of Critical Vulnerability in React Server Components</a></li><li><a title="PeerBlight Linux Backdoor Exploits React2Shell (Huntress)" rel="nofollow" href="https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell">PeerBlight Linux Backdoor Exploits React2Shell (Huntress)</a></li><li><a title="Patch Tuesday round-up (ZDI)" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/12/9/the-december-2025-security-update-review">Patch Tuesday round-up (ZDI)</a></li><li><a title="How Two Hackers Went From Cisco Academy to Cisco CVEs" rel="nofollow" href="https://www.sentinelone.com/labs/malicious-apprentice-how-two-hackers-went-from-cisco-academy-to-cisco-cves/">How Two Hackers Went From Cisco Academy to Cisco CVEs</a></li><li><a title="Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ " rel="nofollow" href="https://archive.ph/bpdaU">Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ </a></li><li><a title="OpenAI on dual-use AI risks" rel="nofollow" href="https://openai.com/index/strengthening-cyber-resilience/">OpenAI on dual-use AI risks</a></li><li><a title="Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite" rel="nofollow" href="https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/">Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite</a></li><li><a title="DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal">DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups</a></li><li><a title="Microsoft paying bounties for vulns in third-party code" rel="nofollow" href="https://www.microsoft.com/en-us/msrc/blog/2025/12/in-scope-by-default">Microsoft paying bounties for vulns in third-party code</a></li><li><a title="Cybersecurity 2026 Predictions (SentinelLABS)" rel="nofollow" href="https://www.sentinelone.com/blog/cybersecurity-2026-the-year-ahead-in-ai-adversaries-and-global-change/">Cybersecurity 2026 Predictions (SentinelLABS)</a></li><li><a title="Dakota Cary is in the &quot;anti-China Chorus&quot;" rel="nofollow" href="https://www.linkedin.com/posts/dakotacary_thanks-for-the-love-china-happy-to-be-part-activity-7402094307261706240-Bjr6/">Dakota Cary is in the "anti-China Chorus"</a></li><li><a title="Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing" rel="nofollow" href="https://arxiv.org/abs/2512.09882">Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing</a></li><li><a title="Automated React2Shell vulnerability patching is now available - Vercel" rel="nofollow" href="https://vercel.com/changelog/automated-react2shell-vulnerability-patching-is-now-available">Automated React2Shell vulnerability patching is now available - Vercel</a></li><li><a title="Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research" rel="nofollow" href="https://www.itweb.co.za/article/computer-olympiad-enters-new-era-as-iitpsa-hands-over-to-thinkst-applied-research/j5alrMQALdWMpYQk">Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>APTs pounce on React2Shell; BRICKSTORM backdoors; .gov surveillance</title>
  <link>http://securityconversations.fireside.fm/react2shell-group78-brickstorm-ai-smart-contract</link>
  <guid isPermaLink="false">e6afdf9b-3a12-408d-a9c0-59ed0c3b899a</guid>
  <pubDate>Sat, 06 Dec 2025 10:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e6afdf9b-3a12-408d-a9c0-59ed0c3b899a.mp3" length="80166900" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 75:  We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.

Plus, commentary on Chrome’s telemetry collection, Microsoft and the "SFI success story," newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic's AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>1:41:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e6afdf9b-3a12-408d-a9c0-59ed0c3b899a/cover.jpg?v=1"/>
  <description>(Presented by ThreatLocker (https://threatlocker.com/threebuddyproblem): Allow what you need. Block everything else by default, including ransomware and rogue code.)
Three Buddy Problem - Episode 75: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.
Plus, commentary on Chrome’s telemetry collection, Microsoft and the "SFI success story," newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic's AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>ThreatLocker, React2Shell, Jackpot Panda, China, CVE-2025-55182, RCE, Warp Panda, Brickstorm, FirstWap, GrapheneOS, Group 78,  Intellexa, spyware, Calisto, Google, Microsoft</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 75</strong>: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.</p>

<p>Plus, commentary on Chrome’s telemetry collection, Microsoft and the &quot;SFI success story,&quot; newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic&#39;s AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DZ0EOVM_wbkXbdlKkiSsf1PpbjYqBTAcJLAxnO2TeYU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker</a> &mdash; Meet the cybersecurity platform that prevents ransomware</li><li><a title="An essay by Vess" rel="nofollow" href="https://bontchev.nlcv.bas.bg/bye.html">An essay by Vess</a></li><li><a title="RIP Stealth" rel="nofollow" href="https://www.thc.org/404/stealth/eulogy.txt">RIP Stealth</a></li><li><a title="Google Goodbye to the Chrome Cleanup Tool" rel="nofollow" href="https://security.googleblog.com/2023/03/thank-you-and-goodbye-to-chrome-cleanup.html">Google Goodbye to the Chrome Cleanup Tool</a></li><li><a title="US National Security Strategy (PDF)" rel="nofollow" href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">US National Security Strategy (PDF)</a></li><li><a title="Critical Security Vulnerability in React Server Components (CVE-2025-55182) " rel="nofollow" href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components">Critical Security Vulnerability in React Server Components (CVE-2025-55182) </a></li><li><a title="Chinese threat groups rapidly exploit React2Shell vuln" rel="nofollow" href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/">Chinese threat groups rapidly exploit React2Shell vuln</a></li><li><a title="AWS MadPot" rel="nofollow" href="https://aws.amazon.com/blogs/security/how-aws-tracks-the-clouds-biggest-security-threats-and-helps-shut-them-down/">AWS MadPot</a></li><li><a title="BRICKSTORM Backdoor (PDF)" rel="nofollow" href="https://media.defense.gov/2025/Dec/04/2003834878/-1/-1/0/MALWARE-ANALYSIS-REPORT-BRICKSTORM-BACKDOOR.PDF">BRICKSTORM Backdoor (PDF)</a></li><li><a title="WARP PANDA: A New Sophisticated China-Nexus Adversary" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/">WARP PANDA: A New Sophisticated China-Nexus Adversary</a></li><li><a title="Meet Group 78, the secret US task force that fights cybercriminals" rel="nofollow" href="https://archive.vn/UKEmz">Meet Group 78, the secret US task force that fights cybercriminals</a></li><li><a title="Recorded Future: Intellexa’s Global Corporate Web" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Recorded Future: Intellexa’s Global Corporate Web</a></li><li><a title="Intellexa’s Prolific Zero-Day Exploits Continue" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/intellexa-zero-day-exploits-continue">Intellexa’s Prolific Zero-Day Exploits Continue</a></li><li><a title="To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware" rel="nofollow" href="https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/">To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware</a></li><li><a title="Apple, Google send new round of threat notifications to users around world" rel="nofollow" href="https://www.reuters.com/technology/apple-sent-new-round-cyber-threat-notifications-users-84-countries-2025-12-05/">Apple, Google send new round of threat notifications to users around world</a></li><li><a title="Calisto Targets Reporters Without Borders in Phishing Campaign" rel="nofollow" href="https://blog.sekoia.io/ngo-reporters-without-borders-targeted-by-calisto-in-recent-campaign/">Calisto Targets Reporters Without Borders in Phishing Campaign</a></li><li><a title="Anthropic AI agents find $4.6M in blockchain smart contract exploits" rel="nofollow" href="https://red.anthropic.com/2025/smart-contracts/">Anthropic AI agents find $4.6M in blockchain smart contract exploits</a></li><li><a title="Lazarus hack largest South Korean crypto exchange" rel="nofollow" href="https://upbit.com/service_center/notice?id=5800&amp;view=share">Lazarus hack largest South Korean crypto exchange</a></li><li><a title="EU countries reach breakthrough on chat-scanning law despite intense pushback" rel="nofollow" href="https://www.euractiv.com/news/eu-countries-reach-breakthrough-on-chat-scanning-law-despite-intense-pushback/">EU countries reach breakthrough on chat-scanning law despite intense pushback</a></li><li><a title="The Denial of Death - by Ernest Becker" rel="nofollow" href="https://www.goodreads.com/book/show/2761.The_Denial_of_Death">The Denial of Death - by Ernest Becker</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 75</strong>: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.</p>

<p>Plus, commentary on Chrome’s telemetry collection, Microsoft and the &quot;SFI success story,&quot; newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic&#39;s AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DZ0EOVM_wbkXbdlKkiSsf1PpbjYqBTAcJLAxnO2TeYU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker</a> &mdash; Meet the cybersecurity platform that prevents ransomware</li><li><a title="An essay by Vess" rel="nofollow" href="https://bontchev.nlcv.bas.bg/bye.html">An essay by Vess</a></li><li><a title="RIP Stealth" rel="nofollow" href="https://www.thc.org/404/stealth/eulogy.txt">RIP Stealth</a></li><li><a title="Google Goodbye to the Chrome Cleanup Tool" rel="nofollow" href="https://security.googleblog.com/2023/03/thank-you-and-goodbye-to-chrome-cleanup.html">Google Goodbye to the Chrome Cleanup Tool</a></li><li><a title="US National Security Strategy (PDF)" rel="nofollow" href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">US National Security Strategy (PDF)</a></li><li><a title="Critical Security Vulnerability in React Server Components (CVE-2025-55182) " rel="nofollow" href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components">Critical Security Vulnerability in React Server Components (CVE-2025-55182) </a></li><li><a title="Chinese threat groups rapidly exploit React2Shell vuln" rel="nofollow" href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/">Chinese threat groups rapidly exploit React2Shell vuln</a></li><li><a title="AWS MadPot" rel="nofollow" href="https://aws.amazon.com/blogs/security/how-aws-tracks-the-clouds-biggest-security-threats-and-helps-shut-them-down/">AWS MadPot</a></li><li><a title="BRICKSTORM Backdoor (PDF)" rel="nofollow" href="https://media.defense.gov/2025/Dec/04/2003834878/-1/-1/0/MALWARE-ANALYSIS-REPORT-BRICKSTORM-BACKDOOR.PDF">BRICKSTORM Backdoor (PDF)</a></li><li><a title="WARP PANDA: A New Sophisticated China-Nexus Adversary" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/">WARP PANDA: A New Sophisticated China-Nexus Adversary</a></li><li><a title="Meet Group 78, the secret US task force that fights cybercriminals" rel="nofollow" href="https://archive.vn/UKEmz">Meet Group 78, the secret US task force that fights cybercriminals</a></li><li><a title="Recorded Future: Intellexa’s Global Corporate Web" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Recorded Future: Intellexa’s Global Corporate Web</a></li><li><a title="Intellexa’s Prolific Zero-Day Exploits Continue" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/intellexa-zero-day-exploits-continue">Intellexa’s Prolific Zero-Day Exploits Continue</a></li><li><a title="To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware" rel="nofollow" href="https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/">To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware</a></li><li><a title="Apple, Google send new round of threat notifications to users around world" rel="nofollow" href="https://www.reuters.com/technology/apple-sent-new-round-cyber-threat-notifications-users-84-countries-2025-12-05/">Apple, Google send new round of threat notifications to users around world</a></li><li><a title="Calisto Targets Reporters Without Borders in Phishing Campaign" rel="nofollow" href="https://blog.sekoia.io/ngo-reporters-without-borders-targeted-by-calisto-in-recent-campaign/">Calisto Targets Reporters Without Borders in Phishing Campaign</a></li><li><a title="Anthropic AI agents find $4.6M in blockchain smart contract exploits" rel="nofollow" href="https://red.anthropic.com/2025/smart-contracts/">Anthropic AI agents find $4.6M in blockchain smart contract exploits</a></li><li><a title="Lazarus hack largest South Korean crypto exchange" rel="nofollow" href="https://upbit.com/service_center/notice?id=5800&amp;view=share">Lazarus hack largest South Korean crypto exchange</a></li><li><a title="EU countries reach breakthrough on chat-scanning law despite intense pushback" rel="nofollow" href="https://www.euractiv.com/news/eu-countries-reach-breakthrough-on-chat-scanning-law-despite-intense-pushback/">EU countries reach breakthrough on chat-scanning law despite intense pushback</a></li><li><a title="The Denial of Death - by Ernest Becker" rel="nofollow" href="https://www.goodreads.com/book/show/2761.The_Denial_of_Death">The Denial of Death - by Ernest Becker</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture</title>
  <link>http://securityconversations.fireside.fm/regulatory-retreats-russian-ai-fault-line</link>
  <guid isPermaLink="false">7c947947-5644-4334-baea-80d629cfb457</guid>
  <pubDate>Sat, 29 Nov 2025 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7c947947-5644-4334-baea-80d629cfb457.mp3" length="97441193" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 74: We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.

We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>1:57:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7c947947-5644-4334-baea-80d629cfb457/cover.jpg?v=3"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 74:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.
We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Microsoft, CISO, CYBERWARCON, Geneva Convention, Shai-Hulud, npm, supply chain, GitHub, CISA, Apple, iOS, Android, spyware, Arctic Wolf, Russia, Ukraine, FCC, Amazon, telcos, Material Security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1t0o3sQmcv3EUJyMZCM25MH3SPB4cFAhVfB3qMvwvOQ4/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft CISO LinkedIn comments" rel="nofollow" href="https://www.linkedin.com/posts/igor-tsyganskiy-9385951_last-week-at-cyberwarcon-i-gave-a-short-activity-7398088148834086912-_Y1A/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAfLqABykGPZb2fgxnSm0cjGdhFUlQg658">Microsoft CISO LinkedIn comments</a></li><li><a title="Shai Hulud 2.0 Strikes Again" rel="nofollow" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Shai Hulud 2.0 Strikes Again</a></li><li><a title="Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed" rel="nofollow" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed</a></li><li><a title="CISA guidance on mobile spyware on iOS, Android" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-11/guidance-mobile-communications-best-practices-20251124_508c.pdf">CISA guidance on mobile spyware on iOS, Android</a></li><li><a title="NSO Group argues WhatsApp injunction threatens existence" rel="nofollow" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/">NSO Group argues WhatsApp injunction threatens existence</a></li><li><a title="Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine" rel="nofollow" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/">Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine</a></li><li><a title="FCC revokes telecom cybersecurity rules after Salt Typhoon hacks" rel="nofollow" href="https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-vote">FCC revokes telecom cybersecurity rules after Salt Typhoon hacks</a></li><li><a title="FCC Chairman statement on removing telco rules" rel="nofollow" href="https://www.fcc.gov/news-events/blog/2025/10/29/halloween-treats">FCC Chairman statement on removing telco rules</a></li><li><a title="Amazon Is Using Specialized AI Agents for Deep Bug Hunting" rel="nofollow" href="https://archive.ph/Vq28p">Amazon Is Using Specialized AI Agents for Deep Bug Hunting</a></li><li><a title="Anthropic CEO called to testify on AI cyber threats" rel="nofollow" href="https://www.axios.com/2025/11/26/anthropic-google-cloud-quantum-xchange-house-homeland-hearing">Anthropic CEO called to testify on AI cyber threats</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Material Security (Book a demo)" rel="nofollow" href="https://material.security/product">Material Security (Book a demo)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1t0o3sQmcv3EUJyMZCM25MH3SPB4cFAhVfB3qMvwvOQ4/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft CISO LinkedIn comments" rel="nofollow" href="https://www.linkedin.com/posts/igor-tsyganskiy-9385951_last-week-at-cyberwarcon-i-gave-a-short-activity-7398088148834086912-_Y1A/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAfLqABykGPZb2fgxnSm0cjGdhFUlQg658">Microsoft CISO LinkedIn comments</a></li><li><a title="Shai Hulud 2.0 Strikes Again" rel="nofollow" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Shai Hulud 2.0 Strikes Again</a></li><li><a title="Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed" rel="nofollow" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed</a></li><li><a title="CISA guidance on mobile spyware on iOS, Android" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-11/guidance-mobile-communications-best-practices-20251124_508c.pdf">CISA guidance on mobile spyware on iOS, Android</a></li><li><a title="NSO Group argues WhatsApp injunction threatens existence" rel="nofollow" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/">NSO Group argues WhatsApp injunction threatens existence</a></li><li><a title="Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine" rel="nofollow" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/">Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine</a></li><li><a title="FCC revokes telecom cybersecurity rules after Salt Typhoon hacks" rel="nofollow" href="https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-vote">FCC revokes telecom cybersecurity rules after Salt Typhoon hacks</a></li><li><a title="FCC Chairman statement on removing telco rules" rel="nofollow" href="https://www.fcc.gov/news-events/blog/2025/10/29/halloween-treats">FCC Chairman statement on removing telco rules</a></li><li><a title="Amazon Is Using Specialized AI Agents for Deep Bug Hunting" rel="nofollow" href="https://archive.ph/Vq28p">Amazon Is Using Specialized AI Agents for Deep Bug Hunting</a></li><li><a title="Anthropic CEO called to testify on AI cyber threats" rel="nofollow" href="https://www.axios.com/2025/11/26/anthropic-google-cloud-quantum-xchange-house-homeland-hearing">Anthropic CEO called to testify on AI cyber threats</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Material Security (Book a demo)" rel="nofollow" href="https://material.security/product">Material Security (Book a demo)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Gemini 3 reactions, Fortinet/Chrome zero-days, a Cloudflare monoculture and a billion-dollar crypto twist</title>
  <link>http://securityconversations.fireside.fm/cyberwarcon-fortinet-chrome-zeroday-gemini</link>
  <guid isPermaLink="false">31f838fc-0034-4c68-9a05-ee1c232837dc</guid>
  <pubDate>Fri, 21 Nov 2025 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/31f838fc-0034-4c68-9a05-ee1c232837dc.mp3" length="115839478" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 73:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. 

Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China's CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:19:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/31f838fc-0034-4c68-9a05-ee1c232837dc/cover.jpg?v=2"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 73:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. 
Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China's CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Gemini, Google, Microsoft, CYBERWARCON, APT29, China, Russia, Volt Typhoon, Amazon, Venture Capital, Fortinet, Chrome, zero-day, Cloudflare, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 73</strong>:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. </p>

<p>Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China&#39;s CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security -- Stop Attacks, Secure Data " rel="nofollow" href="https://material.security/product">Material Security -- Stop Attacks, Secure Data </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1se0fiX0sXOEpp5I6NiQJYfcji4_6b0uowkHl2sv8vuU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Why Microsoft Needs to Split Windows in Two" rel="nofollow" href="https://medium.com/@costin.raiu/is-it-time-for-a-divorce-why-microsoft-needs-to-split-windows-in-two-29a46b0621b6?postPublishedType=initial">Why Microsoft Needs to Split Windows in Two</a></li><li><a title="CYBERWARCON agenda" rel="nofollow" href="https://www.cyberwarcon.com/agenda-25">CYBERWARCON agenda</a></li><li><a title="Amazon: Nation-state actors bridging cyber and kinetic warfare" rel="nofollow" href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/">Amazon: Nation-state actors bridging cyber and kinetic warfare</a></li><li><a title="Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools" rel="nofollow" href="https://archive.ph/YXh8Y">Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools</a></li><li><a title="Fortinet documents 0day attacks" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-513">Fortinet documents 0day attacks</a></li><li><a title="Fortinet CVE-2025-64446 Under Active Attack" rel="nofollow" href="https://decipher.sc/2025/11/17/fortinet-cve-2025-64446-under-active-attack/">Fortinet CVE-2025-64446 Under Active Attack</a></li><li><a title="Google Chrome zero-day exploited" rel="nofollow" href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html">Google Chrome zero-day exploited</a></li><li><a title="Cloudflare statement on outage on November 18, 2025" rel="nofollow" href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare statement on outage on November 18, 2025</a></li><li><a title="Cloudflare just got faster and more secure, powered by Rust" rel="nofollow" href="https://blog.cloudflare.com/20-percent-internet-upgrade/">Cloudflare just got faster and more secure, powered by Rust</a></li><li><a title="Russian alleged cyber-hacker faces extradition to US after arrest in Thailand" rel="nofollow" href="https://edition.cnn.com/2025/11/15/asia/denis-obrezko-russia-hacker-thailand-void-blizzard">Russian alleged cyber-hacker faces extradition to US after arrest in Thailand</a></li><li><a title="Russian detained over connection to Void Blizzard attacks" rel="nofollow" href="https://repoct.org/news/105205-ekc-sotrudnik_akademii_kriptografii_fsb_i_laboratorii_kasperskogo_zaderhan_v_tailande_po_delu_o_hakerskoj_gruppe_void_bl">Russian detained over connection to Void Blizzard attacks</a></li><li><a title="Positive Technologies: Attacks of the Striking Panda" rel="nofollow" href="https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today/">Positive Technologies: Attacks of the Striking Panda</a></li><li><a title="PlushDaemon compromises network devices for adversary-in-the-middle attacks" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/">PlushDaemon compromises network devices for adversary-in-the-middle attacks</a></li><li><a title="PlushDaemon compromises supply chain of Korean VPN service" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/">PlushDaemon compromises supply chain of Korean VPN service</a></li><li><a title="ASUS Routers Hijacked in Global &#39;WrtHug&#39; Operation" rel="nofollow" href="https://securityscorecard.com/wp-content/uploads/2025/11/STRIKE_Asus_WrtHug-Report_V6.pdf">ASUS Routers Hijacked in Global 'WrtHug' Operation</a></li><li><a title="Arkham on Bitcoin Chen Zhi seized funds" rel="nofollow" href="https://intel.arkm.com/explorer/tx/55de9e33c7fd10705d0f1e05f5899ae27c61a3f13dd3ff5156ce794b504094ae">Arkham on Bitcoin Chen Zhi seized funds</a></li><li><a title="US DOJ $15 Billion Bitcoin Indictment" rel="nofollow" href="https://www.justice.gov/usao-edny/pr/chairman-prince-group-indicted-operating-cambodian-forced-labor-scam-compounds-engaged">US DOJ $15 Billion Bitcoin Indictment</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="PIVOTcon 2026" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2026</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="The Age of Disclosure (Prime Video)" rel="nofollow" href="https://www.amazon.com/Age-Disclosure-Dan-Farah/dp/B0FMF29BBJ">The Age of Disclosure (Prime Video)</a></li><li><a title="Amazon.com: Bullshit Jobs" rel="nofollow" href="https://www.amazon.com/dp/B079YYRGSB/">Amazon.com: Bullshit Jobs</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 73</strong>:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. </p>

<p>Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China&#39;s CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security -- Stop Attacks, Secure Data " rel="nofollow" href="https://material.security/product">Material Security -- Stop Attacks, Secure Data </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1se0fiX0sXOEpp5I6NiQJYfcji4_6b0uowkHl2sv8vuU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Why Microsoft Needs to Split Windows in Two" rel="nofollow" href="https://medium.com/@costin.raiu/is-it-time-for-a-divorce-why-microsoft-needs-to-split-windows-in-two-29a46b0621b6?postPublishedType=initial">Why Microsoft Needs to Split Windows in Two</a></li><li><a title="CYBERWARCON agenda" rel="nofollow" href="https://www.cyberwarcon.com/agenda-25">CYBERWARCON agenda</a></li><li><a title="Amazon: Nation-state actors bridging cyber and kinetic warfare" rel="nofollow" href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/">Amazon: Nation-state actors bridging cyber and kinetic warfare</a></li><li><a title="Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools" rel="nofollow" href="https://archive.ph/YXh8Y">Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools</a></li><li><a title="Fortinet documents 0day attacks" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-513">Fortinet documents 0day attacks</a></li><li><a title="Fortinet CVE-2025-64446 Under Active Attack" rel="nofollow" href="https://decipher.sc/2025/11/17/fortinet-cve-2025-64446-under-active-attack/">Fortinet CVE-2025-64446 Under Active Attack</a></li><li><a title="Google Chrome zero-day exploited" rel="nofollow" href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html">Google Chrome zero-day exploited</a></li><li><a title="Cloudflare statement on outage on November 18, 2025" rel="nofollow" href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare statement on outage on November 18, 2025</a></li><li><a title="Cloudflare just got faster and more secure, powered by Rust" rel="nofollow" href="https://blog.cloudflare.com/20-percent-internet-upgrade/">Cloudflare just got faster and more secure, powered by Rust</a></li><li><a title="Russian alleged cyber-hacker faces extradition to US after arrest in Thailand" rel="nofollow" href="https://edition.cnn.com/2025/11/15/asia/denis-obrezko-russia-hacker-thailand-void-blizzard">Russian alleged cyber-hacker faces extradition to US after arrest in Thailand</a></li><li><a title="Russian detained over connection to Void Blizzard attacks" rel="nofollow" href="https://repoct.org/news/105205-ekc-sotrudnik_akademii_kriptografii_fsb_i_laboratorii_kasperskogo_zaderhan_v_tailande_po_delu_o_hakerskoj_gruppe_void_bl">Russian detained over connection to Void Blizzard attacks</a></li><li><a title="Positive Technologies: Attacks of the Striking Panda" rel="nofollow" href="https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today/">Positive Technologies: Attacks of the Striking Panda</a></li><li><a title="PlushDaemon compromises network devices for adversary-in-the-middle attacks" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/">PlushDaemon compromises network devices for adversary-in-the-middle attacks</a></li><li><a title="PlushDaemon compromises supply chain of Korean VPN service" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/">PlushDaemon compromises supply chain of Korean VPN service</a></li><li><a title="ASUS Routers Hijacked in Global &#39;WrtHug&#39; Operation" rel="nofollow" href="https://securityscorecard.com/wp-content/uploads/2025/11/STRIKE_Asus_WrtHug-Report_V6.pdf">ASUS Routers Hijacked in Global 'WrtHug' Operation</a></li><li><a title="Arkham on Bitcoin Chen Zhi seized funds" rel="nofollow" href="https://intel.arkm.com/explorer/tx/55de9e33c7fd10705d0f1e05f5899ae27c61a3f13dd3ff5156ce794b504094ae">Arkham on Bitcoin Chen Zhi seized funds</a></li><li><a title="US DOJ $15 Billion Bitcoin Indictment" rel="nofollow" href="https://www.justice.gov/usao-edny/pr/chairman-prince-group-indicted-operating-cambodian-forced-labor-scam-compounds-engaged">US DOJ $15 Billion Bitcoin Indictment</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="PIVOTcon 2026" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2026</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="The Age of Disclosure (Prime Video)" rel="nofollow" href="https://www.amazon.com/Age-Disclosure-Dan-Farah/dp/B0FMF29BBJ">The Age of Disclosure (Prime Video)</a></li><li><a title="Amazon.com: Bullshit Jobs" rel="nofollow" href="https://www.amazon.com/dp/B079YYRGSB/">Amazon.com: Bullshit Jobs</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Anthropic Claude Code automating APT hacks, KnownSec leak, Chinese buses with remote access</title>
  <link>http://securityconversations.fireside.fm/claude-code-china-apt-knownsec-breach-bitcoin-blame</link>
  <guid isPermaLink="false">421221b9-44be-468b-9621-d645805efd84</guid>
  <pubDate>Fri, 14 Nov 2025 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/421221b9-44be-468b-9621-d645805efd84.mp3" length="108418078" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.

Three Buddy Problem - Episode 72: We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. 

Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as "actively exploited."

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:12:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/421221b9-44be-468b-9621-d645805efd84/cover.jpg?v=2"/>
  <description>Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.
Three Buddy Problem - Episode 72:  We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. 
Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as "actively exploited."
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>AI, OpenAI, Anthropic, Claude Code, Apple, Google, China, APT, Bitcoin, CISA, Cisco, Ivanti, KnownSec, Microsoft, AI Private Compute, Yutong</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 72</strong>:  We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. </p>

<p>Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as &quot;actively exploited.&quot;</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NrlNDzKbVm8tGd7n_ojvGTCMI6btaXLHQt0oMy57bxA/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security case studies" rel="nofollow" href="https://material.security/customers">Material Security case studies</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign" rel="nofollow" href="https://www.anthropic.com/news/disrupting-AI-espionage">Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign</a></li><li><a title="Anthropic report on AI-orchestreated APT campaign ()DF)" rel="nofollow" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">Anthropic report on AI-orchestreated APT campaign ()DF)</a></li><li><a title="Data breach at Chinese infosec firm reveals weapons arsenal" rel="nofollow" href="https://www.theregister.com/2025/11/09/asia_tech_news_roundup/">Data breach at Chinese infosec firm reveals weapons arsenal</a></li><li><a title="Twitter thread on KnownSec breach details" rel="nofollow" href="https://x.com/intcyberdigest/status/1988355649269387488?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Twitter thread on KnownSec breach details</a></li><li><a title="China Accuses US of Orchestrating $13 Billion Bitcoin Hack" rel="nofollow" href="https://archive.ph/5Iyes">China Accuses US of Orchestrating $13 Billion Bitcoin Hack</a></li><li><a title="CISA finds federal agencies missing critical (exploited) vulns" rel="nofollow" href="https://www.cisa.gov/ed-25-03-guidance-device-updates-and-patching">CISA finds federal agencies missing critical (exploited) vulns</a></li><li><a title="Amazon discovers APT exploiting Cisco and Citrix zero-days" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/">Amazon discovers APT exploiting Cisco and Citrix zero-days</a></li><li><a title="Amazon launches private AI bug bounty program" rel="nofollow" href="https://www.amazon.science/news/amazon-launches-private-ai-bug-bounty-to-strengthen-nova-models">Amazon launches private AI bug bounty program</a></li><li><a title="Amazon Nova" rel="nofollow" href="https://nova.amazon.com/chat">Amazon Nova</a></li><li><a title="Microsoft Warns of Exploited Windows Kernel Zero-Day" rel="nofollow" href="https://decipher.sc/2025/11/11/microsoft-warns-of-exploited-windows-kernel-zero-day/">Microsoft Warns of Exploited Windows Kernel Zero-Day</a></li><li><a title="Google intros Private AI Compute tech" rel="nofollow" href="https://blog.google/technology/ai/google-private-ai-compute/">Google intros Private AI Compute tech</a></li><li><a title="Google paper on Private AI Computer (PDF)" rel="nofollow" href="https://services.google.com/fh/files/misc/private_ai_compute_technical_brief.pdf">Google paper on Private AI Computer (PDF)</a></li><li><a title="OpenAI CISO on NYTimes request for ChatGPT conversations" rel="nofollow" href="https://openai.com/index/fighting-nyt-user-privacy-invasion/">OpenAI CISO on NYTimes request for ChatGPT conversations</a></li><li><a title="UK transport and cyber-security chiefs investigate Chinese-made buses " rel="nofollow" href="https://www.theguardian.com/uk-news/2025/nov/10/uk-transport-cyber-security-chiefs-investigate-chinese-made-buses">UK transport and cyber-security chiefs investigate Chinese-made buses </a></li><li><a title="Ruter pen-tests Chinese electric buses" rel="nofollow" href="https://ruter.no/en/ruter-with-extensive-security-testing-of-electric-buses">Ruter pen-tests Chinese electric buses</a></li><li><a title="DistrictCon" rel="nofollow" href="https://www.districtcon.org/">DistrictCon</a></li><li><a title="CYBERWARCON" rel="nofollow" href="https://www.cyberwarcon.com/">CYBERWARCON</a></li><li><a title="DefCamp 2025" rel="nofollow" href="https://def.camp/">DefCamp 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 72</strong>:  We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. </p>

<p>Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as &quot;actively exploited.&quot;</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NrlNDzKbVm8tGd7n_ojvGTCMI6btaXLHQt0oMy57bxA/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security case studies" rel="nofollow" href="https://material.security/customers">Material Security case studies</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign" rel="nofollow" href="https://www.anthropic.com/news/disrupting-AI-espionage">Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign</a></li><li><a title="Anthropic report on AI-orchestreated APT campaign ()DF)" rel="nofollow" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">Anthropic report on AI-orchestreated APT campaign ()DF)</a></li><li><a title="Data breach at Chinese infosec firm reveals weapons arsenal" rel="nofollow" href="https://www.theregister.com/2025/11/09/asia_tech_news_roundup/">Data breach at Chinese infosec firm reveals weapons arsenal</a></li><li><a title="Twitter thread on KnownSec breach details" rel="nofollow" href="https://x.com/intcyberdigest/status/1988355649269387488?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Twitter thread on KnownSec breach details</a></li><li><a title="China Accuses US of Orchestrating $13 Billion Bitcoin Hack" rel="nofollow" href="https://archive.ph/5Iyes">China Accuses US of Orchestrating $13 Billion Bitcoin Hack</a></li><li><a title="CISA finds federal agencies missing critical (exploited) vulns" rel="nofollow" href="https://www.cisa.gov/ed-25-03-guidance-device-updates-and-patching">CISA finds federal agencies missing critical (exploited) vulns</a></li><li><a title="Amazon discovers APT exploiting Cisco and Citrix zero-days" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/">Amazon discovers APT exploiting Cisco and Citrix zero-days</a></li><li><a title="Amazon launches private AI bug bounty program" rel="nofollow" href="https://www.amazon.science/news/amazon-launches-private-ai-bug-bounty-to-strengthen-nova-models">Amazon launches private AI bug bounty program</a></li><li><a title="Amazon Nova" rel="nofollow" href="https://nova.amazon.com/chat">Amazon Nova</a></li><li><a title="Microsoft Warns of Exploited Windows Kernel Zero-Day" rel="nofollow" href="https://decipher.sc/2025/11/11/microsoft-warns-of-exploited-windows-kernel-zero-day/">Microsoft Warns of Exploited Windows Kernel Zero-Day</a></li><li><a title="Google intros Private AI Compute tech" rel="nofollow" href="https://blog.google/technology/ai/google-private-ai-compute/">Google intros Private AI Compute tech</a></li><li><a title="Google paper on Private AI Computer (PDF)" rel="nofollow" href="https://services.google.com/fh/files/misc/private_ai_compute_technical_brief.pdf">Google paper on Private AI Computer (PDF)</a></li><li><a title="OpenAI CISO on NYTimes request for ChatGPT conversations" rel="nofollow" href="https://openai.com/index/fighting-nyt-user-privacy-invasion/">OpenAI CISO on NYTimes request for ChatGPT conversations</a></li><li><a title="UK transport and cyber-security chiefs investigate Chinese-made buses " rel="nofollow" href="https://www.theguardian.com/uk-news/2025/nov/10/uk-transport-cyber-security-chiefs-investigate-chinese-made-buses">UK transport and cyber-security chiefs investigate Chinese-made buses </a></li><li><a title="Ruter pen-tests Chinese electric buses" rel="nofollow" href="https://ruter.no/en/ruter-with-extensive-security-testing-of-electric-buses">Ruter pen-tests Chinese electric buses</a></li><li><a title="DistrictCon" rel="nofollow" href="https://www.districtcon.org/">DistrictCon</a></li><li><a title="CYBERWARCON" rel="nofollow" href="https://www.cyberwarcon.com/">CYBERWARCON</a></li><li><a title="DefCamp 2025" rel="nofollow" href="https://def.camp/">DefCamp 2025</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>LIVE from Ring0 COUNTERMEASURE: Google v FFmpeg, Ransomware Turncoats, Samsung 0days </title>
  <link>http://securityconversations.fireside.fm/google-ffmpeg-ransomware-landfall</link>
  <guid isPermaLink="false">9d487a56-a0a1-4aeb-9568-dbb4b8ae98d4</guid>
  <pubDate>Mon, 10 Nov 2025 11:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9d487a56-a0a1-4aeb-9568-dbb4b8ae98d4.mp3" length="62516613" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.

Three Buddy Problem - Episode 71:  The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>1:09:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9d487a56-a0a1-4aeb-9568-dbb4b8ae98d4/cover.jpg?v=2"/>
  <description>Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.
Three Buddy Problem - Episode 71: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Google, FFmpeg, ope-source, BigSleep, Aardvark, ransomware, TP-Link, Landfall, Samsung, 0day, zero-day</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 71</strong>: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security " rel="nofollow" href="https://material.security/">Material Security </a> &mdash; We protect your company’s most valuable materials — the emails, files, and accounts that live in your Google Workspace &amp; Microsoft 365 cloud offices.</li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qXNE6Y3Z1tib1ERSeg_W58B8tYmR2iG1vvcMQNoJGWQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="FFmpeg complains about Google BigSleep AI" rel="nofollow" href="https://x.com/ffmpeg/status/1984178359354483058?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">FFmpeg complains about Google BigSleep AI</a></li><li><a title="Google v FFmpeg brouhaha" rel="nofollow" href="https://x.com/seanhn/status/1984941644517417263?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Google v FFmpeg brouhaha</a></li><li><a title="Curl&#39;s Daniel Stenberg on a new breed of AI analyzers" rel="nofollow" href="https://daniel.haxx.se/blog/2025/10/10/a-new-breed-of-analyzers/">Curl's Daniel Stenberg on a new breed of AI analyzers</a></li><li><a title="unit42.paloaltonetworks.com" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">unit42.paloaltonetworks.com</a></li><li><a title=" iOS 26.1 security updates" rel="nofollow" href="https://support.apple.com/en-us/125632"> iOS 26.1 security updates</a></li><li><a title="U.S. agencies back banning TP-Link home routers on security grounds" rel="nofollow" href="https://archive.ph/Ldmde">U.S. agencies back banning TP-Link home routers on security grounds</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 71</strong>: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security " rel="nofollow" href="https://material.security/">Material Security </a> &mdash; We protect your company’s most valuable materials — the emails, files, and accounts that live in your Google Workspace &amp; Microsoft 365 cloud offices.</li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qXNE6Y3Z1tib1ERSeg_W58B8tYmR2iG1vvcMQNoJGWQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="FFmpeg complains about Google BigSleep AI" rel="nofollow" href="https://x.com/ffmpeg/status/1984178359354483058?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">FFmpeg complains about Google BigSleep AI</a></li><li><a title="Google v FFmpeg brouhaha" rel="nofollow" href="https://x.com/seanhn/status/1984941644517417263?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Google v FFmpeg brouhaha</a></li><li><a title="Curl&#39;s Daniel Stenberg on a new breed of AI analyzers" rel="nofollow" href="https://daniel.haxx.se/blog/2025/10/10/a-new-breed-of-analyzers/">Curl's Daniel Stenberg on a new breed of AI analyzers</a></li><li><a title="unit42.paloaltonetworks.com" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">unit42.paloaltonetworks.com</a></li><li><a title=" iOS 26.1 security updates" rel="nofollow" href="https://support.apple.com/en-us/125632"> iOS 26.1 security updates</a></li><li><a title="U.S. agencies back banning TP-Link home routers on security grounds" rel="nofollow" href="https://archive.ph/Ldmde">U.S. agencies back banning TP-Link home routers on security grounds</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>On AI’s future, security’s failures, and what comes next...</title>
  <link>http://securityconversations.fireside.fm/ai-futire-security-failures-whats-next</link>
  <guid isPermaLink="false">a144cfba-560a-41b9-a9db-8138273862b2</guid>
  <pubDate>Fri, 15 Aug 2025 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a144cfba-560a-41b9-a9db-8138273862b2.mp3" length="56518966" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 58:  Indepth reaction to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold-rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. 

We revisit the Chinese "cyber militia" discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>1:57:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a144cfba-560a-41b9-a9db-8138273862b2/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 58:  The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. 
We revisit the Chinese "cyber militia" discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>OpenAI, ChatGPT5, Claude, Mistral, Apple, Russia, China, zero-day, Microsoft, AI, NVIDIA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 58</strong>:  The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. </p>

<p>We revisit the Chinese &quot;cyber militia&quot; discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VZcPDkqbuB4MZihxH8wKDEnpcFo7Kq70Kl-JV9i_p5s/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Live from Black Hat: Brandon Dixon" rel="nofollow" href="https://podcasts.apple.com/us/podcast/live-from-black-hat-brandon-dixon-parses-the-ai/id1414525622?i=1000721209590">Live from Black Hat: Brandon Dixon</a></li><li><a title="PSIRT | FortiGuard Labs" rel="nofollow" href="https://www.fortiguard.com/psirt/FG-IR-25-152">PSIRT | FortiGuard Labs</a></li><li><a title="SonicWall Firewalls – SSLVPN Recent Threat Activity" rel="nofollow" href="https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430">SonicWall Firewalls – SSLVPN Recent Threat Activity</a></li><li><a title="Cisco CVSS 1.0 RCE" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79">Cisco CVSS 1.0 RCE</a></li><li><a title="Margin Research: Cyber Militias Redux" rel="nofollow" href="https://margin.re/2025/08/cyber-militias-redux-or-why-your-boss-might-also-be-your-platoon-leader-in-china-2/">Margin Research: Cyber Militias Redux</a></li><li><a title="Russia Is Suspected to Be Behind Breach of Federal Court Filing System" rel="nofollow" href="https://archive.ph/iVhTS">Russia Is Suspected to Be Behind Breach of Federal Court Filing System</a></li><li><a title="Russian hackers seized control of Norwegian dam" rel="nofollow" href="https://www.theguardian.com/world/2025/aug/14/russian-hackers-control-norwegian-dam-norway">Russian hackers seized control of Norwegian dam</a></li><li><a title="Poland foiled cyberattack on big city&#39;s water supply" rel="nofollow" href="https://www.reuters.com/en/poland-foiled-cyberattack-big-citys-water-supply-deputy-pm-says-2025-08-14/">Poland foiled cyberattack on big city's water supply</a></li><li><a title="EU Parliament pressing for agreement on chat scanning bill" rel="nofollow" href="https://www.techradar.com/computing/cyber-security/a-political-blackmail-the-eu-parliament-is-pressing-for-new-mandatory-scanning-of-your-private-chats?utm_source=chatgpt.com">EU Parliament pressing for agreement on chat scanning bill</a></li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 58</strong>:  The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. </p>

<p>We revisit the Chinese &quot;cyber militia&quot; discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VZcPDkqbuB4MZihxH8wKDEnpcFo7Kq70Kl-JV9i_p5s/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Live from Black Hat: Brandon Dixon" rel="nofollow" href="https://podcasts.apple.com/us/podcast/live-from-black-hat-brandon-dixon-parses-the-ai/id1414525622?i=1000721209590">Live from Black Hat: Brandon Dixon</a></li><li><a title="PSIRT | FortiGuard Labs" rel="nofollow" href="https://www.fortiguard.com/psirt/FG-IR-25-152">PSIRT | FortiGuard Labs</a></li><li><a title="SonicWall Firewalls – SSLVPN Recent Threat Activity" rel="nofollow" href="https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430">SonicWall Firewalls – SSLVPN Recent Threat Activity</a></li><li><a title="Cisco CVSS 1.0 RCE" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79">Cisco CVSS 1.0 RCE</a></li><li><a title="Margin Research: Cyber Militias Redux" rel="nofollow" href="https://margin.re/2025/08/cyber-militias-redux-or-why-your-boss-might-also-be-your-platoon-leader-in-china-2/">Margin Research: Cyber Militias Redux</a></li><li><a title="Russia Is Suspected to Be Behind Breach of Federal Court Filing System" rel="nofollow" href="https://archive.ph/iVhTS">Russia Is Suspected to Be Behind Breach of Federal Court Filing System</a></li><li><a title="Russian hackers seized control of Norwegian dam" rel="nofollow" href="https://www.theguardian.com/world/2025/aug/14/russian-hackers-control-norwegian-dam-norway">Russian hackers seized control of Norwegian dam</a></li><li><a title="Poland foiled cyberattack on big city&#39;s water supply" rel="nofollow" href="https://www.reuters.com/en/poland-foiled-cyberattack-big-citys-water-supply-deputy-pm-says-2025-08-14/">Poland foiled cyberattack on big city's water supply</a></li><li><a title="EU Parliament pressing for agreement on chat scanning bill" rel="nofollow" href="https://www.techradar.com/computing/cyber-security/a-political-blackmail-the-eu-parliament-is-pressing-for-new-mandatory-scanning-of-your-private-chats?utm_source=chatgpt.com">EU Parliament pressing for agreement on chat scanning bill</a></li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Live from Black Hat: Brandon Dixon parses the AI security hype</title>
  <link>http://securityconversations.fireside.fm/live-black-hat-brandon-dixon-ai-security-hype</link>
  <guid isPermaLink="false">e0829cc5-9719-41bd-92d8-865d133d21cf</guid>
  <pubDate>Thu, 07 Aug 2025 09:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e0829cc5-9719-41bd-92d8-865d133d21cf.mp3" length="43316889" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 57:  Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.

Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. 

Cast: Brandon Dixon, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>1:30:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e0829cc5-9719-41bd-92d8-865d133d21cf/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 57: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.
Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. 
Cast:  Brandon Dixon (https://www.linkedin.com/in/brandonsdixon/), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>OpenAI, Aardvark, Microsoft, Google, Big Sleep, gen-AI, agentic AI, Black Hat, NVIDIA, XBOW, PassiveTotal, RiskIQ, VirusTotal, China</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 57</strong>: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.</p>

<p>Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. </p>

<p><strong>Cast:</strong>  <a href="https://www.linkedin.com/in/brandonsdixon/" rel="nofollow">Brandon Dixon</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qK9qf59EbwAZvr_zjR3FvmEN_nlpFPGAaTKNZYCVQFY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Brandon Dixon | LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/brandonsdixon/">Brandon Dixon | LinkedIn</a></li><li><a title="Google &#39;Big Sleep&#39; AI Issue Tracker" rel="nofollow" href="https://issuetracker.google.com/issues?q=componentid:1836411&amp;s=type:desc&amp;s=issue_id:desc">Google 'Big Sleep' AI Issue Tracker</a></li><li><a title="XBOW - The road to Top 1: How XBOW did it" rel="nofollow" href="https://xbow.com/blog/top-1-how-xbow-did-it?utm_source=chatgpt.com">XBOW - The road to Top 1: How XBOW did it</a></li><li><a title="Does “XBOW AI Hacker” Deserve the Hype?" rel="nofollow" href="https://utkusen.substack.com/p/does-xbow-ai-hacker-deserve-the-hype">Does “XBOW AI Hacker” Deserve the Hype?</a></li><li><a title="XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B" rel="nofollow" href="https://xbow.com/blog/series-b">XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B</a></li><li><a title="NVIDIA: No Backdoors. No Kill Switches. No Spyware " rel="nofollow" href="https://blogs.nvidia.com/blog/no-backdoors-no-kill-switches-no-spyware/">NVIDIA: No Backdoors. No Kill Switches. No Spyware </a></li><li><a title="Nvidia reiterates its chips have no backdoors, urges US against location verification" rel="nofollow" href="https://www.reuters.com/world/china/nvidia-reiterates-its-chips-have-no-backdoors-urges-us-against-location-2025-08-06/?utm_source=chatgpt.com">Nvidia reiterates its chips have no backdoors, urges US against location verification</a></li><li><a title="Google: Our Big Sleep agent makes a big leap" rel="nofollow" href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap">Google: Our Big Sleep agent makes a big leap</a></li><li><a title="Microsoft announces acquisition of RiskIQ " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/">Microsoft announces acquisition of RiskIQ </a></li><li><a title="RiskIQ attack surface management" rel="nofollow" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/riskiq1592493552392.riskiq-saas?tab=overview">RiskIQ attack surface management</a></li><li><a title="Brandon Dixon (SecurityConversations podcast)" rel="nofollow" href="https://securityconversations.com/episode/brandon-dixon-vice-president-riskiq/">Brandon Dixon (SecurityConversations podcast)</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 57</strong>: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.</p>

<p>Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. </p>

<p><strong>Cast:</strong>  <a href="https://www.linkedin.com/in/brandonsdixon/" rel="nofollow">Brandon Dixon</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qK9qf59EbwAZvr_zjR3FvmEN_nlpFPGAaTKNZYCVQFY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Brandon Dixon | LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/brandonsdixon/">Brandon Dixon | LinkedIn</a></li><li><a title="Google &#39;Big Sleep&#39; AI Issue Tracker" rel="nofollow" href="https://issuetracker.google.com/issues?q=componentid:1836411&amp;s=type:desc&amp;s=issue_id:desc">Google 'Big Sleep' AI Issue Tracker</a></li><li><a title="XBOW - The road to Top 1: How XBOW did it" rel="nofollow" href="https://xbow.com/blog/top-1-how-xbow-did-it?utm_source=chatgpt.com">XBOW - The road to Top 1: How XBOW did it</a></li><li><a title="Does “XBOW AI Hacker” Deserve the Hype?" rel="nofollow" href="https://utkusen.substack.com/p/does-xbow-ai-hacker-deserve-the-hype">Does “XBOW AI Hacker” Deserve the Hype?</a></li><li><a title="XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B" rel="nofollow" href="https://xbow.com/blog/series-b">XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B</a></li><li><a title="NVIDIA: No Backdoors. No Kill Switches. No Spyware " rel="nofollow" href="https://blogs.nvidia.com/blog/no-backdoors-no-kill-switches-no-spyware/">NVIDIA: No Backdoors. No Kill Switches. No Spyware </a></li><li><a title="Nvidia reiterates its chips have no backdoors, urges US against location verification" rel="nofollow" href="https://www.reuters.com/world/china/nvidia-reiterates-its-chips-have-no-backdoors-urges-us-against-location-2025-08-06/?utm_source=chatgpt.com">Nvidia reiterates its chips have no backdoors, urges US against location verification</a></li><li><a title="Google: Our Big Sleep agent makes a big leap" rel="nofollow" href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap">Google: Our Big Sleep agent makes a big leap</a></li><li><a title="Microsoft announces acquisition of RiskIQ " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/">Microsoft announces acquisition of RiskIQ </a></li><li><a title="RiskIQ attack surface management" rel="nofollow" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/riskiq1592493552392.riskiq-saas?tab=overview">RiskIQ attack surface management</a></li><li><a title="Brandon Dixon (SecurityConversations podcast)" rel="nofollow" href="https://securityconversations.com/episode/brandon-dixon-vice-president-riskiq/">Brandon Dixon (SecurityConversations podcast)</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days</title>
  <link>http://securityconversations.fireside.fm/msft-sharepoint-zero-day-faulty-patches-</link>
  <guid isPermaLink="false">fe4d62a3-cad0-4b3d-b729-d0e94654c458</guid>
  <pubDate>Fri, 25 Jul 2025 02:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fe4d62a3-cad0-4b3d-b729-d0e94654c458.mp3" length="93250682" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 55:  We dig into Microsoft's latest security nightmare: a SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis, with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.

We also revisit the ProPublica bombshell about Microsoft's "digital escorts" and U.S. government data exposure to Chinese adversaries and the company's "oops, we will stop" response. Plus, trusting Google's Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>1:55:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fe4d62a3-cad0-4b3d-b729-d0e94654c458/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.
We also revisit the ProPublica bombshell about Microsoft's "digital escorts" and U.S. government data exposure to Chinese adversaries and the company's "oops, we will stop" response. Plus, trusting Google's Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>microsoft, sharepoint, zero-day, china, luckymouse, apt31, digital escorts, Hegseth, Big Sleep, ProPublica, Replit, artificial intelligence, AI, vibe coding</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 55</strong>: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.</p>

<p>We also revisit the ProPublica bombshell about Microsoft&#39;s &quot;digital escorts&quot; and U.S. government data exposure to Chinese adversaries and the company&#39;s &quot;oops, we will stop&quot; response. Plus, trusting Google&#39;s Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1G_OoBEvmZiGCO-FUMr9dr87X5g80K7fHPda6QY_avQQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="TBP at Countermeasures 2025" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">TBP at Countermeasures 2025</a></li><li><a title="CODE WHITE GmbH ToolShell exploit" rel="nofollow" href="https://infosec.exchange/@codewhitesec/114851715379861407">CODE WHITE GmbH ToolShell exploit</a></li><li><a title="Microsoft guidance for SharePoint vulnerability CVE-2025-53770" rel="nofollow" href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/">Microsoft guidance for SharePoint vulnerability CVE-2025-53770</a></li><li><a title="Kaspersky on ToolShell: A story of five Sharepoint vulns" rel="nofollow" href="https://securelist.com/toolshell-explained/117045/">Kaspersky on ToolShell: A story of five Sharepoint vulns</a></li><li><a title="Ryan&#39;s EkoParty keynote on Microsoft culture" rel="nofollow" href="https://x.com/juanandres_gs/status/1587794147448016896">Ryan's EkoParty keynote on Microsoft culture</a></li><li><a title="Microsoft Disrupting active exploitation of on-prem SharePoint flaws" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/">Microsoft Disrupting active exploitation of on-prem SharePoint flaws</a></li><li><a title="SentinelLabs on Sharepoint zero-day in-the-wild" rel="nofollow" href="https://www.sentinelone.com/blog/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/">SentinelLabs on Sharepoint zero-day in-the-wild</a></li><li><a title="ESET on ToolShell: An all-you-can-eat buffet for threat actors" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/">ESET on ToolShell: An all-you-can-eat buffet for threat actors</a></li><li><a title="Microsoft Stops Using China-Based Engineers for DoD Computer Systems" rel="nofollow" href="https://www.propublica.org/article/defense-department-pentagon-microsoft-digital-escort-china">Microsoft Stops Using China-Based Engineers for DoD Computer Systems</a></li><li><a title="AI coding platform goes rogue during code freeze and deletes entire company database" rel="nofollow" href="https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data">AI coding platform goes rogue during code freeze and deletes entire company database</a></li><li><a title="Jason Lemkin: Replit goes rogue" rel="nofollow" href="https://x.com/jasonlk/status/1946069562723897802">Jason Lemkin: Replit goes rogue</a></li><li><a title="John Hultquist on Big Dream AI" rel="nofollow" href="https://x.com/JohnHultquist/status/1947309146581119369">John Hultquist on Big Dream AI</a></li><li><a title="LABScon 2025 " rel="nofollow" href="https://www.labscon.io/">LABScon 2025 </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 55</strong>: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.</p>

<p>We also revisit the ProPublica bombshell about Microsoft&#39;s &quot;digital escorts&quot; and U.S. government data exposure to Chinese adversaries and the company&#39;s &quot;oops, we will stop&quot; response. Plus, trusting Google&#39;s Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1G_OoBEvmZiGCO-FUMr9dr87X5g80K7fHPda6QY_avQQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="TBP at Countermeasures 2025" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">TBP at Countermeasures 2025</a></li><li><a title="CODE WHITE GmbH ToolShell exploit" rel="nofollow" href="https://infosec.exchange/@codewhitesec/114851715379861407">CODE WHITE GmbH ToolShell exploit</a></li><li><a title="Microsoft guidance for SharePoint vulnerability CVE-2025-53770" rel="nofollow" href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/">Microsoft guidance for SharePoint vulnerability CVE-2025-53770</a></li><li><a title="Kaspersky on ToolShell: A story of five Sharepoint vulns" rel="nofollow" href="https://securelist.com/toolshell-explained/117045/">Kaspersky on ToolShell: A story of five Sharepoint vulns</a></li><li><a title="Ryan&#39;s EkoParty keynote on Microsoft culture" rel="nofollow" href="https://x.com/juanandres_gs/status/1587794147448016896">Ryan's EkoParty keynote on Microsoft culture</a></li><li><a title="Microsoft Disrupting active exploitation of on-prem SharePoint flaws" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/">Microsoft Disrupting active exploitation of on-prem SharePoint flaws</a></li><li><a title="SentinelLabs on Sharepoint zero-day in-the-wild" rel="nofollow" href="https://www.sentinelone.com/blog/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/">SentinelLabs on Sharepoint zero-day in-the-wild</a></li><li><a title="ESET on ToolShell: An all-you-can-eat buffet for threat actors" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/">ESET on ToolShell: An all-you-can-eat buffet for threat actors</a></li><li><a title="Microsoft Stops Using China-Based Engineers for DoD Computer Systems" rel="nofollow" href="https://www.propublica.org/article/defense-department-pentagon-microsoft-digital-escort-china">Microsoft Stops Using China-Based Engineers for DoD Computer Systems</a></li><li><a title="AI coding platform goes rogue during code freeze and deletes entire company database" rel="nofollow" href="https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data">AI coding platform goes rogue during code freeze and deletes entire company database</a></li><li><a title="Jason Lemkin: Replit goes rogue" rel="nofollow" href="https://x.com/jasonlk/status/1946069562723897802">Jason Lemkin: Replit goes rogue</a></li><li><a title="John Hultquist on Big Dream AI" rel="nofollow" href="https://x.com/JohnHultquist/status/1947309146581119369">John Hultquist on Big Dream AI</a></li><li><a title="LABScon 2025 " rel="nofollow" href="https://www.labscon.io/">LABScon 2025 </a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Inside the Turla Playbook: Hijacking APTs and fourth-party espionage</title>
  <link>http://securityconversations.fireside.fm/inside-turla-playbook-hijacking-apt-fourth-party-collection</link>
  <guid isPermaLink="false">af6d806f-6e02-4b8a-b12c-ed94b0f61215</guid>
  <pubDate>Sat, 07 Dec 2024 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/af6d806f-6e02-4b8a-b12c-ed94b0f61215.mp3" length="89199523" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 24:  In this episode, we dig into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.

Cast: Juan Andres Guerrero-Saade, Costin Raiu, Ryan Naraine.</itunes:subtitle>
  <itunes:duration>1:47:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/af6d806f-6e02-4b8a-b12c-ed94b0f61215/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 24:  In this episode, we did into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu)and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>Monokle, Salt Typhoon, Turla, Solana, spyware, cyberespionage, ransomware, crypto, hacking, surveillance, encryption, regulations, elections, drones, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1agQ0TqskvYwnB69rmf2jcUReWMJQDfiIv6nrphsEWo0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian APT Turla Caught Stealing From Pakistani APT" rel="nofollow" href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/">Russian APT Turla Caught Stealing From Pakistani APT</a></li><li><a title="Snowblind: The Invisible Hand of Secret Blizzard" rel="nofollow" href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a></li><li><a title="Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog</a></li><li><a title="EpicTurla.com" rel="nofollow" href="https://epicturla.com">EpicTurla.com</a></li><li><a title="Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware" rel="nofollow" href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware</a></li><li><a title="Lookout Security research paper on Monokle spyware" rel="nofollow" href="https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf">Lookout Security research paper on Monokle spyware</a></li><li><a title="Parubets: How a programmer foiled his own FSB recruitment" rel="nofollow" href="https://dept.one/story/parubets/">Parubets: How a programmer foiled his own FSB recruitment</a></li><li><a title="CISA/FBI guidance to repel Salt Typhoon" rel="nofollow" href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">CISA/FBI guidance to repel Salt Typhoon</a></li><li><a title="US officials say they still have not expelled Chinese telco hackers" rel="nofollow" href="https://archive.ph/pncES">US officials say they still have not expelled Chinese telco hackers</a></li><li><a title="Solana backdoored in supply chain hack" rel="nofollow" href="https://github.com/solana-labs/solana-web3.js/releases">Solana backdoored in supply chain hack</a></li><li><a title="Romania&#39;s top court annuls first round of presidential vote won by far-right candidate" rel="nofollow" href="https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b">Romania's top court annuls first round of presidential vote won by far-right candidate</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1agQ0TqskvYwnB69rmf2jcUReWMJQDfiIv6nrphsEWo0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian APT Turla Caught Stealing From Pakistani APT" rel="nofollow" href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/">Russian APT Turla Caught Stealing From Pakistani APT</a></li><li><a title="Snowblind: The Invisible Hand of Secret Blizzard" rel="nofollow" href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a></li><li><a title="Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog</a></li><li><a title="EpicTurla.com" rel="nofollow" href="https://epicturla.com">EpicTurla.com</a></li><li><a title="Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware" rel="nofollow" href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware</a></li><li><a title="Lookout Security research paper on Monokle spyware" rel="nofollow" href="https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf">Lookout Security research paper on Monokle spyware</a></li><li><a title="Parubets: How a programmer foiled his own FSB recruitment" rel="nofollow" href="https://dept.one/story/parubets/">Parubets: How a programmer foiled his own FSB recruitment</a></li><li><a title="CISA/FBI guidance to repel Salt Typhoon" rel="nofollow" href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">CISA/FBI guidance to repel Salt Typhoon</a></li><li><a title="US officials say they still have not expelled Chinese telco hackers" rel="nofollow" href="https://archive.ph/pncES">US officials say they still have not expelled Chinese telco hackers</a></li><li><a title="Solana backdoored in supply chain hack" rel="nofollow" href="https://github.com/solana-labs/solana-web3.js/releases">Solana backdoored in supply chain hack</a></li><li><a title="Romania&#39;s top court annuls first round of presidential vote won by far-right candidate" rel="nofollow" href="https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b">Romania's top court annuls first round of presidential vote won by far-right candidate</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud Compute</title>
  <link>http://securityconversations.fireside.fm/new-show-ep-1</link>
  <guid isPermaLink="false">d0003b6f-d259-41d1-991b-18d68fc8c009</guid>
  <pubDate>Sat, 22 Jun 2024 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d0003b6f-d259-41d1-991b-18d68fc8c009.mp3" length="40341037" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also discuss the KL ban.</itunes:subtitle>
  <itunes:duration>46:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d0003b6f-d259-41d1-991b-18d68fc8c009/cover.jpg?v=2"/>
  <description>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also talk about the KL ban. 
</description>
  <itunes:keywords>Microsoft, CSRB, Apple, AI</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ryan Hurst on tech innovation and unsolved problems in security</title>
  <link>http://securityconversations.fireside.fm/ryan-hurst-peculiar-ventures</link>
  <guid isPermaLink="false">6fb48532-6cea-4136-b891-de4095a5f1fd</guid>
  <pubDate>Wed, 16 Aug 2023 07:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fb48532-6cea-4136-b891-de4095a5f1fd.mp3" length="35217292" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups.</itunes:subtitle>
  <itunes:duration>42:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fb48532-6cea-4136-b891-de4095a5f1fd/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups. 
</description>
  <itunes:keywords>encryption, key management, microsoft, google, BGP, AI, startups</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
