<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 20 Apr 2026 18:11:22 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Apt”</title>
    <link>https://securityconversations.fireside.fm/tags/apt</link>
    <pubDate>Sat, 29 Jun 2024 11:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep2: A deep-dive on disrupting and exposing nation-state malware ops</title>
  <link>http://securityconversations.fireside.fm/tbp-ep2</link>
  <guid isPermaLink="false">4a6fe671-fe7a-4699-ae08-fe99fd11f49f</guid>
  <pubDate>Sat, 29 Jun 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4a6fe671-fe7a-4699-ae08-fe99fd11f49f.mp3" length="60890552" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.

We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</itunes:subtitle>
  <itunes:duration>1:08:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4a6fe671-fe7a-4699-ae08-fe99fd11f49f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. 
A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.
We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise. 
</description>
  <itunes:keywords>google project zero, disrupting nation-state operations, mercenary hacking, teamviewer breach, Polyfill supply chain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Costin Raiu joins the XZ Utils backdoor investigation</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-xz-backdoor</link>
  <guid isPermaLink="false">f664c77a-dbbc-41a0-b392-7b4cd7223523</guid>
  <pubDate>Fri, 05 Apr 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f664c77a-dbbc-41a0-b392-7b4cd7223523.mp3" length="47530772" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- XZ.fail backdoor detector  (https://xz.fail)

Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why 'Tia Jan' is the handiwork of a cunning nation-state.

Based on all the clues available, Costin pinpoints three main suspects -- North Korea's Lazarus, China's APT41 or Russia's APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</itunes:subtitle>
  <itunes:duration>51:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f664c77a-dbbc-41a0-b392-7b4cd7223523/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
XZ.fail backdoor detector  (https://xz.fail)
Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why 'Tia Jan' is the handiwork of a cunning nation-state.
Based on all the clues available, Costin pinpoints three main suspects -- North Korea's Lazarus, China's APT41 or Russia's APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains. 
</description>
  <itunes:keywords>XZ Utils, APT, Stuxnet, SolarWinds, Lazarus, APT29</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p><p>Links:</p><ul><li><a title="Binarly XZ backdoor detector" rel="nofollow" href="https://xz.fail/">Binarly XZ backdoor detector</a></li><li><a title="XZ Utils Backdoor FAQ (by Dan Goodin)" rel="nofollow" href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">XZ Utils Backdoor FAQ (by Dan Goodin)</a></li><li><a title="CISA advisory on backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094">CISA advisory on backdoor</a></li><li><a title="The JiaT75 (Jia Tan) timeline" rel="nofollow" href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor">The JiaT75 (Jia Tan) timeline</a></li><li><a title="Unedited transcript" rel="nofollow" href="https://docs.google.com/document/d/1S2Fs3TJyA1SHfKOHXvZr9oFdWzG7HYCd9oa17sm02zM/edit">Unedited transcript</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p><p>Links:</p><ul><li><a title="Binarly XZ backdoor detector" rel="nofollow" href="https://xz.fail/">Binarly XZ backdoor detector</a></li><li><a title="XZ Utils Backdoor FAQ (by Dan Goodin)" rel="nofollow" href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">XZ Utils Backdoor FAQ (by Dan Goodin)</a></li><li><a title="CISA advisory on backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094">CISA advisory on backdoor</a></li><li><a title="The JiaT75 (Jia Tan) timeline" rel="nofollow" href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor">The JiaT75 (Jia Tan) timeline</a></li><li><a title="Unedited transcript" rel="nofollow" href="https://docs.google.com/document/d/1S2Fs3TJyA1SHfKOHXvZr9oFdWzG7HYCd9oa17sm02zM/edit">Unedited transcript</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Patrick Howell O'Neill, Cybersecurity Editor, MIT Technology Review</title>
  <link>http://securityconversations.fireside.fm/patrick-howell-oneill-mit-tech-review</link>
  <guid isPermaLink="false">02fc5a7f-d41b-434f-a25d-5f6c0a046dbc</guid>
  <pubDate>Tue, 30 Mar 2021 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc.mp3" length="24838523" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle> 
Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  [Follow Patrick on Twitter](https://twitter.com/howelloneill).</itunes:subtitle>
  <itunes:duration>25:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc/cover.jpg?v=1"/>
  <description>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop (https://securityconversations.com/on-disrupting-gov-malware-attacks/) on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  Follow Patrick on Twitter (https://twitter.com/howelloneill). 
</description>
  <itunes:keywords>journalism, story-telling, google, project zero, APT, nation-state malware, attribution</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Costin Raiu, Global Director, GReAT, Kaspersky Lab</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-great</link>
  <guid isPermaLink="false">c49758d1-bc1a-43d5-8eee-5f91c6d7021f</guid>
  <pubDate>Mon, 03 Sep 2018 04:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c49758d1-bc1a-43d5-8eee-5f91c6d7021f.mp3" length="47022834" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</itunes:subtitle>
  <itunes:duration>51:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c49758d1-bc1a-43d5-8eee-5f91c6d7021f/cover.jpg?v=3"/>
  <description>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Juan Andrés Guerrero-Saade, Principal Security Researcher, Recorded Future</title>
  <link>http://securityconversations.fireside.fm/juan-andres-guerrero-saade-recorded-future</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=499</guid>
  <pubDate>Mon, 14 May 2018 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f69cb1a6-f5e9-4664-bc82-fc229d5b1de4.mp3" length="53015905" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Principal Security Researcher at Recorded Futures Insikt Group, Juan Andrés Guerrero-Saade, explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don't have to be sophisticated to launch successful attacks.</itunes:subtitle>
  <itunes:duration>1:01:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f69cb1a6-f5e9-4664-bc82-fc229d5b1de4/cover.jpg?v=5"/>
  <description>&lt;p&gt;Principal Security Researcher at Recorded Future’s Insikt Group, Juan Andrés Guerrero-Saade (&lt;a href="https://twitter.com/juanandres_gs"&gt;juanandres_gs&lt;/a&gt;), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don’t have to be “sophisticated” to launch successful attacks.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
  </itunes:summary>
</item>
<item>
  <title>Robert M. Lee, Chief Executive Officer, Dragos Inc.</title>
  <link>http://securityconversations.fireside.fm/robert-m-lee-dragos</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=488</guid>
  <pubDate>Thu, 10 May 2018 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/12cf4cec-e81b-4f38-b8ff-956979ab0e93.mp3" length="65117301" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The founder and CEO of Dragos, Inc. Robert M. Lee cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</itunes:subtitle>
  <itunes:duration>54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/12cf4cec-e81b-4f38-b8ff-956979ab0e93/cover.jpg?v=4"/>
  <description>&lt;p&gt;The founder and CEO of Dragos, Inc. Robert M. Lee (&lt;a href="https://twitter.com/RobertMLee"&gt;RobertMLee&lt;/a&gt;) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
  </itunes:summary>
</item>
<item>
  <title>Tim Maurer, Scholar, Carnegie Endowment for International Peace</title>
  <link>http://securityconversations.fireside.fm/tim-maurer-carnegie-endowment-for-international-peace</link>
  <guid isPermaLink="false">4cddd571-1e73-4625-acb1-321bb47e706f</guid>
  <pubDate>Mon, 05 Mar 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4cddd571-1e73-4625-acb1-321bb47e706f.mp3" length="29020105" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</itunes:subtitle>
  <itunes:duration>32:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4cddd571-1e73-4625-acb1-321bb47e706f/cover.jpg?v=3"/>
  <description>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Christopher Ahlberg, CEO, Recorded Future</title>
  <link>http://securityconversations.fireside.fm/christopher-ahlberg-recorded-future</link>
  <guid isPermaLink="false">6fc1d3cb-e930-484f-84e6-8c521ddb9e97</guid>
  <pubDate>Tue, 30 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fc1d3cb-e930-484f-84e6-8c521ddb9e97.mp3" length="33265132" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</itunes:subtitle>
  <itunes:duration>29:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fc1d3cb-e930-484f-84e6-8c521ddb9e97/cover.jpg?v=4"/>
  <description>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kim Zetter, Journalist and Author</title>
  <link>http://securityconversations.fireside.fm/kim-zetter</link>
  <guid isPermaLink="false">bf98d79b-204e-4a5f-9418-75c5b554a26e</guid>
  <pubDate>Fri, 29 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/bf98d79b-204e-4a5f-9418-75c5b554a26e.mp3" length="56197391" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</itunes:subtitle>
  <itunes:duration>52:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
  <description>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
