<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 01:26:51 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Apts”</title>
    <link>https://securityconversations.fireside.fm/tags/apts</link>
    <pubDate>Fri, 15 Sep 2023 13:45:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Dakota Cary on China's weaponization of software vulnerabilities</title>
  <link>http://securityconversations.fireside.fm/dakota-cary-global-china-hub</link>
  <guid isPermaLink="false">11696fa7-d330-4346-b5f1-078d7542cccd</guid>
  <pubDate>Fri, 15 Sep 2023 13:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/11696fa7-d330-4346-b5f1-078d7542cccd.mp3" length="51975872" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 

In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, nation state-backed threat actors in China and that infamous Bloomberg 'rice grain' spy chip story.</itunes:subtitle>
  <itunes:duration>55:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/11696fa7-d330-4346-b5f1-078d7542cccd/cover.jpg?v=3"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 
In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg 'rice grain' spy chip story. 
</description>
  <itunes:keywords>China, nation-state, APTs, Atlantic Council</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>JAG-S on big-game malware hunting and a very mysterious APT</title>
  <link>http://securityconversations.fireside.fm/juan-andres-guerrero-saade</link>
  <guid isPermaLink="false">eefa9c91-fd32-43f6-bd09-7ddedda38914</guid>
  <pubDate>Mon, 17 Oct 2022 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/eefa9c91-fd32-43f6-bd09-7ddedda38914.mp3" length="41028733" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>* Episode sponsors: [Binarly](https://binarly.io/) and [FwHunt](https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.

SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</itunes:subtitle>
  <itunes:duration>52:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/eefa9c91-fd32-43f6-bd09-7ddedda38914/cover.jpg?v=1"/>
  <description>Episode sponsors: Binarly (https://binarly.io/) and FwHunt (https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.
SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador. 
</description>
  <itunes:keywords>nation-state APTs, metador, sentinellabs, labscon, malware campaigns, cyberwar, cyber espionage, attribution</itunes:keywords>
  <content:encoded>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p><p>Links:</p><ul><li><a title="Report: The Mystery of Metador" rel="nofollow" href="https://assets.sentinelone.com/sentinellabs22/metador">Report: The Mystery of Metador</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://twitter.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Researchers Crowdsourcing Effort to Identify Mysterious Metador APT" rel="nofollow" href="https://www.securityweek.com/researchers-crowdsourcing-effort-identify-mysterious-metador-apt">Researchers Crowdsourcing Effort to Identify Mysterious Metador APT</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p><p>Links:</p><ul><li><a title="Report: The Mystery of Metador" rel="nofollow" href="https://assets.sentinelone.com/sentinellabs22/metador">Report: The Mystery of Metador</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://twitter.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Researchers Crowdsourcing Effort to Identify Mysterious Metador APT" rel="nofollow" href="https://www.securityweek.com/researchers-crowdsourcing-effort-identify-mysterious-metador-apt">Researchers Crowdsourcing Effort to Identify Mysterious Metador APT</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
