<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 05:18:33 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Atlantic Council”</title>
    <link>https://securityconversations.fireside.fm/tags/atlantic%20council</link>
    <pubDate>Fri, 15 Sep 2023 13:45:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Dakota Cary on China's weaponization of software vulnerabilities</title>
  <link>http://securityconversations.fireside.fm/dakota-cary-global-china-hub</link>
  <guid isPermaLink="false">11696fa7-d330-4346-b5f1-078d7542cccd</guid>
  <pubDate>Fri, 15 Sep 2023 13:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/11696fa7-d330-4346-b5f1-078d7542cccd.mp3" length="51975872" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 

In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, nation state-backed threat actors in China and that infamous Bloomberg 'rice grain' spy chip story.</itunes:subtitle>
  <itunes:duration>55:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/11696fa7-d330-4346-b5f1-078d7542cccd/cover.jpg?v=3"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 
In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg 'rice grain' spy chip story. 
</description>
  <itunes:keywords>China, nation-state, APTs, Atlantic Council</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
