<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 13 Apr 2026 08:00:16 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Attribution”</title>
    <link>https://securityconversations.fireside.fm/tags/attribution</link>
    <pubDate>Fri, 23 Aug 2024 10:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep9: The blurring lines between nation-state APTs and the ransomware epidemic</title>
  <link>http://securityconversations.fireside.fm/tbp-ep9</link>
  <guid isPermaLink="false">7e54af0b-f1c0-4741-8b5c-e90eddd617b7</guid>
  <pubDate>Fri, 23 Aug 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7e54af0b-f1c0-4741-8b5c-e90eddd617b7.mp3" length="57472403" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 9:  On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 

Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024  keynote stage.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:06:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7e54af0b-f1c0-4741-8b5c-e90eddd617b7/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 
Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.
Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>Taiwan, Hitcon, APTs, ransomware, visibility, attribution, threat intelligence, MIVD, Dutch Intel, Netherlands, Japan, Switzerland, cyber operations, ransomware, Iranian hacking, election interference, patching shenanigans, Xiaomi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Patrick Howell O'Neill, Cybersecurity Editor, MIT Technology Review</title>
  <link>http://securityconversations.fireside.fm/patrick-howell-oneill-mit-tech-review</link>
  <guid isPermaLink="false">02fc5a7f-d41b-434f-a25d-5f6c0a046dbc</guid>
  <pubDate>Tue, 30 Mar 2021 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc.mp3" length="24838523" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle> 
Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  [Follow Patrick on Twitter](https://twitter.com/howelloneill).</itunes:subtitle>
  <itunes:duration>25:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc/cover.jpg?v=1"/>
  <description>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop (https://securityconversations.com/on-disrupting-gov-malware-attacks/) on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  Follow Patrick on Twitter (https://twitter.com/howelloneill). 
</description>
  <itunes:keywords>journalism, story-telling, google, project zero, APT, nation-state malware, attribution</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
