<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 24 Apr 2026 22:31:07 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “China”</title>
    <link>https://securityconversations.fireside.fm/tags/china</link>
    <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click </title>
  <link>http://securityconversations.fireside.fm/salt-typhoon-iocs-google-disruption-unit-whatsapp-zero-click</link>
  <guid isPermaLink="false">1ec2ef88-a1b1-4df7-b737-24542f8462c8</guid>
  <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1ec2ef88-a1b1-4df7-b737-24542f8462c8.mp3" length="101225542" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.

Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 

We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>2:24:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1ec2ef88-a1b1-4df7-b737-24542f8462c8/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.
Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 
We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
</description>
  <itunes:keywords>Salt Typhoon, Cisco, Ivanti, YARA, Ghost Emperor, UNC5807, Dutch MIVD AIVD, Mirai, LIghtBasin, Google, active-defense, hacking back, WhatsApp, Apple, iOS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate</title>
  <link>http://securityconversations.fireside.fm/russia-ukraine-badsuccessor-debate</link>
  <guid isPermaLink="false">c29a1c55-dabb-4e6c-849f-9ce8e38326ac</guid>
  <pubDate>Fri, 23 May 2025 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c29a1c55-dabb-4e6c-849f-9ce8e38326ac.mp3" length="117693808" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 47:  We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.

The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 

Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>2:30:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c29a1c55-dabb-4e6c-849f-9ce8e38326ac/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.
The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 
Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Russia, China, Ukraine, GRU, Fancy Bear, Sofacy, APT28, Akamai, Microsoft, responsible disclosure, Signal, Windows Recall, NSO, Japan, OpenAI, Privacy</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security</title>
  <link>http://securityconversations.fireside.fm/tom-rid-joins-the-show</link>
  <guid isPermaLink="false">a43a154a-06cd-4cf3-97fa-3945dc08f544</guid>
  <pubDate>Fri, 25 Apr 2025 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a43a154a-06cd-4cf3-97fa-3945dc08f544.mp3" length="77152373" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 

Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 

Cast: Thomas Rid, Juan Andres Guerrero-Saade and Ryan Naraine.  

* Costin Raiu is away this week.</itunes:subtitle>
  <itunes:duration>1:33:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a43a154a-06cd-4cf3-97fa-3945dc08f544/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 43:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 
Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 
Cast: Thomas Rid (https://sais.jhu.edu/users/trid2), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) and Ryan Naraine (https://twitter.com/ryanaraine).   Costin Raiu (https://twitter.com/craiu) is away this week. 
</description>
  <itunes:keywords>China, NSA, attribution, Volt Typhoon, Apple iOS, zero-day, CVE, MITRE, CISA, Microsoft, Europe, Anthropic, TP-Link</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela</title>
  <link>http://securityconversations.fireside.fm/tbp-ep19</link>
  <guid isPermaLink="false">afe08ad2-3625-4575-aaae-280d146e474c</guid>
  <pubDate>Sun, 03 Nov 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/afe08ad2-3625-4575-aaae-280d146e474c.mp3" length="89415224" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 19:  We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
  <itunes:duration>1:54:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/afe08ad2-3625-4575-aaae-280d146e474c/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 19:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Sophos, implants, firewall devices, appliances, China, Chengdu, CIA, Fortinet, Ivanti, Barracuda, India, Canada</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1U8q76wqVXIs9Sdc8vuqAr2S9CtknvnYryxS6l0IALv8/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivan Kwiatkowski: Threat intel truths inside" rel="nofollow" href="https://blog.kwiatkowski.fr/threat-intel-truths-inside">Ivan Kwiatkowski: Threat intel truths inside</a></li><li><a title="JAG-S LABScon keynote" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">JAG-S LABScon keynote</a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers</a></li><li><a title="Sophos Pacific Rim report" rel="nofollow" href="https://www.sophos.com/en-us/content/pacific-rim">Sophos Pacific Rim report</a></li><li><a title="NCSC details ‘Pygmy Goat’ network backdoor" rel="nofollow" href="https://www.securityweek.com/ncsc-details-pygmy-goat-backdoor-planted-on-hacked-sophos-firewall-devices/">NCSC details ‘Pygmy Goat’ network backdoor</a></li><li><a title="NCSC &#39;Pygmy Goat&#39; report" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/pygmy-goat/ncsc-mar-pygmy-goat.pdf">NCSC 'Pygmy Goat' report</a></li><li><a title="Massive hack-for-hire scandal rocks Italian political elites – POLITICO" rel="nofollow" href="https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/">Massive hack-for-hire scandal rocks Italian political elites – POLITICO</a></li><li><a title="Vatican, Israel implicated in Italy hacking scandal" rel="nofollow" href="https://www.politico.eu/article/vatican-israel-italian-hacking-scandal-uk-lithuania-equalize/">Vatican, Israel implicated in Italy hacking scandal</a></li><li><a title="Wired on CIA hack of Venezuela military payroll system" rel="nofollow" href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/?utm_medium=social&amp;mbid=social_twitter&amp;utm_social-type=owned&amp;utm_source=twitter&amp;utm_brand=wired">Wired on CIA hack of Venezuela military payroll system</a></li><li><a title="Is Now on VT!" rel="nofollow" href="https://x.com/Now_on_VT">Is Now on VT!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1U8q76wqVXIs9Sdc8vuqAr2S9CtknvnYryxS6l0IALv8/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivan Kwiatkowski: Threat intel truths inside" rel="nofollow" href="https://blog.kwiatkowski.fr/threat-intel-truths-inside">Ivan Kwiatkowski: Threat intel truths inside</a></li><li><a title="JAG-S LABScon keynote" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">JAG-S LABScon keynote</a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers</a></li><li><a title="Sophos Pacific Rim report" rel="nofollow" href="https://www.sophos.com/en-us/content/pacific-rim">Sophos Pacific Rim report</a></li><li><a title="NCSC details ‘Pygmy Goat’ network backdoor" rel="nofollow" href="https://www.securityweek.com/ncsc-details-pygmy-goat-backdoor-planted-on-hacked-sophos-firewall-devices/">NCSC details ‘Pygmy Goat’ network backdoor</a></li><li><a title="NCSC &#39;Pygmy Goat&#39; report" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/pygmy-goat/ncsc-mar-pygmy-goat.pdf">NCSC 'Pygmy Goat' report</a></li><li><a title="Massive hack-for-hire scandal rocks Italian political elites – POLITICO" rel="nofollow" href="https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/">Massive hack-for-hire scandal rocks Italian political elites – POLITICO</a></li><li><a title="Vatican, Israel implicated in Italy hacking scandal" rel="nofollow" href="https://www.politico.eu/article/vatican-israel-italian-hacking-scandal-uk-lithuania-equalize/">Vatican, Israel implicated in Italy hacking scandal</a></li><li><a title="Wired on CIA hack of Venezuela military payroll system" rel="nofollow" href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/?utm_medium=social&amp;mbid=social_twitter&amp;utm_social-type=owned&amp;utm_source=twitter&amp;utm_brand=wired">Wired on CIA hack of Venezuela military payroll system</a></li><li><a title="Is Now on VT!" rel="nofollow" href="https://x.com/Now_on_VT">Is Now on VT!</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep11: Cyberwarfare takes an ominous turn</title>
  <link>http://securityconversations.fireside.fm/cyberwarfare-takes-an-ominous-turn</link>
  <guid isPermaLink="false">f6139b28-a754-4280-9c11-a9de522d2348</guid>
  <pubDate>Fri, 06 Sep 2024 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f6139b28-a754-4280-9c11-a9de522d2348.mp3" length="59083969" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 11:  Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:15:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f6139b28-a754-4280-9c11-a9de522d2348/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.
Cast:  Juan Andres Guerrero-Saade  (https://x.com/juanandres_gs)(SentinelLabs), Costin Raiu (https://x.com/craiu) (Art of Noh), Ryan Naraine (https://x.com/ryanaraine) (SecurityWeek)
</description>
  <itunes:keywords>GRU, Russia, China, North Korea, South Korea, Unit 29155, Doppelganger, YARA, CISA, zero-day, influence operations, Skripal, skills shortage</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep9: The blurring lines between nation-state APTs and the ransomware epidemic</title>
  <link>http://securityconversations.fireside.fm/tbp-ep9</link>
  <guid isPermaLink="false">7e54af0b-f1c0-4741-8b5c-e90eddd617b7</guid>
  <pubDate>Fri, 23 Aug 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7e54af0b-f1c0-4741-8b5c-e90eddd617b7.mp3" length="57472403" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 9:  On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 

Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024  keynote stage.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:06:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7e54af0b-f1c0-4741-8b5c-e90eddd617b7/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 
Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.
Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>Taiwan, Hitcon, APTs, ransomware, visibility, attribution, threat intelligence, MIVD, Dutch Intel, Netherlands, Japan, Switzerland, cyber operations, ransomware, Iranian hacking, election interference, patching shenanigans, Xiaomi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers</title>
  <link>http://securityconversations.fireside.fm/danny-adamitis-volt-typhoon-botnet</link>
  <guid isPermaLink="false">73110ffd-bb15-40c4-924d-5bf7b89ed152</guid>
  <pubDate>Fri, 05 Jan 2024 09:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/73110ffd-bb15-40c4-924d-5bf7b89ed152.mp3" length="34693170" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.

Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</itunes:subtitle>
  <itunes:duration>34:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/73110ffd-bb15-40c4-924d-5bf7b89ed152/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
FwHunt (https://fwhunt.run)
Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.
Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer. 
</description>
  <itunes:keywords>Volt Typoon, China, Critical Infrastructure, routers</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Dakota Cary on China's weaponization of software vulnerabilities</title>
  <link>http://securityconversations.fireside.fm/dakota-cary-global-china-hub</link>
  <guid isPermaLink="false">11696fa7-d330-4346-b5f1-078d7542cccd</guid>
  <pubDate>Fri, 15 Sep 2023 13:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/11696fa7-d330-4346-b5f1-078d7542cccd.mp3" length="51975872" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 

In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, nation state-backed threat actors in China and that infamous Bloomberg 'rice grain' spy chip story.</itunes:subtitle>
  <itunes:duration>55:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/11696fa7-d330-4346-b5f1-078d7542cccd/cover.jpg?v=3"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 
In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg 'rice grain' spy chip story. 
</description>
  <itunes:keywords>China, nation-state, APTs, Atlantic Council</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
