<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 24 Apr 2026 16:16:22 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Cisa”</title>
    <link>https://securityconversations.fireside.fm/tags/cisa</link>
    <pubDate>Fri, 17 Jan 2025 12:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day</title>
  <link>http://securityconversations.fireside.fm/cisa-victory-lap-plugx-removal-tiktok-ban</link>
  <guid isPermaLink="false">f31e117e-f570-453a-862f-604a0314c90b</guid>
  <pubDate>Fri, 17 Jan 2025 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f31e117e-f570-453a-862f-604a0314c90b.mp3" length="95741011" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 30: We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
  <itunes:duration>1:59:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f31e117e-f570-453a-862f-604a0314c90b/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 30:  We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. 
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>Sekoia, PlugX, FBI, China, CISA, Secure by Design Pledge, Jen Easterly, Executive Order, Fortinet, zero-day, TikTok, mobile tracking</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 30</strong>:  We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1HS3gbpFtueD9eaOkBNbgS5Hg-x7SNSKudF9gx84_qMU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-and-fbi-conduct-international-operation-delete-malware-used-china-backed">Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers</a></li><li><a title="PlugX removal affidavit" rel="nofollow" href="https://www.justice.gov/opa/media/1384136/dl">PlugX removal affidavit</a></li><li><a title="Sekoia -- PlugX worm disinfection campaign" rel="nofollow" href="https://blog.sekoia.io/plugx-worm-disinfection-campaign-feedbacks/">Sekoia -- PlugX worm disinfection campaign</a></li><li><a title="Jen Easterly: Building a secure by Design ecosystem " rel="nofollow" href="https://www.cisa.gov/news-events/news/building-secure-design-ecosystem">Jen Easterly: Building a secure by Design ecosystem </a></li><li><a title="Trump zeroes in on Sean Plankey to lead CISA" rel="nofollow" href="https://www.politico.com/live-updates/2025/01/15/congress/sean-plankey-likely-to-lead-u-s-cyber-agency-00198382">Trump zeroes in on Sean Plankey to lead CISA</a></li><li><a title="Sean Plankey bio" rel="nofollow" href="https://www.sans.org/profiles/sean-plankey/">Sean Plankey bio</a></li><li><a title="Biden cybersecurity executive order" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/">Biden cybersecurity executive order</a></li><li><a title="Biden executive order aims to shore up US cyber defenses" rel="nofollow" href="https://apnews.com/article/cybersecurity-biden-trump-china-russia-ai-quantum-3fc53784ad9d1c05d7de85224a762a36">Biden executive order aims to shore up US cyber defenses</a></li><li><a title="Gravy Analytics accused of negligence over location data breach" rel="nofollow" href="https://news.bloomberglaw.com/privacy-and-data-security/gravy-analytics-accused-of-negligence-over-location-data-breach">Gravy Analytics accused of negligence over location data breach</a></li><li><a title="Tracking the mobile trackers (Costin Raiu) - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=EG6sZA1N8NU&amp;ab_channel=OPCDE">Tracking the mobile trackers (Costin Raiu) - YouTube</a></li><li><a title="Russia&#39;s largest platform for state procurement hit by cyberattack from pro-Ukraine group" rel="nofollow" href="https://therecord.media/russian-platform-for-state-procurement-hit-cyberattack">Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group</a></li><li><a title="New Star Blizzard spear-phishing campaign targets WhatsApp accounts" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/">New Star Blizzard spear-phishing campaign targets WhatsApp accounts</a></li><li><a title="UK proposes ransomware payment ban" rel="nofollow" href="https://www.gov.uk/government/news/world-leading-proposals-to-protect-businesses-from-cybercrime">UK proposes ransomware payment ban</a></li><li><a title="Fortinet authentication bypass zero-day " rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-24-535">Fortinet authentication bypass zero-day </a></li><li><a title="Fortinet: Deep dive into a Linux rootkit malware" rel="nofollow" href="https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware">Fortinet: Deep dive into a Linux rootkit malware</a></li><li><a title="Bernardo Quintero&#39;s new book on VirusTotal (Spanish-language)" rel="nofollow" href="https://www.amazon.com/Infectado-Spectrum-emprendedor-accidental-Spanish/dp/8409666227/ref=sr_1_1?crid=27KFPUV4ECRH7&amp;dib=eyJ2IjoiMSJ9.RtftyW4qSxl2Q07QPDYz0JgOYLm_jlK0D5e4quXsVNSmjtQQ8abhBlRIA-Nf7U52lLy4zw2gX2NTgPAbcbW6n4rBuiAXNmN3-GgGABAjMjDXf_3a6-W0W9zIyiKdEYRWl2rlphl_tl5MwyE5wHHlBouzn8aE8_GS_Lk478PIl5G-bFxbGPG9Gd8OAzKjHaxqUbf7P4jpSzKvIsumlR5eaI3rVPfdcdYXyLaGM_LpxGk.B0D0HYHfmenDvtslyNwXiMtNFrsxLEiihfv4twDd4t8&amp;dib_tag=se&amp;keywords=bernardo+quintero&amp;qid=1737143167&amp;sprefix=%2Caps%2C143&amp;sr=8-1">Bernardo Quintero's new book on VirusTotal (Spanish-language)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 30</strong>:  We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1HS3gbpFtueD9eaOkBNbgS5Hg-x7SNSKudF9gx84_qMU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-and-fbi-conduct-international-operation-delete-malware-used-china-backed">Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers</a></li><li><a title="PlugX removal affidavit" rel="nofollow" href="https://www.justice.gov/opa/media/1384136/dl">PlugX removal affidavit</a></li><li><a title="Sekoia -- PlugX worm disinfection campaign" rel="nofollow" href="https://blog.sekoia.io/plugx-worm-disinfection-campaign-feedbacks/">Sekoia -- PlugX worm disinfection campaign</a></li><li><a title="Jen Easterly: Building a secure by Design ecosystem " rel="nofollow" href="https://www.cisa.gov/news-events/news/building-secure-design-ecosystem">Jen Easterly: Building a secure by Design ecosystem </a></li><li><a title="Trump zeroes in on Sean Plankey to lead CISA" rel="nofollow" href="https://www.politico.com/live-updates/2025/01/15/congress/sean-plankey-likely-to-lead-u-s-cyber-agency-00198382">Trump zeroes in on Sean Plankey to lead CISA</a></li><li><a title="Sean Plankey bio" rel="nofollow" href="https://www.sans.org/profiles/sean-plankey/">Sean Plankey bio</a></li><li><a title="Biden cybersecurity executive order" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/">Biden cybersecurity executive order</a></li><li><a title="Biden executive order aims to shore up US cyber defenses" rel="nofollow" href="https://apnews.com/article/cybersecurity-biden-trump-china-russia-ai-quantum-3fc53784ad9d1c05d7de85224a762a36">Biden executive order aims to shore up US cyber defenses</a></li><li><a title="Gravy Analytics accused of negligence over location data breach" rel="nofollow" href="https://news.bloomberglaw.com/privacy-and-data-security/gravy-analytics-accused-of-negligence-over-location-data-breach">Gravy Analytics accused of negligence over location data breach</a></li><li><a title="Tracking the mobile trackers (Costin Raiu) - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=EG6sZA1N8NU&amp;ab_channel=OPCDE">Tracking the mobile trackers (Costin Raiu) - YouTube</a></li><li><a title="Russia&#39;s largest platform for state procurement hit by cyberattack from pro-Ukraine group" rel="nofollow" href="https://therecord.media/russian-platform-for-state-procurement-hit-cyberattack">Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group</a></li><li><a title="New Star Blizzard spear-phishing campaign targets WhatsApp accounts" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/">New Star Blizzard spear-phishing campaign targets WhatsApp accounts</a></li><li><a title="UK proposes ransomware payment ban" rel="nofollow" href="https://www.gov.uk/government/news/world-leading-proposals-to-protect-businesses-from-cybercrime">UK proposes ransomware payment ban</a></li><li><a title="Fortinet authentication bypass zero-day " rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-24-535">Fortinet authentication bypass zero-day </a></li><li><a title="Fortinet: Deep dive into a Linux rootkit malware" rel="nofollow" href="https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware">Fortinet: Deep dive into a Linux rootkit malware</a></li><li><a title="Bernardo Quintero&#39;s new book on VirusTotal (Spanish-language)" rel="nofollow" href="https://www.amazon.com/Infectado-Spectrum-emprendedor-accidental-Spanish/dp/8409666227/ref=sr_1_1?crid=27KFPUV4ECRH7&amp;dib=eyJ2IjoiMSJ9.RtftyW4qSxl2Q07QPDYz0JgOYLm_jlK0D5e4quXsVNSmjtQQ8abhBlRIA-Nf7U52lLy4zw2gX2NTgPAbcbW6n4rBuiAXNmN3-GgGABAjMjDXf_3a6-W0W9zIyiKdEYRWl2rlphl_tl5MwyE5wHHlBouzn8aE8_GS_Lk478PIl5G-bFxbGPG9Gd8OAzKjHaxqUbf7P4jpSzKvIsumlR5eaI3rVPfdcdYXyLaGM_LpxGk.B0D0HYHfmenDvtslyNwXiMtNFrsxLEiihfv4twDd4t8&amp;dib_tag=se&amp;keywords=bernardo+quintero&amp;qid=1737143167&amp;sprefix=%2Caps%2C143&amp;sr=8-1">Bernardo Quintero's new book on VirusTotal (Spanish-language)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Russian APT weaponized nearby Wi-Fi networks in DC, new macOS zero-days, DOJ v Chrome</title>
  <link>http://securityconversations.fireside.fm/tbp-ep22</link>
  <guid isPermaLink="false">afa36e08-3818-4a0c-ac7a-55ff9ff6c02b</guid>
  <pubDate>Fri, 22 Nov 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/afa36e08-3818-4a0c-ac7a-55ff9ff6c02b.mp3" length="71756075" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 22:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.

We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
  <itunes:duration>1:28:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/afa36e08-3818-4a0c-ac7a-55ff9ff6c02b/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 22:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.
We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Cyberwarcon, APT 28, Wi-Fi hacking, cybersecurity, Chinese surveillance, data sharing, NSA, vendor accountability, cybersecurity, information sharing, regulatory failures, market solutions, NSA, Google breakup, data privacy, surveillance capitalism, antitrust, corporate relationships, Apple, cybersecurity, North Korea, gig economy, cryptocurrency, AI, exploits, security updates, fake IT workers, supply chain attacks</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 22</strong>:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA&#39;s strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.</p>

<p>We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript - (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1-NW6qC6vrI-zQZMM1fQ7ldGgUwFUohtVun1CHsxl_TU/edit?tab=t.0">Transcript - (unedited, AI-generated)</a></li><li><a title="Russian APT WiFI Nearest Neighbor Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">Russian APT WiFI Nearest Neighbor Attack </a></li><li><a title="Russian Spies Jumped From One Network to Another Via Wi-Fi" rel="nofollow" href="https://archive.ph/f0O3n">Russian Spies Jumped From One Network to Another Via Wi-Fi</a></li><li><a title="Advisory: New exploited Apple zero-days" rel="nofollow" href="https://support.apple.com/en-us/121753">Advisory: New exploited Apple zero-days</a></li><li><a title="NSA Director Wants Industry to Disclose Details of Telecom Hacks" rel="nofollow" href="https://archive.ph/2024.11.20-231241/https://www.bloomberg.com/news/articles/2024-11-20/nsa-director-wants-industry-to-disclose-details-of-telecom-hacks#selection-1321.13-1328.0">NSA Director Wants Industry to Disclose Details of Telecom Hacks</a></li><li><a title="Microsoft&#39;s &quot;Free&quot; Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits" rel="nofollow" href="https://www.propublica.org/article/microsoft-white-house-offer-cybersecurity-biden-nadella">Microsoft's "Free" Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits</a></li><li><a title="Microsoft accuses Google of &#39;Shadow Campaigns&#39;" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/28/googles-shadow-campaigns/">Microsoft accuses Google of 'Shadow Campaigns'</a></li><li><a title="DOJ calls for breakup of Google and sale of Chrome" rel="nofollow" href="https://www.nbcnews.com/news/us-news/google-department-of-justice-chrome-sale-breakup-microsoft-apple-rcna181133">DOJ calls for breakup of Google and sale of Chrome</a></li><li><a title="DPRK IT Workers -- A Network of Active Front Companies and Their Links to China" rel="nofollow" href="https://www.sentinelone.com/labs/dprk-it-workers-a-network-of-active-front-companies-and-their-links-to-china/">DPRK IT Workers -- A Network of Active Front Companies and Their Links to China</a></li><li><a title="Be careful when coding with ChatGPT" rel="nofollow" href="https://x.com/r_cky0/status/1859656430888026524">Be careful when coding with ChatGPT</a></li><li><a title="GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models" rel="nofollow" href="https://arxiv.org/pdf/2410.05229">GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models</a></li><li><a title="PIVOTcon 2025" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 22</strong>:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA&#39;s strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.</p>

<p>We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript - (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1-NW6qC6vrI-zQZMM1fQ7ldGgUwFUohtVun1CHsxl_TU/edit?tab=t.0">Transcript - (unedited, AI-generated)</a></li><li><a title="Russian APT WiFI Nearest Neighbor Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">Russian APT WiFI Nearest Neighbor Attack </a></li><li><a title="Russian Spies Jumped From One Network to Another Via Wi-Fi" rel="nofollow" href="https://archive.ph/f0O3n">Russian Spies Jumped From One Network to Another Via Wi-Fi</a></li><li><a title="Advisory: New exploited Apple zero-days" rel="nofollow" href="https://support.apple.com/en-us/121753">Advisory: New exploited Apple zero-days</a></li><li><a title="NSA Director Wants Industry to Disclose Details of Telecom Hacks" rel="nofollow" href="https://archive.ph/2024.11.20-231241/https://www.bloomberg.com/news/articles/2024-11-20/nsa-director-wants-industry-to-disclose-details-of-telecom-hacks#selection-1321.13-1328.0">NSA Director Wants Industry to Disclose Details of Telecom Hacks</a></li><li><a title="Microsoft&#39;s &quot;Free&quot; Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits" rel="nofollow" href="https://www.propublica.org/article/microsoft-white-house-offer-cybersecurity-biden-nadella">Microsoft's "Free" Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits</a></li><li><a title="Microsoft accuses Google of &#39;Shadow Campaigns&#39;" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/28/googles-shadow-campaigns/">Microsoft accuses Google of 'Shadow Campaigns'</a></li><li><a title="DOJ calls for breakup of Google and sale of Chrome" rel="nofollow" href="https://www.nbcnews.com/news/us-news/google-department-of-justice-chrome-sale-breakup-microsoft-apple-rcna181133">DOJ calls for breakup of Google and sale of Chrome</a></li><li><a title="DPRK IT Workers -- A Network of Active Front Companies and Their Links to China" rel="nofollow" href="https://www.sentinelone.com/labs/dprk-it-workers-a-network-of-active-front-companies-and-their-links-to-china/">DPRK IT Workers -- A Network of Active Front Companies and Their Links to China</a></li><li><a title="Be careful when coding with ChatGPT" rel="nofollow" href="https://x.com/r_cky0/status/1859656430888026524">Be careful when coding with ChatGPT</a></li><li><a title="GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models" rel="nofollow" href="https://arxiv.org/pdf/2410.05229">GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models</a></li><li><a title="PIVOTcon 2025" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2025</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Mysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacks</title>
  <link>http://securityconversations.fireside.fm/tbp-ep20</link>
  <guid isPermaLink="false">4b7375c6-6a49-4e92-8bd1-e706a996e883</guid>
  <pubDate>Sat, 09 Nov 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4b7375c6-6a49-4e92-8bd1-e706a996e883.mp3" length="76955697" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 20:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
  <itunes:duration>1:37:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4b7375c6-6a49-4e92-8bd1-e706a996e883/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 20:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Keywords  cybersecurity, EDR software, Google Project Zero, telemetry, threat intelligence, information sharing, security research, exploitation techniques, legal considerations, transparency, EDR, Windows Defender, telemetry, security research, Apple, malware analysis, privacy, law enforcement, cybersecurity, antivirus, Salt Typhoon, Chinese APTs, cyber threats, Goblin Rat, Bitcoin attacks, North Korea, espionage, cybersecurity, iOS vulnerabilities, surveillance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 20</strong>:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1_R5EC39CoxPRz67njLfqKVLjq8bdkdh6h7l7UwaVHAE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="iPhones mysteriously rebooting themselves" rel="nofollow" href="https://archive.vn/JMEbq">iPhones mysteriously rebooting themselves</a></li><li><a title="Apple quietly ships iPhone reboot code" rel="nofollow" href="https://archive.ph/lpoLQ">Apple quietly ships iPhone reboot code</a></li><li><a title="FBI on China hacking US presidential campaigns iPhones" rel="nofollow" href="https://archive.ph/iAQzO">FBI on China hacking US presidential campaigns iPhones</a></li><li><a title="Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns" rel="nofollow" href="https://www.wsj.com/politics/national-security/chinese-hackers-targeted-phones-of-trump-vance-and-harris-campaign-e04abbdf?mod=article_inline">Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns</a></li><li><a title="Palo Alto: EDR Bypass Testing Reveals Threat Actor&#39;s Toolkit" rel="nofollow" href="https://unit42.paloaltonetworks.com/edr-bypass-extortion-attempt-thwarted/">Palo Alto: EDR Bypass Testing Reveals Threat Actor's Toolkit</a></li><li><a title="Palo Alto CVE-2024-5910 marked as exploited" rel="nofollow" href="https://security.paloaltonetworks.com/CVE-2024-5910">Palo Alto CVE-2024-5910 marked as exploited</a></li><li><a title="Toronto crypto company CEO kidnapped" rel="nofollow" href="https://www.cbc.ca/news/canada/toronto/kidnapping-toronto-businessman-cryptocurrency-1.7376679">Toronto crypto company CEO kidnapped</a></li><li><a title="A list of known &#39;meatspace&#39; crypto attacks" rel="nofollow" href="https://github.com/jlopp/physical-bitcoin-attacks">A list of known 'meatspace' crypto attacks</a></li><li><a title="North Korea crypto thieves targets macOS" rel="nofollow" href="https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/">North Korea crypto thieves targets macOS</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 20</strong>:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1_R5EC39CoxPRz67njLfqKVLjq8bdkdh6h7l7UwaVHAE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="iPhones mysteriously rebooting themselves" rel="nofollow" href="https://archive.vn/JMEbq">iPhones mysteriously rebooting themselves</a></li><li><a title="Apple quietly ships iPhone reboot code" rel="nofollow" href="https://archive.ph/lpoLQ">Apple quietly ships iPhone reboot code</a></li><li><a title="FBI on China hacking US presidential campaigns iPhones" rel="nofollow" href="https://archive.ph/iAQzO">FBI on China hacking US presidential campaigns iPhones</a></li><li><a title="Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns" rel="nofollow" href="https://www.wsj.com/politics/national-security/chinese-hackers-targeted-phones-of-trump-vance-and-harris-campaign-e04abbdf?mod=article_inline">Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns</a></li><li><a title="Palo Alto: EDR Bypass Testing Reveals Threat Actor&#39;s Toolkit" rel="nofollow" href="https://unit42.paloaltonetworks.com/edr-bypass-extortion-attempt-thwarted/">Palo Alto: EDR Bypass Testing Reveals Threat Actor's Toolkit</a></li><li><a title="Palo Alto CVE-2024-5910 marked as exploited" rel="nofollow" href="https://security.paloaltonetworks.com/CVE-2024-5910">Palo Alto CVE-2024-5910 marked as exploited</a></li><li><a title="Toronto crypto company CEO kidnapped" rel="nofollow" href="https://www.cbc.ca/news/canada/toronto/kidnapping-toronto-businessman-cryptocurrency-1.7376679">Toronto crypto company CEO kidnapped</a></li><li><a title="A list of known &#39;meatspace&#39; crypto attacks" rel="nofollow" href="https://github.com/jlopp/physical-bitcoin-attacks">A list of known 'meatspace' crypto attacks</a></li><li><a title="North Korea crypto thieves targets macOS" rel="nofollow" href="https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/">North Korea crypto thieves targets macOS</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep11: Cyberwarfare takes an ominous turn</title>
  <link>http://securityconversations.fireside.fm/cyberwarfare-takes-an-ominous-turn</link>
  <guid isPermaLink="false">f6139b28-a754-4280-9c11-a9de522d2348</guid>
  <pubDate>Fri, 06 Sep 2024 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f6139b28-a754-4280-9c11-a9de522d2348.mp3" length="59083969" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 11:  Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:15:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f6139b28-a754-4280-9c11-a9de522d2348/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.
Cast:  Juan Andres Guerrero-Saade  (https://x.com/juanandres_gs)(SentinelLabs), Costin Raiu (https://x.com/craiu) (Art of Noh), Ryan Naraine (https://x.com/ryanaraine) (SecurityWeek)
</description>
  <itunes:keywords>GRU, Russia, China, North Korea, South Korea, Unit 29155, Doppelganger, YARA, CISA, zero-day, influence operations, Skripal, skills shortage</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep4: The AT&amp;T mega-breach, iPhone mercenary spyware, Microsoft zero-days</title>
  <link>http://securityconversations.fireside.fm/tbp-ep4</link>
  <guid isPermaLink="false">37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f</guid>
  <pubDate>Fri, 12 Jul 2024 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f.mp3" length="61000643" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 4:  Listen as the hosts delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:11:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 4:  The boys delve into the massive AT&amp;amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).
</description>
  <itunes:keywords>AT&amp;T, Snowflake, Microsoft, CSRB, Apple, CISA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep3: Dave Aitel joins debate on nation-state hacking responsibilities</title>
  <link>http://securityconversations.fireside.fm/tbp-ep3</link>
  <guid isPermaLink="false">068888b9-32ca-4c20-b8f9-d38c6e24608f</guid>
  <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/068888b9-32ca-4c20-b8f9-d38c6e24608f.mp3" length="58460157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 3:  Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 

We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 

The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.

* Costin Raiu is on vacation.</itunes:subtitle>
  <itunes:duration>1:04:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/068888b9-32ca-4c20-b8f9-d38c6e24608f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 
We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 
The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.
Costin Raiu is on vacation. 
</description>
  <itunes:keywords>Microsoft, CSRB, CISA, Triangulation, Chevron deference, Project Zero, Google</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
