<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 18:31:08 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Cryptocurrency”</title>
    <link>https://securityconversations.fireside.fm/tags/cryptocurrency</link>
    <pubDate>Fri, 20 Jun 2025 02:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks</title>
  <link>http://securityconversations.fireside.fm/cyberwar-and-vanishing-bitcoins</link>
  <guid isPermaLink="false">01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68</guid>
  <pubDate>Fri, 20 Jun 2025 02:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68.mp3" length="144334262" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.

Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.

Cast: Hamid Kashfi, Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine. </itunes:subtitle>
  <itunes:duration>3:07:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.
Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.
Cast: Hamid Kashfi (https://twitter.com/hkashfi),  Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Israel, Bitcoin, Predatory Sparrow, Bitcoin, Novitex, nuclear, Stuxnet, drone swarms, autonomous warfare</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1yKeeXGR_b7gfGWwIVv_dV5RmIFCrYAZQs5BUMClyFtU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Pro-Israel hackers take credit for cyberattack on Iran&#39;s Bank Sepah" rel="nofollow" href="https://www.axios.com/2025/06/17/iran-bank-sepah-cyberattack-israel">Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah</a></li><li><a title="Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War" rel="nofollow" href="https://www.securityweek.com/predatory-sparrow-burns-90-million-on-iranian-crypto-exchange-in-cyber-shadow-war/">Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War</a></li><li><a title="Codebreakers and Predatory Sparrow" rel="nofollow" href="https://x.com/hkashfi/status/1934898014658654226?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Codebreakers and Predatory Sparrow</a></li><li><a title="Iranian Exchange Nobitex: The $90M Exploit" rel="nofollow" href="https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/">Iranian Exchange Nobitex: The $90M Exploit</a></li><li><a title="Iranian newspaper: Defense system was hacked" rel="nofollow" href="https://www.iranintl.com/fa/202506150578">Iranian newspaper: Defense system was hacked</a></li><li><a title="Iranian state TV shows footage of Israeli drone" rel="nofollow" href="https://www.cnn.com/2025/06/18/world/video/iran-state-tv-israel-drone-ldn-digvid">Iranian state TV shows footage of Israeli drone</a></li><li><a title="Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks</a></li><li><a title="Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy" rel="nofollow" href="https://archive.ph/cCMt9">Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Three Buddy Problem LIVE" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem LIVE</a></li><li><a title="Hamid Kashfi: The curious case of Predatory Sparrow" rel="nofollow" href="https://www.darkcell.se/sparrows">Hamid Kashfi: The curious case of Predatory Sparrow</a></li><li><a title="Glasshouse episode with Hamid Kashfi" rel="nofollow" href="https://www.youtube.com/watch?v=z05lKD0R5jo&amp;ab_channel=TheGlasshouseCenter">Glasshouse episode with Hamid Kashfi</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1yKeeXGR_b7gfGWwIVv_dV5RmIFCrYAZQs5BUMClyFtU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Pro-Israel hackers take credit for cyberattack on Iran&#39;s Bank Sepah" rel="nofollow" href="https://www.axios.com/2025/06/17/iran-bank-sepah-cyberattack-israel">Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah</a></li><li><a title="Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War" rel="nofollow" href="https://www.securityweek.com/predatory-sparrow-burns-90-million-on-iranian-crypto-exchange-in-cyber-shadow-war/">Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War</a></li><li><a title="Codebreakers and Predatory Sparrow" rel="nofollow" href="https://x.com/hkashfi/status/1934898014658654226?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Codebreakers and Predatory Sparrow</a></li><li><a title="Iranian Exchange Nobitex: The $90M Exploit" rel="nofollow" href="https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/">Iranian Exchange Nobitex: The $90M Exploit</a></li><li><a title="Iranian newspaper: Defense system was hacked" rel="nofollow" href="https://www.iranintl.com/fa/202506150578">Iranian newspaper: Defense system was hacked</a></li><li><a title="Iranian state TV shows footage of Israeli drone" rel="nofollow" href="https://www.cnn.com/2025/06/18/world/video/iran-state-tv-israel-drone-ldn-digvid">Iranian state TV shows footage of Israeli drone</a></li><li><a title="Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks</a></li><li><a title="Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy" rel="nofollow" href="https://archive.ph/cCMt9">Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Three Buddy Problem LIVE" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem LIVE</a></li><li><a title="Hamid Kashfi: The curious case of Predatory Sparrow" rel="nofollow" href="https://www.darkcell.se/sparrows">Hamid Kashfi: The curious case of Predatory Sparrow</a></li><li><a title="Glasshouse episode with Hamid Kashfi" rel="nofollow" href="https://www.youtube.com/watch?v=z05lKD0R5jo&amp;ab_channel=TheGlasshouseCenter">Glasshouse episode with Hamid Kashfi</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>A Coinbase breach with bribes, rogue contractors and a $20M ransom demand</title>
  <link>http://securityconversations.fireside.fm/coinbase-breach-ivanti-zero-days-android-intrusion-logging</link>
  <guid isPermaLink="false">e41fa5a7-38a9-4b9f-ab7a-ad6f9d00c2ad</guid>
  <pubDate>Fri, 16 May 2025 11:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e41fa5a7-38a9-4b9f-ab7a-ad6f9d00c2ad.mp3" length="101815632" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demands. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>2:23:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e41fa5a7-38a9-4b9f-ab7a-ad6f9d00c2ad/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 46:  We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Coinbase, ransomware, Ivanti, Fortinet, Sonicwall, zero-day, Microsoft, Intrusion Logging, Android, iOS, ENISA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 46</strong>:  We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new &#39;Intrusion Logging&#39; feature coming to Android, Apple&#39;s iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18lG0HnPcDS4zsR7aVdhv6q5qnHBDF7wsbCkEuMU8iDc/edit?tab=t.0#heading=h.xoy008k76n3z">Transcript (unedited, AI-generated)</a></li><li><a title="Coinbase on $20m ransom demand" rel="nofollow" href="https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists">Coinbase on $20m ransom demand</a></li><li><a title="SEC filing on Coinbase breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/1679788/000167978825000094/coin-20250514.htm?7194ef805fa2d04b0f7e8c9521f97343">SEC filing on Coinbase breach</a></li><li><a title="Coinbase Rogue Contractors Bribed to Leak Customer Data" rel="nofollow" href="https://www.securityweek.com/coinbase-rejects-20m-ransom-after-rogue-contractors-bribed-to-leak-customer-data/">Coinbase Rogue Contractors Bribed to Leak Customer Data</a></li><li><a title="Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US&amp;_gl=1*nrofxr*_gcl_au*MjQ3MzY1MzY5LjE3NDcxOTkyODY">Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)</a></li><li><a title="Watchtowr blog on new Ivanti 0days" rel="nofollow" href="https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/">Watchtowr blog on new Ivanti 0days</a></li><li><a title="CISA Known Exploited Vulnerabilities (KEV)" rel="nofollow" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA Known Exploited Vulnerabilities (KEV)</a></li><li><a title="&#39;Advanced Protection&#39; comes to Android 16" rel="nofollow" href="https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html?m=1">'Advanced Protection' comes to Android 16</a></li><li><a title="Europe launches it own vulnerability database" rel="nofollow" href="https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security">Europe launches it own vulnerability database</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 46</strong>:  We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new &#39;Intrusion Logging&#39; feature coming to Android, Apple&#39;s iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18lG0HnPcDS4zsR7aVdhv6q5qnHBDF7wsbCkEuMU8iDc/edit?tab=t.0#heading=h.xoy008k76n3z">Transcript (unedited, AI-generated)</a></li><li><a title="Coinbase on $20m ransom demand" rel="nofollow" href="https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists">Coinbase on $20m ransom demand</a></li><li><a title="SEC filing on Coinbase breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/1679788/000167978825000094/coin-20250514.htm?7194ef805fa2d04b0f7e8c9521f97343">SEC filing on Coinbase breach</a></li><li><a title="Coinbase Rogue Contractors Bribed to Leak Customer Data" rel="nofollow" href="https://www.securityweek.com/coinbase-rejects-20m-ransom-after-rogue-contractors-bribed-to-leak-customer-data/">Coinbase Rogue Contractors Bribed to Leak Customer Data</a></li><li><a title="Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US&amp;_gl=1*nrofxr*_gcl_au*MjQ3MzY1MzY5LjE3NDcxOTkyODY">Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)</a></li><li><a title="Watchtowr blog on new Ivanti 0days" rel="nofollow" href="https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/">Watchtowr blog on new Ivanti 0days</a></li><li><a title="CISA Known Exploited Vulnerabilities (KEV)" rel="nofollow" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA Known Exploited Vulnerabilities (KEV)</a></li><li><a title="&#39;Advanced Protection&#39; comes to Android 16" rel="nofollow" href="https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html?m=1">'Advanced Protection' comes to Android 16</a></li><li><a title="Europe launches it own vulnerability database" rel="nofollow" href="https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security">Europe launches it own vulnerability database</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
