<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 06:56:32 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Csrb”</title>
    <link>https://securityconversations.fireside.fm/tags/csrb</link>
    <pubDate>Fri, 27 Dec 2024 11:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights</title>
  <link>http://securityconversations.fireside.fm/palo-alto-backdoor-cyberhaven-hack-year-review</link>
  <guid isPermaLink="false">55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903</guid>
  <pubDate>Fri, 27 Dec 2024 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903.mp3" length="91383420" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 27:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
  <itunes:duration>1:53:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 27:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>Sora, AI, deepfake, cybersecurity, Cyberhaven, browser extensions, malware, insider threats, ChatGPT, privacy, Chrome, data security, malware, cybersecurity, attribution, corporate responsibility, cyber operations, physical conflict, research, cybersecurity, malware, nation-state threats, drone technology, election interference, CSRB, research, cybersecurity challenges, global conflicts, cyber warfare</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1321LDAuU5PosOnXODrFvvXAx8TiTXr1kbtQZE1PhhLw/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor " rel="nofollow" href="https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf">LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor </a></li><li><a title="Palo Alto: Operation Lunar Peek" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/">Palo Alto: Operation Lunar Peek</a></li><li><a title="Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistence/">Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts</a></li><li><a title="“A Digital Prison”: Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/">“A Digital Prison”: Surveillance and the suppression of civil society in Serbia</a></li><li><a title="Cyberhaven breach reported. Employee phished and pushed malicious chrome extension" rel="nofollow" href="https://x.com/cstanley/status/1872365853318225931">Cyberhaven breach reported. Employee phished and pushed malicious chrome extension</a></li><li><a title="GRU 29155 doing cyber operations" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">GRU 29155 doing cyber operations</a></li><li><a title="How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar " rel="nofollow" href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar </a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days</a></li><li><a title="Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova&#39;s National Elections" rel="nofollow" href="https://blog.checkpoint.com/research/operation-middlefloor-unmasking-the-disinformation-campaign-targeting-moldovas-national-elections/">Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections</a></li><li><a title="NSPX30: A sophisticated AitM-enabled implant evolving since 2005" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/">NSPX30: A sophisticated AitM-enabled implant evolving since 2005</a></li><li><a title="backdoor in upstream xz/liblzma leading to ssh server compromise" rel="nofollow" href="https://seclists.org/oss-sec/2024/q1/268">backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a title="PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem" rel="nofollow" href="https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem">PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem</a></li><li><a title="The Tech Coup - How to Save Democracy from Silicon Valley" rel="nofollow" href="https://press.princeton.edu/books/hardcover/9780691241173/the-tech-coup?srsltid=AfmBOoq7pNBk27MtRxluxXHgYpx1hk2misTivpgZBRfkrplbw9t3q81i">The Tech Coup - How to Save Democracy from Silicon Valley</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1321LDAuU5PosOnXODrFvvXAx8TiTXr1kbtQZE1PhhLw/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor " rel="nofollow" href="https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf">LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor </a></li><li><a title="Palo Alto: Operation Lunar Peek" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/">Palo Alto: Operation Lunar Peek</a></li><li><a title="Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistence/">Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts</a></li><li><a title="“A Digital Prison”: Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/">“A Digital Prison”: Surveillance and the suppression of civil society in Serbia</a></li><li><a title="Cyberhaven breach reported. Employee phished and pushed malicious chrome extension" rel="nofollow" href="https://x.com/cstanley/status/1872365853318225931">Cyberhaven breach reported. Employee phished and pushed malicious chrome extension</a></li><li><a title="GRU 29155 doing cyber operations" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">GRU 29155 doing cyber operations</a></li><li><a title="How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar " rel="nofollow" href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar </a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days</a></li><li><a title="Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova&#39;s National Elections" rel="nofollow" href="https://blog.checkpoint.com/research/operation-middlefloor-unmasking-the-disinformation-campaign-targeting-moldovas-national-elections/">Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections</a></li><li><a title="NSPX30: A sophisticated AitM-enabled implant evolving since 2005" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/">NSPX30: A sophisticated AitM-enabled implant evolving since 2005</a></li><li><a title="backdoor in upstream xz/liblzma leading to ssh server compromise" rel="nofollow" href="https://seclists.org/oss-sec/2024/q1/268">backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a title="PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem" rel="nofollow" href="https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem">PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem</a></li><li><a title="The Tech Coup - How to Save Democracy from Silicon Valley" rel="nofollow" href="https://press.princeton.edu/books/hardcover/9780691241173/the-tech-coup?srsltid=AfmBOoq7pNBk27MtRxluxXHgYpx1hk2misTivpgZBRfkrplbw9t3q81i">The Tech Coup - How to Save Democracy from Silicon Valley</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep4: The AT&amp;T mega-breach, iPhone mercenary spyware, Microsoft zero-days</title>
  <link>http://securityconversations.fireside.fm/tbp-ep4</link>
  <guid isPermaLink="false">37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f</guid>
  <pubDate>Fri, 12 Jul 2024 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f.mp3" length="61000643" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 4:  Listen as the hosts delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:11:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 4:  The boys delve into the massive AT&amp;amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).
</description>
  <itunes:keywords>AT&amp;T, Snowflake, Microsoft, CSRB, Apple, CISA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep3: Dave Aitel joins debate on nation-state hacking responsibilities</title>
  <link>http://securityconversations.fireside.fm/tbp-ep3</link>
  <guid isPermaLink="false">068888b9-32ca-4c20-b8f9-d38c6e24608f</guid>
  <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/068888b9-32ca-4c20-b8f9-d38c6e24608f.mp3" length="58460157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 3:  Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 

We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 

The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.

* Costin Raiu is on vacation.</itunes:subtitle>
  <itunes:duration>1:04:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/068888b9-32ca-4c20-b8f9-d38c6e24608f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 
We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 
The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.
Costin Raiu is on vacation. 
</description>
  <itunes:keywords>Microsoft, CSRB, CISA, Triangulation, Chevron deference, Project Zero, Google</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud Compute</title>
  <link>http://securityconversations.fireside.fm/new-show-ep-1</link>
  <guid isPermaLink="false">d0003b6f-d259-41d1-991b-18d68fc8c009</guid>
  <pubDate>Sat, 22 Jun 2024 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d0003b6f-d259-41d1-991b-18d68fc8c009.mp3" length="40341037" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also discuss the KL ban.</itunes:subtitle>
  <itunes:duration>46:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d0003b6f-d259-41d1-991b-18d68fc8c009/cover.jpg?v=2"/>
  <description>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also talk about the KL ban. 
</description>
  <itunes:keywords>Microsoft, CSRB, Apple, AI</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
