<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 21:50:55 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Cyberwar”</title>
    <link>https://securityconversations.fireside.fm/tags/cyberwar</link>
    <pubDate>Sat, 28 Feb 2026 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>War in Iran, Anthropic v Pentagon, Trenchant zero-day sanctions, AI stock market shocks</title>
  <link>http://securityconversations.fireside.fm/war-iran-anthropic-usgov-trenchant-zero-day-sanctions</link>
  <guid isPermaLink="false">7d707098-e32e-45a7-9069-fb8a34620302</guid>
  <pubDate>Sat, 28 Feb 2026 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7d707098-e32e-45a7-9069-fb8a34620302.mp3" length="105895784" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 87:  We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:08:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7d707098-e32e-45a7-9069-fb8a34620302/cover.jpg?v=1"/>
  <description>(Presented by Thinkst Canary (https://canary.tools): Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)
Three Buddy Problem - Episode 87: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Israel, Iran, cyberwar, Peter Williams, Operation Zero, Trenchant, Anthropic, OpenAI, CrowdStrike, Cisco Talos, China, DeepSeek, Meta, cyberespionage</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1pVVw2L0YShpPy1ArqBLUcvApTJcjFxSQBYUepjj1yF0/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/#pricing">Thinkst Canary</a></li><li><a title="Live updates: US and Israel strike Iran" rel="nofollow" href="https://apnews.com/live/live-updates-israel-iran-february-28-2026">Live updates: US and Israel strike Iran</a></li><li><a title="Episode 80: Hamid Kashfi on the situation in Iran" rel="nofollow" href="https://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela">Episode 80: Hamid Kashfi on the situation in Iran</a></li><li><a title="‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers" rel="nofollow" href="https://www.politico.com/news/2026/02/26/incoherent-hegseths-anthropic-ultimatum-confounds-ai-policymakers-00800135">‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers</a></li><li><a title="Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks" rel="nofollow" href="https://www.linkedin.com/pulse/anthropics-new-claude-ai-security-tool-wipes-out-17jje/">Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks</a></li><li><a title="CrowdStrike CEO responds to stock price hit" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:7431417202505064448/">CrowdStrike CEO responds to stock price hit</a></li><li><a title="Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets" rel="nofollow" href="https://www.state.gov/releases/office-of-the-spokesperson/2026/02/designation-of-russia-based-zero-day-exploits-broker-and-affiliates-for-theft-of-u-s-trade-secrets/">Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets</a></li><li><a title="Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools " rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools </a></li><li><a title="Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison" rel="nofollow" href="https://www.zetter-zeroday.com/trenchant-exec-who-sold-his-employers-zero-day-exploits-to-russian-buyer-sentenced-to-7-years-in-prison/">Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison</a></li><li><a title="AWS says AI-augmented threat actor accesses FortiGate devices at scale" rel="nofollow" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AWS says AI-augmented threat actor accesses FortiGate devices at scale</a></li><li><a title="Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" rel="nofollow" href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Active exploitation of Cisco Catalyst SD-WAN by UAT-8616</a></li><li><a title="Anthropic Claud Code Security" rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claud Code Security</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></li><li><a title="iPhone and iPad approved to handle classified NATO information" rel="nofollow" href="https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/">iPhone and iPad approved to handle classified NATO information</a></li><li><a title="Fortinet Achieves Certification for Secure Product Development" rel="nofollow" href="https://www.fortinet.com/blog/operational-technology/fortinet-achieves-iec-62443-4-1-ml2-certification-for-secure-product-development">Fortinet Achieves Certification for Secure Product Development</a></li><li><a title="Cisco SD-WAN threat hunting guide" rel="nofollow" href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Cisco SD-WAN threat hunting guide</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1pVVw2L0YShpPy1ArqBLUcvApTJcjFxSQBYUepjj1yF0/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/#pricing">Thinkst Canary</a></li><li><a title="Live updates: US and Israel strike Iran" rel="nofollow" href="https://apnews.com/live/live-updates-israel-iran-february-28-2026">Live updates: US and Israel strike Iran</a></li><li><a title="Episode 80: Hamid Kashfi on the situation in Iran" rel="nofollow" href="https://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela">Episode 80: Hamid Kashfi on the situation in Iran</a></li><li><a title="‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers" rel="nofollow" href="https://www.politico.com/news/2026/02/26/incoherent-hegseths-anthropic-ultimatum-confounds-ai-policymakers-00800135">‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers</a></li><li><a title="Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks" rel="nofollow" href="https://www.linkedin.com/pulse/anthropics-new-claude-ai-security-tool-wipes-out-17jje/">Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks</a></li><li><a title="CrowdStrike CEO responds to stock price hit" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:7431417202505064448/">CrowdStrike CEO responds to stock price hit</a></li><li><a title="Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets" rel="nofollow" href="https://www.state.gov/releases/office-of-the-spokesperson/2026/02/designation-of-russia-based-zero-day-exploits-broker-and-affiliates-for-theft-of-u-s-trade-secrets/">Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets</a></li><li><a title="Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools " rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools </a></li><li><a title="Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison" rel="nofollow" href="https://www.zetter-zeroday.com/trenchant-exec-who-sold-his-employers-zero-day-exploits-to-russian-buyer-sentenced-to-7-years-in-prison/">Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison</a></li><li><a title="AWS says AI-augmented threat actor accesses FortiGate devices at scale" rel="nofollow" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AWS says AI-augmented threat actor accesses FortiGate devices at scale</a></li><li><a title="Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" rel="nofollow" href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Active exploitation of Cisco Catalyst SD-WAN by UAT-8616</a></li><li><a title="Anthropic Claud Code Security" rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claud Code Security</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></li><li><a title="iPhone and iPad approved to handle classified NATO information" rel="nofollow" href="https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/">iPhone and iPad approved to handle classified NATO information</a></li><li><a title="Fortinet Achieves Certification for Secure Product Development" rel="nofollow" href="https://www.fortinet.com/blog/operational-technology/fortinet-achieves-iec-62443-4-1-ml2-certification-for-secure-product-development">Fortinet Achieves Certification for Secure Product Development</a></li><li><a title="Cisco SD-WAN threat hunting guide" rel="nofollow" href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Cisco SD-WAN threat hunting guide</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Hamid Kashfi on the situation in Iran; Did cyber cause Venezuela blackouts?</title>
  <link>http://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela</link>
  <guid isPermaLink="false">e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7</guid>
  <pubDate>Fri, 09 Jan 2026 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7.mp3" length="103702632" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 80: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  

Plus, did cyber make the lights go out in Venezuela? 

Cast: Hamid Kashfi, Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>2:13:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7/cover.jpg?v=1"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 80: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  
Plus, did cyber make the lights go out in Venezuela? 
Cast: Hamid Kashfi (https://twitter.com/hkashfi), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Israel, Charming Kitten, KittenBusters, Hamid Kashfi, Venezuela, hacktivism, cyberwar, kinetic, blackout, CIA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11KT2hDzyOlv3WdxyVfw9pjW2xV56p9dyACgqZenlDBk/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/">Sponsor: Material Security</a></li><li><a title="About Hamid Kashfi" rel="nofollow" href="https://www.darkcell.se/about">About Hamid Kashfi</a></li><li><a title="Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://securityconversations.com/episode/israel-iran-cyberwar-predatory-sparrow-vanishing-crypto-bank-hacks/">Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Venezuela strike marks a turning point for US cyber warfare" rel="nofollow" href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li><li><a title="KittenBusters | CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">KittenBusters | CharmingKitten</a></li><li><a title="Comprehensive Threat Intelligence Report: Charming Kitten" rel="nofollow" href="https://gist.github.com/Hamid-K#comprehensive-threat-intelligence-report-charming-kitten">Comprehensive Threat Intelligence Report: Charming Kitten</a></li><li><a title="Between Three Nerds: The evolution of Iranian cyber espionage" rel="nofollow" href="https://risky.biz/BTN148/">Between Three Nerds: The evolution of Iranian cyber espionage</a></li><li><a title="Trump says U.S. will hit Iran &quot;very hard&quot; if violence continues at protests" rel="nofollow" href="https://www.cbsnews.com/video/trump-says-us-will-hit-iran-very-hard-if-violence-continues-at-protests/">Trump says U.S. will hit Iran "very hard" if violence continues at protests</a></li><li><a title="Venezuelan oil giant PVDSA hit by cyberattack" rel="nofollow" href="https://www.techradar.com/pro/security/venezuelan-oil-giant-pvdsa-hit-by-cyberattack-amid-us-conflict">Venezuelan oil giant PVDSA hit by cyberattack</a></li><li><a title="CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term" rel="nofollow" href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia">CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term</a></li><li><a title="Antiy Report on cyber operations in Venezuela" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/US_military_cyber_ops_in_Venezuela_spectrum_speculation-analysis.html">Antiy Report on cyber operations in Venezuela</a></li><li><a title="Nationwide internet blackout reported in Iran" rel="nofollow" href="https://www.reuters.com/world/middle-east/iran-warns-suppliers-against-overpricing-or-hoarding-goods-2026-01-08/">Nationwide internet blackout reported in Iran</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11KT2hDzyOlv3WdxyVfw9pjW2xV56p9dyACgqZenlDBk/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/">Sponsor: Material Security</a></li><li><a title="About Hamid Kashfi" rel="nofollow" href="https://www.darkcell.se/about">About Hamid Kashfi</a></li><li><a title="Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://securityconversations.com/episode/israel-iran-cyberwar-predatory-sparrow-vanishing-crypto-bank-hacks/">Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Venezuela strike marks a turning point for US cyber warfare" rel="nofollow" href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li><li><a title="KittenBusters | CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">KittenBusters | CharmingKitten</a></li><li><a title="Comprehensive Threat Intelligence Report: Charming Kitten" rel="nofollow" href="https://gist.github.com/Hamid-K#comprehensive-threat-intelligence-report-charming-kitten">Comprehensive Threat Intelligence Report: Charming Kitten</a></li><li><a title="Between Three Nerds: The evolution of Iranian cyber espionage" rel="nofollow" href="https://risky.biz/BTN148/">Between Three Nerds: The evolution of Iranian cyber espionage</a></li><li><a title="Trump says U.S. will hit Iran &quot;very hard&quot; if violence continues at protests" rel="nofollow" href="https://www.cbsnews.com/video/trump-says-us-will-hit-iran-very-hard-if-violence-continues-at-protests/">Trump says U.S. will hit Iran "very hard" if violence continues at protests</a></li><li><a title="Venezuelan oil giant PVDSA hit by cyberattack" rel="nofollow" href="https://www.techradar.com/pro/security/venezuelan-oil-giant-pvdsa-hit-by-cyberattack-amid-us-conflict">Venezuelan oil giant PVDSA hit by cyberattack</a></li><li><a title="CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term" rel="nofollow" href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia">CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term</a></li><li><a title="Antiy Report on cyber operations in Venezuela" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/US_military_cyber_ops_in_Venezuela_spectrum_speculation-analysis.html">Antiy Report on cyber operations in Venezuela</a></li><li><a title="Nationwide internet blackout reported in Iran" rel="nofollow" href="https://www.reuters.com/world/middle-east/iran-warns-suppliers-against-overpricing-or-hoarding-goods-2026-01-08/">Nationwide internet blackout reported in Iran</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’</title>
  <link>http://securityconversations.fireside.fm/train-brakes-gru-sanctions-wagner-telegram-digital-escorts</link>
  <guid isPermaLink="false">c52fc482-8ee7-498e-adeb-8e3584f74824</guid>
  <pubDate>Fri, 18 Jul 2025 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c52fc482-8ee7-498e-adeb-8e3584f74824.mp3" length="86833367" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.

Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>1:48:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c52fc482-8ee7-498e-adeb-8e3584f74824/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 54:  Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.
Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Russia, NoName057(16), LABScon, UK sanctions, GRU, Wagner, ICC, railroad, trains, ICS, AI, OpenAI, Microsoft, China</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 54</strong>:  Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.</p>

<p>Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1GBR7FpP8x6DamPjUA_YKRT1QJ3PeH5K_lFwib1XmeA0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Europol targets NoName057(16) pro-Russian cybercrime network" rel="nofollow" href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network">Europol targets NoName057(16) pro-Russian cybercrime network</a></li><li><a title="Europe&#39;s most wanted list" rel="nofollow" href="https://eumostwanted.eu/">Europe's most wanted list</a></li><li><a title="UK sanctions Russian spies linked to Mariupol strikes" rel="nofollow" href="https://www.politico.eu/article/uk-sanctions-russian-spies-mariupol-strikes/">UK sanctions Russian spies linked to Mariupol strikes</a></li><li><a title="Profile: GRU cyber and hybrid threat operations" rel="nofollow" href="https://www.gov.uk/government/publications/profile-gru-cyber-and-hybrid-threat-operations">Profile: GRU cyber and hybrid threat operations</a></li><li><a title="Lindsay Freeman: War Crimes for Fun and Profit" rel="nofollow" href="https://www.lawfaremedia.org/article/war-crimes-for-fun-and-profit">Lindsay Freeman: War Crimes for Fun and Profit</a></li><li><a title="Lindsay Freeman bio" rel="nofollow" href="https://www.lawfaremedia.org/contributors/lfreeman">Lindsay Freeman bio</a></li><li><a title="CISA: End-of-Train and Head-of-Train Remote Linking Protocol" rel="nofollow" href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10">CISA: End-of-Train and Head-of-Train Remote Linking Protocol</a></li><li><a title="Background of train vulnerability (CVE-2025-1727)" rel="nofollow" href="https://x.com/midwestneil/status/1943708133421101446">Background of train vulnerability (CVE-2025-1727)</a></li><li><a title="ProPublica on Microsoft “Digital Escorts”" rel="nofollow" href="https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers">ProPublica on Microsoft “Digital Escorts”</a></li><li><a title="Google’s Big Sleep AI bug-finding claims" rel="nofollow" href="https://blog.google/technology/safety-security/cybersecurity-updates-summer-2025/">Google’s Big Sleep AI bug-finding claims</a></li><li><a title="EchoLeak (CVE-2025-32711)" rel="nofollow" href="https://www.trendmicro.com/en_us/research/25/g/preventing-zero-click-ai-threats-insights-from-echoleak.html">EchoLeak (CVE-2025-32711)</a></li><li><a title="Russian vodka producer reports disruptions after ransomware attack" rel="nofollow" href="https://therecord.media/novabev-russia-vodka-maker-ransomware-attack">Russian vodka producer reports disruptions after ransomware attack</a></li><li><a title="Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer" rel="nofollow" href="https://prm.ua/en/ukrainian-hackers-destroyed-the-it-infrastructure-of-a-russian-drone-manufacturer-what-is-known/">Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer</a></li><li><a title="Another exploited Google Chrome zero-day" rel="nofollow" href="https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html">Another exploited Google Chrome zero-day</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 54</strong>:  Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.</p>

<p>Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1GBR7FpP8x6DamPjUA_YKRT1QJ3PeH5K_lFwib1XmeA0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Europol targets NoName057(16) pro-Russian cybercrime network" rel="nofollow" href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network">Europol targets NoName057(16) pro-Russian cybercrime network</a></li><li><a title="Europe&#39;s most wanted list" rel="nofollow" href="https://eumostwanted.eu/">Europe's most wanted list</a></li><li><a title="UK sanctions Russian spies linked to Mariupol strikes" rel="nofollow" href="https://www.politico.eu/article/uk-sanctions-russian-spies-mariupol-strikes/">UK sanctions Russian spies linked to Mariupol strikes</a></li><li><a title="Profile: GRU cyber and hybrid threat operations" rel="nofollow" href="https://www.gov.uk/government/publications/profile-gru-cyber-and-hybrid-threat-operations">Profile: GRU cyber and hybrid threat operations</a></li><li><a title="Lindsay Freeman: War Crimes for Fun and Profit" rel="nofollow" href="https://www.lawfaremedia.org/article/war-crimes-for-fun-and-profit">Lindsay Freeman: War Crimes for Fun and Profit</a></li><li><a title="Lindsay Freeman bio" rel="nofollow" href="https://www.lawfaremedia.org/contributors/lfreeman">Lindsay Freeman bio</a></li><li><a title="CISA: End-of-Train and Head-of-Train Remote Linking Protocol" rel="nofollow" href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10">CISA: End-of-Train and Head-of-Train Remote Linking Protocol</a></li><li><a title="Background of train vulnerability (CVE-2025-1727)" rel="nofollow" href="https://x.com/midwestneil/status/1943708133421101446">Background of train vulnerability (CVE-2025-1727)</a></li><li><a title="ProPublica on Microsoft “Digital Escorts”" rel="nofollow" href="https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers">ProPublica on Microsoft “Digital Escorts”</a></li><li><a title="Google’s Big Sleep AI bug-finding claims" rel="nofollow" href="https://blog.google/technology/safety-security/cybersecurity-updates-summer-2025/">Google’s Big Sleep AI bug-finding claims</a></li><li><a title="EchoLeak (CVE-2025-32711)" rel="nofollow" href="https://www.trendmicro.com/en_us/research/25/g/preventing-zero-click-ai-threats-insights-from-echoleak.html">EchoLeak (CVE-2025-32711)</a></li><li><a title="Russian vodka producer reports disruptions after ransomware attack" rel="nofollow" href="https://therecord.media/novabev-russia-vodka-maker-ransomware-attack">Russian vodka producer reports disruptions after ransomware attack</a></li><li><a title="Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer" rel="nofollow" href="https://prm.ua/en/ukrainian-hackers-destroyed-the-it-infrastructure-of-a-russian-drone-manufacturer-what-is-known/">Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer</a></li><li><a title="Another exploited Google Chrome zero-day" rel="nofollow" href="https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html">Another exploited Google Chrome zero-day</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks</title>
  <link>http://securityconversations.fireside.fm/cyberwar-and-vanishing-bitcoins</link>
  <guid isPermaLink="false">01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68</guid>
  <pubDate>Fri, 20 Jun 2025 02:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68.mp3" length="144334262" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.

Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.

Cast: Hamid Kashfi, Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine. </itunes:subtitle>
  <itunes:duration>3:07:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.
Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.
Cast: Hamid Kashfi (https://twitter.com/hkashfi),  Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Israel, Bitcoin, Predatory Sparrow, Bitcoin, Novitex, nuclear, Stuxnet, drone swarms, autonomous warfare</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1yKeeXGR_b7gfGWwIVv_dV5RmIFCrYAZQs5BUMClyFtU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Pro-Israel hackers take credit for cyberattack on Iran&#39;s Bank Sepah" rel="nofollow" href="https://www.axios.com/2025/06/17/iran-bank-sepah-cyberattack-israel">Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah</a></li><li><a title="Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War" rel="nofollow" href="https://www.securityweek.com/predatory-sparrow-burns-90-million-on-iranian-crypto-exchange-in-cyber-shadow-war/">Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War</a></li><li><a title="Codebreakers and Predatory Sparrow" rel="nofollow" href="https://x.com/hkashfi/status/1934898014658654226?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Codebreakers and Predatory Sparrow</a></li><li><a title="Iranian Exchange Nobitex: The $90M Exploit" rel="nofollow" href="https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/">Iranian Exchange Nobitex: The $90M Exploit</a></li><li><a title="Iranian newspaper: Defense system was hacked" rel="nofollow" href="https://www.iranintl.com/fa/202506150578">Iranian newspaper: Defense system was hacked</a></li><li><a title="Iranian state TV shows footage of Israeli drone" rel="nofollow" href="https://www.cnn.com/2025/06/18/world/video/iran-state-tv-israel-drone-ldn-digvid">Iranian state TV shows footage of Israeli drone</a></li><li><a title="Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks</a></li><li><a title="Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy" rel="nofollow" href="https://archive.ph/cCMt9">Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Three Buddy Problem LIVE" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem LIVE</a></li><li><a title="Hamid Kashfi: The curious case of Predatory Sparrow" rel="nofollow" href="https://www.darkcell.se/sparrows">Hamid Kashfi: The curious case of Predatory Sparrow</a></li><li><a title="Glasshouse episode with Hamid Kashfi" rel="nofollow" href="https://www.youtube.com/watch?v=z05lKD0R5jo&amp;ab_channel=TheGlasshouseCenter">Glasshouse episode with Hamid Kashfi</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1yKeeXGR_b7gfGWwIVv_dV5RmIFCrYAZQs5BUMClyFtU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Pro-Israel hackers take credit for cyberattack on Iran&#39;s Bank Sepah" rel="nofollow" href="https://www.axios.com/2025/06/17/iran-bank-sepah-cyberattack-israel">Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah</a></li><li><a title="Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War" rel="nofollow" href="https://www.securityweek.com/predatory-sparrow-burns-90-million-on-iranian-crypto-exchange-in-cyber-shadow-war/">Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War</a></li><li><a title="Codebreakers and Predatory Sparrow" rel="nofollow" href="https://x.com/hkashfi/status/1934898014658654226?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Codebreakers and Predatory Sparrow</a></li><li><a title="Iranian Exchange Nobitex: The $90M Exploit" rel="nofollow" href="https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/">Iranian Exchange Nobitex: The $90M Exploit</a></li><li><a title="Iranian newspaper: Defense system was hacked" rel="nofollow" href="https://www.iranintl.com/fa/202506150578">Iranian newspaper: Defense system was hacked</a></li><li><a title="Iranian state TV shows footage of Israeli drone" rel="nofollow" href="https://www.cnn.com/2025/06/18/world/video/iran-state-tv-israel-drone-ldn-digvid">Iranian state TV shows footage of Israeli drone</a></li><li><a title="Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks</a></li><li><a title="Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy" rel="nofollow" href="https://archive.ph/cCMt9">Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Three Buddy Problem LIVE" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem LIVE</a></li><li><a title="Hamid Kashfi: The curious case of Predatory Sparrow" rel="nofollow" href="https://www.darkcell.se/sparrows">Hamid Kashfi: The curious case of Predatory Sparrow</a></li><li><a title="Glasshouse episode with Hamid Kashfi" rel="nofollow" href="https://www.youtube.com/watch?v=z05lKD0R5jo&amp;ab_channel=TheGlasshouseCenter">Glasshouse episode with Hamid Kashfi</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms</title>
  <link>http://securityconversations.fireside.fm/israel-iran-war-magnet-of-threats-drone-swarms</link>
  <guid isPermaLink="false">f5778cef-4751-4110-b0ec-6d82e3b4b504</guid>
  <pubDate>Fri, 13 Jun 2025 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f5778cef-4751-4110-b0ec-6d82e3b4b504.mp3" length="81069877" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.

Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>1:51:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f5778cef-4751-4110-b0ec-6d82e3b4b504/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.
Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Iran, Israel, Russia, Ukraine, nuclear, Stuxnet, drone swarms, autonomous warfare, magnet of threats, zero-day, SentinelOne</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 50</strong>: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel&#39;s Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.</p>

<p>Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1tbYrbhOmz1LKRzB1TBkoRds50jCwZRGHMsMBnwTl3nc/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Israel-Iran war breaks out" rel="nofollow" href="https://www.bbc.com/news/live/c93ydeqyq71t">Israel-Iran war breaks out</a></li><li><a title="&#39;The magnet of threats&#39;" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/spy-wars-how-nation-state-backed-threat-actors-steal-from-and-copy-each-other">'The magnet of threats'</a></li><li><a title="Mossad set up drone swarm base in Iran " rel="nofollow" href="https://www.timesofisrael.com/liveblog_entry/mossad-set-up-a-drone-base-in-iran-uavs-were-activated-overnight-to-strike-surface-to-surface-missile-launchers-aimed-at-israel/">Mossad set up drone swarm base in Iran </a></li><li><a title="Stealth Falcon&#39;s Exploit of Microsoft Zero Day " rel="nofollow" href="https://research.checkpoint.com/2025/stealth-falcon-zero-day/">Stealth Falcon's Exploit of Microsoft Zero Day </a></li><li><a title="CVE-2025-33053 - WebDAV remote code execution" rel="nofollow" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053">CVE-2025-33053 - WebDAV remote code execution</a></li><li><a title="CISA, Microsoft warn of Windows zero-day " rel="nofollow" href="https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org">CISA, Microsoft warn of Windows zero-day </a></li><li><a title="China-nexus Threat actors target SentinelOne  " rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus Threat actors target SentinelOne  </a></li><li><a title="Chinese Espionage Crews Circle SentinelOne" rel="nofollow" href="https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/">Chinese Espionage Crews Circle SentinelOne</a></li><li><a title="Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab" rel="nofollow" href="https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/">Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab</a></li><li><a title="Meta and Yandex are de-anonymizing Android users’ web browsing identifiers" rel="nofollow" href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/">Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</a></li><li><a title="Dreadnode Offensive AI Conference" rel="nofollow" href="https://www.offensiveaicon.com/">Dreadnode Offensive AI Conference</a></li><li><a title="LABScon Call for Papers" rel="nofollow" href="https://www.labscon.io/cfp/">LABScon Call for Papers</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 50</strong>: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel&#39;s Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.</p>

<p>Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1tbYrbhOmz1LKRzB1TBkoRds50jCwZRGHMsMBnwTl3nc/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Israel-Iran war breaks out" rel="nofollow" href="https://www.bbc.com/news/live/c93ydeqyq71t">Israel-Iran war breaks out</a></li><li><a title="&#39;The magnet of threats&#39;" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/spy-wars-how-nation-state-backed-threat-actors-steal-from-and-copy-each-other">'The magnet of threats'</a></li><li><a title="Mossad set up drone swarm base in Iran " rel="nofollow" href="https://www.timesofisrael.com/liveblog_entry/mossad-set-up-a-drone-base-in-iran-uavs-were-activated-overnight-to-strike-surface-to-surface-missile-launchers-aimed-at-israel/">Mossad set up drone swarm base in Iran </a></li><li><a title="Stealth Falcon&#39;s Exploit of Microsoft Zero Day " rel="nofollow" href="https://research.checkpoint.com/2025/stealth-falcon-zero-day/">Stealth Falcon's Exploit of Microsoft Zero Day </a></li><li><a title="CVE-2025-33053 - WebDAV remote code execution" rel="nofollow" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053">CVE-2025-33053 - WebDAV remote code execution</a></li><li><a title="CISA, Microsoft warn of Windows zero-day " rel="nofollow" href="https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org">CISA, Microsoft warn of Windows zero-day </a></li><li><a title="China-nexus Threat actors target SentinelOne  " rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus Threat actors target SentinelOne  </a></li><li><a title="Chinese Espionage Crews Circle SentinelOne" rel="nofollow" href="https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/">Chinese Espionage Crews Circle SentinelOne</a></li><li><a title="Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab" rel="nofollow" href="https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/">Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab</a></li><li><a title="Meta and Yandex are de-anonymizing Android users’ web browsing identifiers" rel="nofollow" href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/">Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</a></li><li><a title="Dreadnode Offensive AI Conference" rel="nofollow" href="https://www.offensiveaicon.com/">Dreadnode Offensive AI Conference</a></li><li><a title="LABScon Call for Papers" rel="nofollow" href="https://www.labscon.io/cfp/">LABScon Call for Papers</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep7: Crowd2K and the kernel, PKFail supply chain failures, Paris trains sabotage and Russian Olympic attacks</title>
  <link>http://securityconversations.fireside.fm/tbp-ep7</link>
  <guid isPermaLink="false">644134aa-4795-434a-8b2d-9a748cab7561</guid>
  <pubDate>Fri, 02 Aug 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/644134aa-4795-434a-8b2d-9a748cab7561.mp3" length="66162188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 7:  In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.

The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:10:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/644134aa-4795-434a-8b2d-9a748cab7561/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 7:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.
The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.
Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>Microsoft, CrowdStrike, Windows kernel, Russia, cyberwar, Dan Geer, PKFail, secure boot bypass, software liability, infrastructure attacks, Olympics, prisoner exchange, Stuxnet</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Xbor_CopwaQiZpInKRXNnyf5CF80bInYP1Yvl_2-wQ0/edit?usp=sharing">Episode Transcript</a></li><li><a title="Microsoft VP David Weston on CrowdStrike issue" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/">Microsoft VP David Weston on CrowdStrike issue</a></li><li><a title="Delta seeking damages from CrowdStrike, Microsoft" rel="nofollow" href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html">Delta seeking damages from CrowdStrike, Microsoft</a></li><li><a title="Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme" rel="nofollow" href="https://www.securityweek.com/wealthy-russian-with-kremlin-ties-gets-9-years-in-prison-for-hacking-and-insider-trading-scheme/">Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme</a></li><li><a title="Industroyer" rel="nofollow" href="https://en.wikipedia.org/wiki/Industroyer">Industroyer</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon</a></li><li><a title="LABScon Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers</a></li><li><a title="Livestream from DEFCON 32" rel="nofollow" href="https://bishopfox.com/defcon-32-livestream">Livestream from DEFCON 32</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Xbor_CopwaQiZpInKRXNnyf5CF80bInYP1Yvl_2-wQ0/edit?usp=sharing">Episode Transcript</a></li><li><a title="Microsoft VP David Weston on CrowdStrike issue" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/">Microsoft VP David Weston on CrowdStrike issue</a></li><li><a title="Delta seeking damages from CrowdStrike, Microsoft" rel="nofollow" href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html">Delta seeking damages from CrowdStrike, Microsoft</a></li><li><a title="Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme" rel="nofollow" href="https://www.securityweek.com/wealthy-russian-with-kremlin-ties-gets-9-years-in-prison-for-hacking-and-insider-trading-scheme/">Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme</a></li><li><a title="Industroyer" rel="nofollow" href="https://en.wikipedia.org/wiki/Industroyer">Industroyer</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon</a></li><li><a title="LABScon Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers</a></li><li><a title="Livestream from DEFCON 32" rel="nofollow" href="https://bishopfox.com/defcon-32-livestream">Livestream from DEFCON 32</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
