<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 20:13:26 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Cyberwarfare”</title>
    <link>https://securityconversations.fireside.fm/tags/cyberwarfare</link>
    <pubDate>Thu, 03 Jul 2025 15:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT</title>
  <link>http://securityconversations.fireside.fm/whos-hacking-who-ivanti-0days-france-night-eagle</link>
  <guid isPermaLink="false">b604bf91-d5a1-45a7-bd2e-223ecfeee15b</guid>
  <pubDate>Thu, 03 Jul 2025 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b604bf91-d5a1-45a7-bd2e-223ecfeee15b.mp3" length="77845642" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 52:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.

Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>1:34:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b604bf91-d5a1-45a7-bd2e-223ecfeee15b/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 52:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.
Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>France, ANSSI, Houken, Ivanti, zero-day, North Korea, fake IT workers, Scattered Spider, Chrome, Google, Salt Typhoon, Nobitex, Israel, Iran</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19xE1kF3peywdmaH9j5xEdCvLmspni0s6p68KY1laYhg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Houken: Seeking a path by living on the edge with zero-days" rel="nofollow" href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf">Houken: Seeking a path by living on the edge with zero-days</a></li><li><a title="China-nexus APTs recon on top-tier targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus APTs recon on top-tier targets</a></li><li><a title="French cybersecurity agency confirms government affected by Ivanti hacks" rel="nofollow" href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited">French cybersecurity agency confirms government affected by Ivanti hacks</a></li><li><a title="Top FBI cyber official: Salt Typhoon ‘largely contained’" rel="nofollow" href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/">Top FBI cyber official: Salt Typhoon ‘largely contained’</a></li><li><a title="Operation Blockbuster (Novetta)" rel="nofollow" href="https://www.usna.edu/CyberCenter/_files/documents/Operation-Blockbuster-Report.pdf">Operation Blockbuster (Novetta)</a></li><li><a title=" Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://www.youtube.com/watch?v=MKKzHseTUUQ&amp;t=5007s&amp;ab_channel=ThreeBuddyProblem"> Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure" rel="nofollow" href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure</a></li><li><a title="cisagov/thorium" rel="nofollow" href="https://github.com/cisagov/thorium">cisagov/thorium</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19xE1kF3peywdmaH9j5xEdCvLmspni0s6p68KY1laYhg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Houken: Seeking a path by living on the edge with zero-days" rel="nofollow" href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf">Houken: Seeking a path by living on the edge with zero-days</a></li><li><a title="China-nexus APTs recon on top-tier targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus APTs recon on top-tier targets</a></li><li><a title="French cybersecurity agency confirms government affected by Ivanti hacks" rel="nofollow" href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited">French cybersecurity agency confirms government affected by Ivanti hacks</a></li><li><a title="Top FBI cyber official: Salt Typhoon ‘largely contained’" rel="nofollow" href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/">Top FBI cyber official: Salt Typhoon ‘largely contained’</a></li><li><a title="Operation Blockbuster (Novetta)" rel="nofollow" href="https://www.usna.edu/CyberCenter/_files/documents/Operation-Blockbuster-Report.pdf">Operation Blockbuster (Novetta)</a></li><li><a title=" Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://www.youtube.com/watch?v=MKKzHseTUUQ&amp;t=5007s&amp;ab_channel=ThreeBuddyProblem"> Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure" rel="nofollow" href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure</a></li><li><a title="cisagov/thorium" rel="nofollow" href="https://github.com/cisagov/thorium">cisagov/thorium</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
