<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 10:11:00 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Deepfake”</title>
    <link>https://securityconversations.fireside.fm/tags/deepfake</link>
    <pubDate>Fri, 27 Dec 2024 11:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights</title>
  <link>http://securityconversations.fireside.fm/palo-alto-backdoor-cyberhaven-hack-year-review</link>
  <guid isPermaLink="false">55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903</guid>
  <pubDate>Fri, 27 Dec 2024 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903.mp3" length="91383420" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 27:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
  <itunes:duration>1:53:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 27:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>Sora, AI, deepfake, cybersecurity, Cyberhaven, browser extensions, malware, insider threats, ChatGPT, privacy, Chrome, data security, malware, cybersecurity, attribution, corporate responsibility, cyber operations, physical conflict, research, cybersecurity, malware, nation-state threats, drone technology, election interference, CSRB, research, cybersecurity challenges, global conflicts, cyber warfare</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1321LDAuU5PosOnXODrFvvXAx8TiTXr1kbtQZE1PhhLw/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor " rel="nofollow" href="https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf">LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor </a></li><li><a title="Palo Alto: Operation Lunar Peek" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/">Palo Alto: Operation Lunar Peek</a></li><li><a title="Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistence/">Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts</a></li><li><a title="“A Digital Prison”: Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/">“A Digital Prison”: Surveillance and the suppression of civil society in Serbia</a></li><li><a title="Cyberhaven breach reported. Employee phished and pushed malicious chrome extension" rel="nofollow" href="https://x.com/cstanley/status/1872365853318225931">Cyberhaven breach reported. Employee phished and pushed malicious chrome extension</a></li><li><a title="GRU 29155 doing cyber operations" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">GRU 29155 doing cyber operations</a></li><li><a title="How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar " rel="nofollow" href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar </a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days</a></li><li><a title="Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova&#39;s National Elections" rel="nofollow" href="https://blog.checkpoint.com/research/operation-middlefloor-unmasking-the-disinformation-campaign-targeting-moldovas-national-elections/">Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections</a></li><li><a title="NSPX30: A sophisticated AitM-enabled implant evolving since 2005" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/">NSPX30: A sophisticated AitM-enabled implant evolving since 2005</a></li><li><a title="backdoor in upstream xz/liblzma leading to ssh server compromise" rel="nofollow" href="https://seclists.org/oss-sec/2024/q1/268">backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a title="PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem" rel="nofollow" href="https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem">PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem</a></li><li><a title="The Tech Coup - How to Save Democracy from Silicon Valley" rel="nofollow" href="https://press.princeton.edu/books/hardcover/9780691241173/the-tech-coup?srsltid=AfmBOoq7pNBk27MtRxluxXHgYpx1hk2misTivpgZBRfkrplbw9t3q81i">The Tech Coup - How to Save Democracy from Silicon Valley</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1321LDAuU5PosOnXODrFvvXAx8TiTXr1kbtQZE1PhhLw/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor " rel="nofollow" href="https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf">LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor </a></li><li><a title="Palo Alto: Operation Lunar Peek" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/">Palo Alto: Operation Lunar Peek</a></li><li><a title="Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistence/">Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts</a></li><li><a title="“A Digital Prison”: Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/">“A Digital Prison”: Surveillance and the suppression of civil society in Serbia</a></li><li><a title="Cyberhaven breach reported. Employee phished and pushed malicious chrome extension" rel="nofollow" href="https://x.com/cstanley/status/1872365853318225931">Cyberhaven breach reported. Employee phished and pushed malicious chrome extension</a></li><li><a title="GRU 29155 doing cyber operations" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">GRU 29155 doing cyber operations</a></li><li><a title="How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar " rel="nofollow" href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar </a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days</a></li><li><a title="Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova&#39;s National Elections" rel="nofollow" href="https://blog.checkpoint.com/research/operation-middlefloor-unmasking-the-disinformation-campaign-targeting-moldovas-national-elections/">Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections</a></li><li><a title="NSPX30: A sophisticated AitM-enabled implant evolving since 2005" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/">NSPX30: A sophisticated AitM-enabled implant evolving since 2005</a></li><li><a title="backdoor in upstream xz/liblzma leading to ssh server compromise" rel="nofollow" href="https://seclists.org/oss-sec/2024/q1/268">backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a title="PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem" rel="nofollow" href="https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem">PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem</a></li><li><a title="The Tech Coup - How to Save Democracy from Silicon Valley" rel="nofollow" href="https://press.princeton.edu/books/hardcover/9780691241173/the-tech-coup?srsltid=AfmBOoq7pNBk27MtRxluxXHgYpx1hk2misTivpgZBRfkrplbw9t3q81i">The Tech Coup - How to Save Democracy from Silicon Valley</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
