<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 22:10:38 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Drone”</title>
    <link>https://securityconversations.fireside.fm/tags/drone</link>
    <pubDate>Thu, 10 Jul 2025 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>How did China get Microsoft's zero-day exploits?</title>
  <link>http://securityconversations.fireside.fm/hafnium-hacker-arrested-china-microsoft-zerodays</link>
  <guid isPermaLink="false">05ea91d2-dd79-43f9-a534-4b641cacfe9b</guid>
  <pubDate>Thu, 10 Jul 2025 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/05ea91d2-dd79-43f9-a534-4b641cacfe9b.mp3" length="88964480" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 53:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister? 

Plus, China's massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>1:49:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/05ea91d2-dd79-43f9-a534-4b641cacfe9b/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 53:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?
Plus, China's massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Russia, China, Ukraine, HAFNIUM, Microsoft, Zero-day, Orange Tsai, drones, thecom, ransomware, Exchange</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 53</strong>:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?</p>

<p>Plus, China&#39;s massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1XBzJY0yzS-1jzb7u4TIq0SKkGFCYalbYS15LdYX7a3o/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title=" US Gov: Prolific Chinese state-sponsored contract hacker arrested" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-arrest-prolific-chinese-state-sponsored-contract-hacker"> US Gov: Prolific Chinese state-sponsored contract hacker arrested</a></li><li><a title="Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits</a></li><li><a title="Microsoft Exchange Server Attack Timeline" rel="nofollow" href="https://unit42.paloaltonetworks.com/microsoft-exchange-server-attack-timeline/">Microsoft Exchange Server Attack Timeline</a></li><li><a title="YouTube: Orange Tsai on ProxyLogon" rel="nofollow" href="https://www.youtube.com/watch?v=5mqid-7zp8k&amp;ab_channel=DEFCONConference">YouTube: Orange Tsai on ProxyLogon</a></li><li><a title="Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/">Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace</a></li><li><a title="The Growing Role of Cyber Militias in China’s Network Warfare Force Structure" rel="nofollow" href="https://margin.re/mobilizing-cyber-power-the-growing-role-of-cyber-militias-in-chinas-network-warfare-force-structure-2/">The Growing Role of Cyber Militias in China’s Network Warfare Force Structure</a></li><li><a title="NCA arrest four for attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://www.nationalcrimeagency.gov.uk/news/retail-cyber-attacks-nca-arrest-four-for-attacks-on-m-s-co-op-and-harrods">NCA arrest four for attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op">Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Batavia spyware targeting Russian organizations" rel="nofollow" href="https://securelist.com/batavia-spyware-steals-data-from-russian-organizations/116866/">Batavia spyware targeting Russian organizations</a></li><li><a title="Chainalysis: First-ever crypto seizure in Greece" rel="nofollow" href="https://www.chainalysis.com/blog/greece-first-ever-crypto-seizure-bybit-hack-2025/">Chainalysis: First-ever crypto seizure in Greece</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a> &mdash; Three Buddy Problem discount code for training: CM25-3BUDDY</li><li><a title="LABScon 2025" rel="nofollow" href="https://labscon.io">LABScon 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 53</strong>:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?</p>

<p>Plus, China&#39;s massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1XBzJY0yzS-1jzb7u4TIq0SKkGFCYalbYS15LdYX7a3o/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title=" US Gov: Prolific Chinese state-sponsored contract hacker arrested" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-arrest-prolific-chinese-state-sponsored-contract-hacker"> US Gov: Prolific Chinese state-sponsored contract hacker arrested</a></li><li><a title="Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits</a></li><li><a title="Microsoft Exchange Server Attack Timeline" rel="nofollow" href="https://unit42.paloaltonetworks.com/microsoft-exchange-server-attack-timeline/">Microsoft Exchange Server Attack Timeline</a></li><li><a title="YouTube: Orange Tsai on ProxyLogon" rel="nofollow" href="https://www.youtube.com/watch?v=5mqid-7zp8k&amp;ab_channel=DEFCONConference">YouTube: Orange Tsai on ProxyLogon</a></li><li><a title="Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/">Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace</a></li><li><a title="The Growing Role of Cyber Militias in China’s Network Warfare Force Structure" rel="nofollow" href="https://margin.re/mobilizing-cyber-power-the-growing-role-of-cyber-militias-in-chinas-network-warfare-force-structure-2/">The Growing Role of Cyber Militias in China’s Network Warfare Force Structure</a></li><li><a title="NCA arrest four for attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://www.nationalcrimeagency.gov.uk/news/retail-cyber-attacks-nca-arrest-four-for-attacks-on-m-s-co-op-and-harrods">NCA arrest four for attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op">Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Batavia spyware targeting Russian organizations" rel="nofollow" href="https://securelist.com/batavia-spyware-steals-data-from-russian-organizations/116866/">Batavia spyware targeting Russian organizations</a></li><li><a title="Chainalysis: First-ever crypto seizure in Greece" rel="nofollow" href="https://www.chainalysis.com/blog/greece-first-ever-crypto-seizure-bybit-hack-2025/">Chainalysis: First-ever crypto seizure in Greece</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a> &mdash; Three Buddy Problem discount code for training: CM25-3BUDDY</li><li><a title="LABScon 2025" rel="nofollow" href="https://labscon.io">LABScon 2025</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
