<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 01:56:22 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Edr”</title>
    <link>https://securityconversations.fireside.fm/tags/edr</link>
    <pubDate>Sun, 03 Nov 2024 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela</title>
  <link>http://securityconversations.fireside.fm/tbp-ep19</link>
  <guid isPermaLink="false">afe08ad2-3625-4575-aaae-280d146e474c</guid>
  <pubDate>Sun, 03 Nov 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/afe08ad2-3625-4575-aaae-280d146e474c.mp3" length="89415224" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 19:  We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
  <itunes:duration>1:54:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/afe08ad2-3625-4575-aaae-280d146e474c/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 19:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Sophos, implants, firewall devices, appliances, China, Chengdu, CIA, Fortinet, Ivanti, Barracuda, India, Canada</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1U8q76wqVXIs9Sdc8vuqAr2S9CtknvnYryxS6l0IALv8/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivan Kwiatkowski: Threat intel truths inside" rel="nofollow" href="https://blog.kwiatkowski.fr/threat-intel-truths-inside">Ivan Kwiatkowski: Threat intel truths inside</a></li><li><a title="JAG-S LABScon keynote" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">JAG-S LABScon keynote</a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers</a></li><li><a title="Sophos Pacific Rim report" rel="nofollow" href="https://www.sophos.com/en-us/content/pacific-rim">Sophos Pacific Rim report</a></li><li><a title="NCSC details ‘Pygmy Goat’ network backdoor" rel="nofollow" href="https://www.securityweek.com/ncsc-details-pygmy-goat-backdoor-planted-on-hacked-sophos-firewall-devices/">NCSC details ‘Pygmy Goat’ network backdoor</a></li><li><a title="NCSC &#39;Pygmy Goat&#39; report" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/pygmy-goat/ncsc-mar-pygmy-goat.pdf">NCSC 'Pygmy Goat' report</a></li><li><a title="Massive hack-for-hire scandal rocks Italian political elites – POLITICO" rel="nofollow" href="https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/">Massive hack-for-hire scandal rocks Italian political elites – POLITICO</a></li><li><a title="Vatican, Israel implicated in Italy hacking scandal" rel="nofollow" href="https://www.politico.eu/article/vatican-israel-italian-hacking-scandal-uk-lithuania-equalize/">Vatican, Israel implicated in Italy hacking scandal</a></li><li><a title="Wired on CIA hack of Venezuela military payroll system" rel="nofollow" href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/?utm_medium=social&amp;mbid=social_twitter&amp;utm_social-type=owned&amp;utm_source=twitter&amp;utm_brand=wired">Wired on CIA hack of Venezuela military payroll system</a></li><li><a title="Is Now on VT!" rel="nofollow" href="https://x.com/Now_on_VT">Is Now on VT!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1U8q76wqVXIs9Sdc8vuqAr2S9CtknvnYryxS6l0IALv8/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivan Kwiatkowski: Threat intel truths inside" rel="nofollow" href="https://blog.kwiatkowski.fr/threat-intel-truths-inside">Ivan Kwiatkowski: Threat intel truths inside</a></li><li><a title="JAG-S LABScon keynote" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">JAG-S LABScon keynote</a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers</a></li><li><a title="Sophos Pacific Rim report" rel="nofollow" href="https://www.sophos.com/en-us/content/pacific-rim">Sophos Pacific Rim report</a></li><li><a title="NCSC details ‘Pygmy Goat’ network backdoor" rel="nofollow" href="https://www.securityweek.com/ncsc-details-pygmy-goat-backdoor-planted-on-hacked-sophos-firewall-devices/">NCSC details ‘Pygmy Goat’ network backdoor</a></li><li><a title="NCSC &#39;Pygmy Goat&#39; report" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/pygmy-goat/ncsc-mar-pygmy-goat.pdf">NCSC 'Pygmy Goat' report</a></li><li><a title="Massive hack-for-hire scandal rocks Italian political elites – POLITICO" rel="nofollow" href="https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/">Massive hack-for-hire scandal rocks Italian political elites – POLITICO</a></li><li><a title="Vatican, Israel implicated in Italy hacking scandal" rel="nofollow" href="https://www.politico.eu/article/vatican-israel-italian-hacking-scandal-uk-lithuania-equalize/">Vatican, Israel implicated in Italy hacking scandal</a></li><li><a title="Wired on CIA hack of Venezuela military payroll system" rel="nofollow" href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/?utm_medium=social&amp;mbid=social_twitter&amp;utm_social-type=owned&amp;utm_source=twitter&amp;utm_brand=wired">Wired on CIA hack of Venezuela military payroll system</a></li><li><a title="Is Now on VT!" rel="nofollow" href="https://x.com/Now_on_VT">Is Now on VT!</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?</title>
  <link>http://securityconversations.fireside.fm/tbp-ep6</link>
  <guid isPermaLink="false">874c67ec-26cd-4395-8713-df1b58629041</guid>
  <pubDate>Fri, 26 Jul 2024 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/874c67ec-26cd-4395-8713-df1b58629041.mp3" length="71350827" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 6:  As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.

Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:16:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/874c67ec-26cd-4395-8713-df1b58629041/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 6:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.
Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>CrowdStrike, Windows, BSOD, detection update, testing, validation, EDR, detection, APT45, groups, IOCs, North Korea, NSO lawsuit, surveillance industry, exploits, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep5: CrowdStrike's faulty update shuts down global networks</title>
  <link>http://securityconversations.fireside.fm/tbp-ep5</link>
  <guid isPermaLink="false">85b284cc-9ab4-4a38-8a4e-9d6439345bcb</guid>
  <pubDate>Fri, 19 Jul 2024 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/85b284cc-9ab4-4a38-8a4e-9d6439345bcb.mp3" length="54810148" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 5:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.

We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.

Plus, some news on upcoming keynote speakers at LabsCon 2024.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>59:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/85b284cc-9ab4-4a38-8a4e-9d6439345bcb/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 5:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.
We also discuss the AT&amp;amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.
Plus, some news on upcoming keynote speakers at LabsCon 2024.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>CrowdStrike, software update, blue screens, Microsoft 365 outage, AT&amp;T breach, EDR, ransomware, stolen data, cybersecurity, AT&amp;T data breach, FBI, password-protected phone, zero-click exploits, APT 41, NullBulge, LabsCon,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 5</strong>:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.</p>

<p>We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.</p>

<p>Plus, some news on upcoming keynote speakers at LabsCon 2024.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (AI-generated, unedited)" rel="nofollow" href="https://docs.google.com/document/d/11C0JmY7o58yPUJs7jutahdmV1-ZI-fv6bL-QhoCW8ww/edit?usp=sharing">Transcript (AI-generated, unedited)</a></li><li><a title="CrowdStrike Statement on Falcon Content Update for Windows Hosts" rel="nofollow" href="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/">CrowdStrike Statement on Falcon Content Update for Windows Hosts</a></li><li><a title="Microsoft-CrowdStrike blackout FAQ" rel="nofollow" href="https://www.cnbc.com/2024/07/19/latest-live-updates-on-a-major-it-outage-spreading-worldwide.html">Microsoft-CrowdStrike blackout FAQ</a></li><li><a title="Bad CrowdStrike Update Linked to Major IT Outages Worldwide" rel="nofollow" href="https://www.securityweek.com/major-outages-worldwide-linked-to-bsod-caused-by-bad-crowdstrike-update/">Bad CrowdStrike Update Linked to Major IT Outages Worldwide</a></li><li><a title="CrowdStrike CEO George Kurtz statement on Twitter" rel="nofollow" href="https://x.com/george_kurtz/status/1814235001745027317?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">CrowdStrike CEO George Kurtz statement on Twitter</a></li><li><a title="AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records" rel="nofollow" href="https://archive.ph/hjbYB">AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records</a></li><li><a title="T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’" rel="nofollow" href="https://archive.ph/fClfV">T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 5</strong>:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.</p>

<p>We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.</p>

<p>Plus, some news on upcoming keynote speakers at LabsCon 2024.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (AI-generated, unedited)" rel="nofollow" href="https://docs.google.com/document/d/11C0JmY7o58yPUJs7jutahdmV1-ZI-fv6bL-QhoCW8ww/edit?usp=sharing">Transcript (AI-generated, unedited)</a></li><li><a title="CrowdStrike Statement on Falcon Content Update for Windows Hosts" rel="nofollow" href="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/">CrowdStrike Statement on Falcon Content Update for Windows Hosts</a></li><li><a title="Microsoft-CrowdStrike blackout FAQ" rel="nofollow" href="https://www.cnbc.com/2024/07/19/latest-live-updates-on-a-major-it-outage-spreading-worldwide.html">Microsoft-CrowdStrike blackout FAQ</a></li><li><a title="Bad CrowdStrike Update Linked to Major IT Outages Worldwide" rel="nofollow" href="https://www.securityweek.com/major-outages-worldwide-linked-to-bsod-caused-by-bad-crowdstrike-update/">Bad CrowdStrike Update Linked to Major IT Outages Worldwide</a></li><li><a title="CrowdStrike CEO George Kurtz statement on Twitter" rel="nofollow" href="https://x.com/george_kurtz/status/1814235001745027317?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">CrowdStrike CEO George Kurtz statement on Twitter</a></li><li><a title="AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records" rel="nofollow" href="https://archive.ph/hjbYB">AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records</a></li><li><a title="T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’" rel="nofollow" href="https://archive.ph/fClfV">T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
