<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 20:24:48 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Exploits”</title>
    <link>https://securityconversations.fireside.fm/tags/exploits</link>
    <pubDate>Thu, 03 Jul 2025 15:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT</title>
  <link>http://securityconversations.fireside.fm/whos-hacking-who-ivanti-0days-france-night-eagle</link>
  <guid isPermaLink="false">b604bf91-d5a1-45a7-bd2e-223ecfeee15b</guid>
  <pubDate>Thu, 03 Jul 2025 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b604bf91-d5a1-45a7-bd2e-223ecfeee15b.mp3" length="77845642" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 52:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.

Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>1:34:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b604bf91-d5a1-45a7-bd2e-223ecfeee15b/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 52:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.
Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>France, ANSSI, Houken, Ivanti, zero-day, North Korea, fake IT workers, Scattered Spider, Chrome, Google, Salt Typhoon, Nobitex, Israel, Iran</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19xE1kF3peywdmaH9j5xEdCvLmspni0s6p68KY1laYhg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Houken: Seeking a path by living on the edge with zero-days" rel="nofollow" href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf">Houken: Seeking a path by living on the edge with zero-days</a></li><li><a title="China-nexus APTs recon on top-tier targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus APTs recon on top-tier targets</a></li><li><a title="French cybersecurity agency confirms government affected by Ivanti hacks" rel="nofollow" href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited">French cybersecurity agency confirms government affected by Ivanti hacks</a></li><li><a title="Top FBI cyber official: Salt Typhoon ‘largely contained’" rel="nofollow" href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/">Top FBI cyber official: Salt Typhoon ‘largely contained’</a></li><li><a title="Operation Blockbuster (Novetta)" rel="nofollow" href="https://www.usna.edu/CyberCenter/_files/documents/Operation-Blockbuster-Report.pdf">Operation Blockbuster (Novetta)</a></li><li><a title=" Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://www.youtube.com/watch?v=MKKzHseTUUQ&amp;t=5007s&amp;ab_channel=ThreeBuddyProblem"> Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure" rel="nofollow" href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure</a></li><li><a title="cisagov/thorium" rel="nofollow" href="https://github.com/cisagov/thorium">cisagov/thorium</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19xE1kF3peywdmaH9j5xEdCvLmspni0s6p68KY1laYhg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Houken: Seeking a path by living on the edge with zero-days" rel="nofollow" href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf">Houken: Seeking a path by living on the edge with zero-days</a></li><li><a title="China-nexus APTs recon on top-tier targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus APTs recon on top-tier targets</a></li><li><a title="French cybersecurity agency confirms government affected by Ivanti hacks" rel="nofollow" href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited">French cybersecurity agency confirms government affected by Ivanti hacks</a></li><li><a title="Top FBI cyber official: Salt Typhoon ‘largely contained’" rel="nofollow" href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/">Top FBI cyber official: Salt Typhoon ‘largely contained’</a></li><li><a title="Operation Blockbuster (Novetta)" rel="nofollow" href="https://www.usna.edu/CyberCenter/_files/documents/Operation-Blockbuster-Report.pdf">Operation Blockbuster (Novetta)</a></li><li><a title=" Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://www.youtube.com/watch?v=MKKzHseTUUQ&amp;t=5007s&amp;ab_channel=ThreeBuddyProblem"> Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure" rel="nofollow" href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure</a></li><li><a title="cisagov/thorium" rel="nofollow" href="https://github.com/cisagov/thorium">cisagov/thorium</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Federico Kirschbaum on a life in the Argentina hacking scene</title>
  <link>http://securityconversations.fireside.fm/federico-kirschbaum-faraday-argentina-hacking</link>
  <guid isPermaLink="false">b66102f9-41e2-40e3-981c-48d2187a490d</guid>
  <pubDate>Wed, 19 Jul 2023 06:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b66102f9-41e2-40e3-981c-48d2187a490d.mp3" length="32506033" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Faraday chief executive Federico 'Fede' Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</itunes:subtitle>
  <itunes:duration>42:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b66102f9-41e2-40e3-981c-48d2187a490d/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Faraday chief executive Federico 'Fede' Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry. 
</description>
  <itunes:keywords>zero-day, exploits, argentina, ekoparty, core security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Faraday chief executive Federico &#39;Fede&#39; Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</p><p>Links:</p><ul><li><a title="Faraday at Black Hat 2023" rel="nofollow" href="https://faradaysec.com/our-tools-go-to-black-hat/">Faraday at Black Hat 2023</a></li><li><a title="Fede on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/fedek/">Fede on LinkedIn</a></li><li><a title="Federico Kirschbaum on Twitter" rel="nofollow" href="https://twitter.com/fede_k">Federico Kirschbaum on Twitter</a></li><li><a title="Ekoparty" rel="nofollow" href="https://ekoparty.org/">Ekoparty</a></li><li><a title="Padding Oracles Everywhere (Rizzo/Duong)" rel="nofollow" href="https://vimeo.com/15454510">Padding Oracles Everywhere (Rizzo/Duong)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Faraday chief executive Federico &#39;Fede&#39; Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</p><p>Links:</p><ul><li><a title="Faraday at Black Hat 2023" rel="nofollow" href="https://faradaysec.com/our-tools-go-to-black-hat/">Faraday at Black Hat 2023</a></li><li><a title="Fede on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/fedek/">Fede on LinkedIn</a></li><li><a title="Federico Kirschbaum on Twitter" rel="nofollow" href="https://twitter.com/fede_k">Federico Kirschbaum on Twitter</a></li><li><a title="Ekoparty" rel="nofollow" href="https://ekoparty.org/">Ekoparty</a></li><li><a title="Padding Oracles Everywhere (Rizzo/Duong)" rel="nofollow" href="https://vimeo.com/15454510">Padding Oracles Everywhere (Rizzo/Duong)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>JAG-S on big-game malware hunting and a very mysterious APT</title>
  <link>http://securityconversations.fireside.fm/juan-andres-guerrero-saade</link>
  <guid isPermaLink="false">eefa9c91-fd32-43f6-bd09-7ddedda38914</guid>
  <pubDate>Mon, 17 Oct 2022 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/eefa9c91-fd32-43f6-bd09-7ddedda38914.mp3" length="41028733" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>* Episode sponsors: [Binarly](https://binarly.io/) and [FwHunt](https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.

SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</itunes:subtitle>
  <itunes:duration>52:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/eefa9c91-fd32-43f6-bd09-7ddedda38914/cover.jpg?v=1"/>
  <description>Episode sponsors: Binarly (https://binarly.io/) and FwHunt (https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.
SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador. 
</description>
  <itunes:keywords>nation-state APTs, metador, sentinellabs, labscon, malware campaigns, cyberwar, cyber espionage, attribution</itunes:keywords>
  <content:encoded>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p><p>Links:</p><ul><li><a title="Report: The Mystery of Metador" rel="nofollow" href="https://assets.sentinelone.com/sentinellabs22/metador">Report: The Mystery of Metador</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://twitter.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Researchers Crowdsourcing Effort to Identify Mysterious Metador APT" rel="nofollow" href="https://www.securityweek.com/researchers-crowdsourcing-effort-identify-mysterious-metador-apt">Researchers Crowdsourcing Effort to Identify Mysterious Metador APT</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p><p>Links:</p><ul><li><a title="Report: The Mystery of Metador" rel="nofollow" href="https://assets.sentinelone.com/sentinellabs22/metador">Report: The Mystery of Metador</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://twitter.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Researchers Crowdsourcing Effort to Identify Mysterious Metador APT" rel="nofollow" href="https://www.securityweek.com/researchers-crowdsourcing-effort-identify-mysterious-metador-apt">Researchers Crowdsourcing Effort to Identify Mysterious Metador APT</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Project Zero's Maddie Stone on the surge in zero-day discoveries</title>
  <link>http://securityconversations.fireside.fm/maddie-stone-project-zero</link>
  <guid isPermaLink="false">97c47b7c-f218-4b1b-a4ae-1322852da212</guid>
  <pubDate>Tue, 10 May 2022 12:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97c47b7c-f218-4b1b-a4ae-1322852da212.mp3" length="30298830" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</itunes:subtitle>
  <itunes:duration>42:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97c47b7c-f218-4b1b-a4ae-1322852da212/cover.jpg?v=1"/>
  <description>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors. 
</description>
  <itunes:keywords>zero-day, exploits, project zero, google, memory safety, transparency, disclosure</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Shane Huntley on zero-days and the nation-state threat landscape</title>
  <link>http://securityconversations.fireside.fm/shane-huntley-google-tag</link>
  <guid isPermaLink="false">fb354ea5-acaf-443d-a97d-373e1adc92b0</guid>
  <pubDate>Mon, 04 Apr 2022 06:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fb354ea5-acaf-443d-a97d-373e1adc92b0.mp3" length="79196359" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</itunes:subtitle>
  <itunes:duration>40:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fb354ea5-acaf-443d-a97d-373e1adc92b0/cover.jpg?v=1"/>
  <description>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more... 
</description>
  <itunes:keywords>google, zero-day, nation-state, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Costin Raiu on the .gov mobile exploitation business</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-mobile-exploitation</link>
  <guid isPermaLink="false">e7355605-c0fe-41c9-b55d-6f2775d8cc86</guid>
  <pubDate>Thu, 23 Dec 2021 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e7355605-c0fe-41c9-b55d-6f2775d8cc86.mp3" length="39704215" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Global director of Kaspersky's GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</itunes:subtitle>
  <itunes:duration>41:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e7355605-c0fe-41c9-b55d-6f2775d8cc86/cover.jpg?v=1"/>
  <description>Global director of Kaspersky's GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem. 
</description>
  <itunes:keywords>zero-day, exploits, PSOAs, iOS malware, NSO Pegasus, Apple, Android</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p><p>Links:</p><ul><li><a title="Google Says NSO Pegasus Zero-Click &#39;Most Technically Sophisticated Exploit Ever Seen&#39;" rel="nofollow" href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen">Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit</a></li><li><a title="The Million Dollar Dissident: NSO Group&#39;s iPhone Zero-Days" rel="nofollow" href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">The Million Dollar Dissident: NSO Group's iPhone Zero-Days</a></li><li><a title="Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor" rel="nofollow" href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor</a></li><li><a title="Proliferation of Cyber Capabilities in International Arms Markets" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/">Proliferation of Cyber Capabilities in International Arms Markets</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p><p>Links:</p><ul><li><a title="Google Says NSO Pegasus Zero-Click &#39;Most Technically Sophisticated Exploit Ever Seen&#39;" rel="nofollow" href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen">Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit</a></li><li><a title="The Million Dollar Dissident: NSO Group&#39;s iPhone Zero-Days" rel="nofollow" href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">The Million Dollar Dissident: NSO Group's iPhone Zero-Days</a></li><li><a title="Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor" rel="nofollow" href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor</a></li><li><a title="Proliferation of Cyber Capabilities in International Arms Markets" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/">Proliferation of Cyber Capabilities in International Arms Markets</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Throwback: Zero-day exploit broker Chaouki Bekrar</title>
  <link>http://securityconversations.fireside.fm/chaouki-bekrar</link>
  <guid isPermaLink="false">6cc88aa8-eacc-4bb0-a992-c0172b5915ea</guid>
  <pubDate>Wed, 03 Mar 2021 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6cc88aa8-eacc-4bb0-a992-c0172b5915ea.mp3" length="21298595" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. 

The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar's team of hackers demo'd a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  

Please excuse the audio quality and background noise.</itunes:subtitle>
  <itunes:duration>24:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6cc88aa8-eacc-4bb0-a992-c0172b5915ea/cover.jpg?v=1"/>
  <description>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. 
The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar's team of hackers demo'd a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  
(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room). 
</description>
  <itunes:keywords>zero-day, exploits, pwn2own, zerodium, vupen, exploit brokers</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
  </itunes:summary>
</item>
<item>
  <title>David Weston, Principal Security Engineering Manager, Microsoft</title>
  <link>http://securityconversations.fireside.fm/david-weston-microsoft</link>
  <guid isPermaLink="false">904ca3fd-d3eb-481f-8a0e-819e0bfd87c4</guid>
  <pubDate>Sun, 24 Jun 2018 18:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4.mp3" length="37022785" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem.</itunes:subtitle>
  <itunes:duration>46:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4/cover.jpg?v=3"/>
  <description>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem. 
</description>
  <content:encoded>
    <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
