<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 11 Apr 2026 12:30:35 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Google”</title>
    <link>https://securityconversations.fireside.fm/tags/google</link>
    <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep3: Dave Aitel joins debate on nation-state hacking responsibilities</title>
  <link>http://securityconversations.fireside.fm/tbp-ep3</link>
  <guid isPermaLink="false">068888b9-32ca-4c20-b8f9-d38c6e24608f</guid>
  <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/068888b9-32ca-4c20-b8f9-d38c6e24608f.mp3" length="58460157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 3:  Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 

We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 

The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.

* Costin Raiu is on vacation.</itunes:subtitle>
  <itunes:duration>1:04:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/068888b9-32ca-4c20-b8f9-d38c6e24608f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 
We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 
The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.
Costin Raiu is on vacation. 
</description>
  <itunes:keywords>Microsoft, CSRB, CISA, Triangulation, Chevron deference, Project Zero, Google</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep2: A deep-dive on disrupting and exposing nation-state malware ops</title>
  <link>http://securityconversations.fireside.fm/tbp-ep2</link>
  <guid isPermaLink="false">4a6fe671-fe7a-4699-ae08-fe99fd11f49f</guid>
  <pubDate>Sat, 29 Jun 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4a6fe671-fe7a-4699-ae08-fe99fd11f49f.mp3" length="60890552" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.

We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</itunes:subtitle>
  <itunes:duration>1:08:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4a6fe671-fe7a-4699-ae08-fe99fd11f49f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. 
A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.
We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise. 
</description>
  <itunes:keywords>google project zero, disrupting nation-state operations, mercenary hacking, teamviewer breach, Polyfill supply chain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Abhishek Arya on Google's AI cybersecurity experiments</title>
  <link>http://securityconversations.fireside.fm/abhishek-arya-google-open-source-supply-chain</link>
  <guid isPermaLink="false">013e4610-5aeb-4cb3-89d1-509db8c25ffd</guid>
  <pubDate>Tue, 12 Sep 2023 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/013e4610-5aeb-4cb3-89d1-509db8c25ffd.mp3" length="31344253" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  

In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry's over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</itunes:subtitle>
  <itunes:duration>33:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/013e4610-5aeb-4cb3-89d1-509db8c25ffd/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  
In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry's over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains. 
</description>
  <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  </p>

<p>In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry&#39;s over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</p><p>Links:</p><ul><li><a title="Abhishek Arya on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/abhishek-arya-a565373/">Abhishek Arya on LinkedIn</a></li><li><a title="OSS-Fuzz: Continuous fuzzing for open source software" rel="nofollow" href="https://github.com/google/oss-fuzz/blob/master/README.md">OSS-Fuzz: Continuous fuzzing for open source software</a></li><li><a title="Google Brings AI Magic to Fuzz Testing" rel="nofollow" href="https://www.securityweek.com/google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results/">Google Brings AI Magic to Fuzz Testing</a></li><li><a title="AI-Powered Fuzzing: Breaking the Bug Hunting Barrier" rel="nofollow" href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">AI-Powered Fuzzing: Breaking the Bug Hunting Barrier</a></li><li><a title="AI Cyber Challenge" rel="nofollow" href="https://aicyberchallenge.com/">AI Cyber Challenge</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  </p>

<p>In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry&#39;s over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</p><p>Links:</p><ul><li><a title="Abhishek Arya on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/abhishek-arya-a565373/">Abhishek Arya on LinkedIn</a></li><li><a title="OSS-Fuzz: Continuous fuzzing for open source software" rel="nofollow" href="https://github.com/google/oss-fuzz/blob/master/README.md">OSS-Fuzz: Continuous fuzzing for open source software</a></li><li><a title="Google Brings AI Magic to Fuzz Testing" rel="nofollow" href="https://www.securityweek.com/google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results/">Google Brings AI Magic to Fuzz Testing</a></li><li><a title="AI-Powered Fuzzing: Breaking the Bug Hunting Barrier" rel="nofollow" href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">AI-Powered Fuzzing: Breaking the Bug Hunting Barrier</a></li><li><a title="AI Cyber Challenge" rel="nofollow" href="https://aicyberchallenge.com/">AI Cyber Challenge</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ryan Hurst on tech innovation and unsolved problems in security</title>
  <link>http://securityconversations.fireside.fm/ryan-hurst-peculiar-ventures</link>
  <guid isPermaLink="false">6fb48532-6cea-4136-b891-de4095a5f1fd</guid>
  <pubDate>Wed, 16 Aug 2023 07:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fb48532-6cea-4136-b891-de4095a5f1fd.mp3" length="35217292" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups.</itunes:subtitle>
  <itunes:duration>42:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fb48532-6cea-4136-b891-de4095a5f1fd/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups. 
</description>
  <itunes:keywords>encryption, key management, microsoft, google, BGP, AI, startups</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Project Zero's Maddie Stone on the surge in zero-day discoveries</title>
  <link>http://securityconversations.fireside.fm/maddie-stone-project-zero</link>
  <guid isPermaLink="false">97c47b7c-f218-4b1b-a4ae-1322852da212</guid>
  <pubDate>Tue, 10 May 2022 12:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97c47b7c-f218-4b1b-a4ae-1322852da212.mp3" length="30298830" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</itunes:subtitle>
  <itunes:duration>42:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97c47b7c-f218-4b1b-a4ae-1322852da212/cover.jpg?v=1"/>
  <description>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors. 
</description>
  <itunes:keywords>zero-day, exploits, project zero, google, memory safety, transparency, disclosure</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Shane Huntley on zero-days and the nation-state threat landscape</title>
  <link>http://securityconversations.fireside.fm/shane-huntley-google-tag</link>
  <guid isPermaLink="false">fb354ea5-acaf-443d-a97d-373e1adc92b0</guid>
  <pubDate>Mon, 04 Apr 2022 06:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fb354ea5-acaf-443d-a97d-373e1adc92b0.mp3" length="79196359" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</itunes:subtitle>
  <itunes:duration>40:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fb354ea5-acaf-443d-a97d-373e1adc92b0/cover.jpg?v=1"/>
  <description>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more... 
</description>
  <itunes:keywords>google, zero-day, nation-state, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Heather Adkins on defenders playing the long game</title>
  <link>http://securityconversations.fireside.fm/heather-adkins-google-security</link>
  <guid isPermaLink="false">97a0eeb7-c6f6-4757-9cf5-bbd21380223f</guid>
  <pubDate>Wed, 26 May 2021 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97a0eeb7-c6f6-4757-9cf5-bbd21380223f.mp3" length="32532700" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</itunes:subtitle>
  <itunes:duration>38:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97a0eeb7-c6f6-4757-9cf5-bbd21380223f/cover.jpg?v=1"/>
  <description>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.
Sponsored by Eclypsium:
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  Request a demo at Eclypsium.com (https://eclypsium.com).
</description>
  <itunes:keywords>google, zero-trust, chrome</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Patrick Howell O'Neill, Cybersecurity Editor, MIT Technology Review</title>
  <link>http://securityconversations.fireside.fm/patrick-howell-oneill-mit-tech-review</link>
  <guid isPermaLink="false">02fc5a7f-d41b-434f-a25d-5f6c0a046dbc</guid>
  <pubDate>Tue, 30 Mar 2021 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc.mp3" length="24838523" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle> 
Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  [Follow Patrick on Twitter](https://twitter.com/howelloneill).</itunes:subtitle>
  <itunes:duration>25:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc/cover.jpg?v=1"/>
  <description>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop (https://securityconversations.com/on-disrupting-gov-malware-attacks/) on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  Follow Patrick on Twitter (https://twitter.com/howelloneill). 
</description>
  <itunes:keywords>journalism, story-telling, google, project zero, APT, nation-state malware, attribution</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
