<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 11:58:53 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Hack Back”</title>
    <link>https://securityconversations.fireside.fm/tags/hack-back</link>
    <pubDate>Mon, 23 Dec 2024 12:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>US government's VPN advice, dropping bombs on ransomware gangs</title>
  <link>http://securityconversations.fireside.fm/cisa-vpn-advice-tp-link-cellebrite-novispy</link>
  <guid isPermaLink="false">4e8b8384-f9ae-4e42-87fe-d72ab006ab10</guid>
  <pubDate>Mon, 23 Dec 2024 12:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4e8b8384-f9ae-4e42-87fe-d72ab006ab10.mp3" length="97305809" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 26:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.

Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>1:58:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4e8b8384-f9ae-4e42-87fe-d72ab006ab10/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 26:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.
Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>political interference, Romania, surveillance technology, digital security, iOS, Android, mobile exploits, activists, VPNs, VPN, privacy, CISA, cryptocurrency, anonymity, security solutions, software quality, government regulations, cybercrime, digital trust, cybersecurity, espionage, ransomware, supply chain attacks, cyber warfare, intelligence agencies, US-China relations, malware, cyber norms, innovation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 26</strong>:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International&#39;s explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.</p>

<p>Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad&#39;s dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1v_-VcFPFydOVKG42d5hAO5MPx50HNR10l95h8Gh12WA/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://www.amnesty.org/en/documents/eur70/8813/2024/en/">Surveillance and the suppression of civil society in Serbia</a></li><li><a title="CISA: VPN and mobile device security guidance" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">CISA: VPN and mobile device security guidance</a></li><li><a title="Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)" rel="nofollow" href="https://medium.com/@costin.raiu/staying-safe-from-pegasus-chrysaor-and-other-apt-mobile-malware-a923b56d645f">Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)</a></li><li><a title="Bitsight: The Aftermath of the Kaspersky Ban" rel="nofollow" href="https://www.bitsight.com/blog/aftermath-kaspersky-ban">Bitsight: The Aftermath of the Kaspersky Ban</a></li><li><a title="US Probes China-Founded Router Maker TP-Link" rel="nofollow" href="https://archive.ph/tzycz">US Probes China-Founded Router Maker TP-Link</a></li><li><a title="Rob Joyce: Move away from TP-Link" rel="nofollow" href="https://bsky.app/profile/rgblights.bsky.social/post/3ldlr2lrfe22y">Rob Joyce: Move away from TP-Link</a></li><li><a title="China report on US intelligence corporate hacking" rel="nofollow" href="https://www.cert.org.cn/publish/main/8/2024/20241218184234131217571/20241218184234131217571_.html">China report on US intelligence corporate hacking</a></li><li><a title="Foreign hackers need to face real consequences" rel="nofollow" href="https://www.politico.com/news/2024/12/15/mike-waltz-hacking-foreign-penalties-00194415">Foreign hackers need to face real consequences</a></li><li><a title="Israel&#39;s Mossad spent years orchestrating Hezbollah pager plot" rel="nofollow" href="https://www.cbsnews.com/news/israeli-mossad-pager-walkie-talkie-hezbollah-plot-60-minutes/">Israel's Mossad spent years orchestrating Hezbollah pager plot</a></li><li><a title="BeyondTrust 0day" rel="nofollow" href="https://www.beyondtrust.com/remote-support-saas-service-security-investigation">BeyondTrust 0day</a></li><li><a title="Sophos Firewall CVSS 9.8 bulletin" rel="nofollow" href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce">Sophos Firewall CVSS 9.8 bulletin</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 26</strong>:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International&#39;s explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.</p>

<p>Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad&#39;s dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1v_-VcFPFydOVKG42d5hAO5MPx50HNR10l95h8Gh12WA/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://www.amnesty.org/en/documents/eur70/8813/2024/en/">Surveillance and the suppression of civil society in Serbia</a></li><li><a title="CISA: VPN and mobile device security guidance" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">CISA: VPN and mobile device security guidance</a></li><li><a title="Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)" rel="nofollow" href="https://medium.com/@costin.raiu/staying-safe-from-pegasus-chrysaor-and-other-apt-mobile-malware-a923b56d645f">Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)</a></li><li><a title="Bitsight: The Aftermath of the Kaspersky Ban" rel="nofollow" href="https://www.bitsight.com/blog/aftermath-kaspersky-ban">Bitsight: The Aftermath of the Kaspersky Ban</a></li><li><a title="US Probes China-Founded Router Maker TP-Link" rel="nofollow" href="https://archive.ph/tzycz">US Probes China-Founded Router Maker TP-Link</a></li><li><a title="Rob Joyce: Move away from TP-Link" rel="nofollow" href="https://bsky.app/profile/rgblights.bsky.social/post/3ldlr2lrfe22y">Rob Joyce: Move away from TP-Link</a></li><li><a title="China report on US intelligence corporate hacking" rel="nofollow" href="https://www.cert.org.cn/publish/main/8/2024/20241218184234131217571/20241218184234131217571_.html">China report on US intelligence corporate hacking</a></li><li><a title="Foreign hackers need to face real consequences" rel="nofollow" href="https://www.politico.com/news/2024/12/15/mike-waltz-hacking-foreign-penalties-00194415">Foreign hackers need to face real consequences</a></li><li><a title="Israel&#39;s Mossad spent years orchestrating Hezbollah pager plot" rel="nofollow" href="https://www.cbsnews.com/news/israeli-mossad-pager-walkie-talkie-hezbollah-plot-60-minutes/">Israel's Mossad spent years orchestrating Hezbollah pager plot</a></li><li><a title="BeyondTrust 0day" rel="nofollow" href="https://www.beyondtrust.com/remote-support-saas-service-security-investigation">BeyondTrust 0day</a></li><li><a title="Sophos Firewall CVSS 9.8 bulletin" rel="nofollow" href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce">Sophos Firewall CVSS 9.8 bulletin</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
