<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 11:42:40 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Lumen Technologies”</title>
    <link>https://securityconversations.fireside.fm/tags/lumen%20technologies</link>
    <pubDate>Fri, 05 Jan 2024 09:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers</title>
  <link>http://securityconversations.fireside.fm/danny-adamitis-volt-typhoon-botnet</link>
  <guid isPermaLink="false">73110ffd-bb15-40c4-924d-5bf7b89ed152</guid>
  <pubDate>Fri, 05 Jan 2024 09:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/73110ffd-bb15-40c4-924d-5bf7b89ed152.mp3" length="34693170" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.

Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</itunes:subtitle>
  <itunes:duration>34:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/73110ffd-bb15-40c4-924d-5bf7b89ed152/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
FwHunt (https://fwhunt.run)
Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.
Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer. 
</description>
  <itunes:keywords>Volt Typoon, China, Critical Infrastructure, routers</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
