<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 05:35:52 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Memory Safety”</title>
    <link>https://securityconversations.fireside.fm/tags/memory%20safety</link>
    <pubDate>Tue, 10 May 2022 12:15:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Project Zero's Maddie Stone on the surge in zero-day discoveries</title>
  <link>http://securityconversations.fireside.fm/maddie-stone-project-zero</link>
  <guid isPermaLink="false">97c47b7c-f218-4b1b-a4ae-1322852da212</guid>
  <pubDate>Tue, 10 May 2022 12:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97c47b7c-f218-4b1b-a4ae-1322852da212.mp3" length="30298830" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</itunes:subtitle>
  <itunes:duration>42:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97c47b7c-f218-4b1b-a4ae-1322852da212/cover.jpg?v=1"/>
  <description>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors. 
</description>
  <itunes:keywords>zero-day, exploits, project zero, google, memory safety, transparency, disclosure</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Microsoft's Justin Campbell on offensive security research</title>
  <link>http://securityconversations.fireside.fm/justin-campbell-microsoft</link>
  <guid isPermaLink="false">367c5dd6-8956-42a5-b804-887991a31ff3</guid>
  <pubDate>Sat, 08 Jan 2022 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/367c5dd6-8956-42a5-b804-887991a31ff3.mp3" length="23909293" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces.</itunes:subtitle>
  <itunes:duration>27:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/367c5dd6-8956-42a5-b804-887991a31ff3/cover.jpg?v=1"/>
  <description>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces. 
</description>
  <itunes:keywords>microsoft, windows, memory safety, shift-left, secure coding, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
