<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 16 Apr 2026 21:22:45 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Microsoft”</title>
    <link>https://securityconversations.fireside.fm/tags/microsoft</link>
    <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click </title>
  <link>http://securityconversations.fireside.fm/salt-typhoon-iocs-google-disruption-unit-whatsapp-zero-click</link>
  <guid isPermaLink="false">1ec2ef88-a1b1-4df7-b737-24542f8462c8</guid>
  <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1ec2ef88-a1b1-4df7-b737-24542f8462c8.mp3" length="101225542" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.

Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 

We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>2:24:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1ec2ef88-a1b1-4df7-b737-24542f8462c8/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.
Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 
We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
</description>
  <itunes:keywords>Salt Typhoon, Cisco, Ivanti, YARA, Ghost Emperor, UNC5807, Dutch MIVD AIVD, Mirai, LIghtBasin, Google, active-defense, hacking back, WhatsApp, Apple, iOS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate</title>
  <link>http://securityconversations.fireside.fm/russia-ukraine-badsuccessor-debate</link>
  <guid isPermaLink="false">c29a1c55-dabb-4e6c-849f-9ce8e38326ac</guid>
  <pubDate>Fri, 23 May 2025 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c29a1c55-dabb-4e6c-849f-9ce8e38326ac.mp3" length="117693808" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 47:  We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.

The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 

Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>2:30:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c29a1c55-dabb-4e6c-849f-9ce8e38326ac/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.
The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 
Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Russia, China, Ukraine, GRU, Fancy Bear, Sofacy, APT28, Akamai, Microsoft, responsible disclosure, Signal, Windows Recall, NSO, Japan, OpenAI, Privacy</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?</title>
  <link>http://securityconversations.fireside.fm/tbp-ep6</link>
  <guid isPermaLink="false">874c67ec-26cd-4395-8713-df1b58629041</guid>
  <pubDate>Fri, 26 Jul 2024 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/874c67ec-26cd-4395-8713-df1b58629041.mp3" length="71350827" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 6:  As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.

Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:16:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/874c67ec-26cd-4395-8713-df1b58629041/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 6:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.
Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>CrowdStrike, Windows, BSOD, detection update, testing, validation, EDR, detection, APT45, groups, IOCs, North Korea, NSO lawsuit, surveillance industry, exploits, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep4: The AT&amp;T mega-breach, iPhone mercenary spyware, Microsoft zero-days</title>
  <link>http://securityconversations.fireside.fm/tbp-ep4</link>
  <guid isPermaLink="false">37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f</guid>
  <pubDate>Fri, 12 Jul 2024 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f.mp3" length="61000643" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 4:  Listen as the hosts delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:11:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 4:  The boys delve into the massive AT&amp;amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).
</description>
  <itunes:keywords>AT&amp;T, Snowflake, Microsoft, CSRB, Apple, CISA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep3: Dave Aitel joins debate on nation-state hacking responsibilities</title>
  <link>http://securityconversations.fireside.fm/tbp-ep3</link>
  <guid isPermaLink="false">068888b9-32ca-4c20-b8f9-d38c6e24608f</guid>
  <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/068888b9-32ca-4c20-b8f9-d38c6e24608f.mp3" length="58460157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 3:  Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 

We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 

The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.

* Costin Raiu is on vacation.</itunes:subtitle>
  <itunes:duration>1:04:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/068888b9-32ca-4c20-b8f9-d38c6e24608f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 
We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 
The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.
Costin Raiu is on vacation. 
</description>
  <itunes:keywords>Microsoft, CSRB, CISA, Triangulation, Chevron deference, Project Zero, Google</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep2: A deep-dive on disrupting and exposing nation-state malware ops</title>
  <link>http://securityconversations.fireside.fm/tbp-ep2</link>
  <guid isPermaLink="false">4a6fe671-fe7a-4699-ae08-fe99fd11f49f</guid>
  <pubDate>Sat, 29 Jun 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4a6fe671-fe7a-4699-ae08-fe99fd11f49f.mp3" length="60890552" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.

We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</itunes:subtitle>
  <itunes:duration>1:08:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4a6fe671-fe7a-4699-ae08-fe99fd11f49f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. 
A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.
We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise. 
</description>
  <itunes:keywords>google project zero, disrupting nation-state operations, mercenary hacking, teamviewer breach, Polyfill supply chain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud Compute</title>
  <link>http://securityconversations.fireside.fm/new-show-ep-1</link>
  <guid isPermaLink="false">d0003b6f-d259-41d1-991b-18d68fc8c009</guid>
  <pubDate>Sat, 22 Jun 2024 08:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d0003b6f-d259-41d1-991b-18d68fc8c009.mp3" length="40341037" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also discuss the KL ban.</itunes:subtitle>
  <itunes:duration>46:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d0003b6f-d259-41d1-991b-18d68fc8c009/cover.jpg?v=2"/>
  <description>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also talk about the KL ban. 
</description>
  <itunes:keywords>Microsoft, CSRB, Apple, AI</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ryan Hurst on tech innovation and unsolved problems in security</title>
  <link>http://securityconversations.fireside.fm/ryan-hurst-peculiar-ventures</link>
  <guid isPermaLink="false">6fb48532-6cea-4136-b891-de4095a5f1fd</guid>
  <pubDate>Wed, 16 Aug 2023 07:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fb48532-6cea-4136-b891-de4095a5f1fd.mp3" length="35217292" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups.</itunes:subtitle>
  <itunes:duration>42:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fb48532-6cea-4136-b891-de4095a5f1fd/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups. 
</description>
  <itunes:keywords>encryption, key management, microsoft, google, BGP, AI, startups</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Jason Chan on Microsoft's security problems, layoffs and startups</title>
  <link>http://securityconversations.fireside.fm/jason-chan-bessemer-venture-partners</link>
  <guid isPermaLink="false">c38cc994-c217-4b50-b5bb-07900a1bee04</guid>
  <pubDate>Mon, 07 Aug 2023 07:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c38cc994-c217-4b50-b5bb-07900a1bee04.mp3" length="19285621" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Bessemer Venture Partner's Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft's prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</itunes:subtitle>
  <itunes:duration>27:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c38cc994-c217-4b50-b5bb-07900a1bee04/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Bessemer Venture Partner's Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft's prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business. 
</description>
  <itunes:keywords>Microsoft, entrepreneurship, generative ai, layoffs, VC funding, open source software, CISO, transparency</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p><p>Links:</p><ul><li><a title="Jason Chan, VP, Information Security, Netflix" rel="nofollow" href="https://securityconversations.com/episode/jason-chan-vp-information-security-netflix/">Jason Chan, VP, Information Security, Netflix</a></li><li><a title="Jason Chan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jasonbchan/">Jason Chan on LinkedIn</a></li><li><a title="Follow Jason on Twitter / X" rel="nofollow" href="https://twitter.com/chanjbs">Follow Jason on Twitter / X</a></li><li><a title="Jason Chan - Bessemer Venture Partners" rel="nofollow" href="https://www.bvp.com/team/jason-chan">Jason Chan - Bessemer Venture Partners</a> &mdash; Jason Chan is an operating advisor at Bessemer where he brings over twenty years of experience in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices. Most recently, Jason built and led the information security team at Netflix for over a decade. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p><p>Links:</p><ul><li><a title="Jason Chan, VP, Information Security, Netflix" rel="nofollow" href="https://securityconversations.com/episode/jason-chan-vp-information-security-netflix/">Jason Chan, VP, Information Security, Netflix</a></li><li><a title="Jason Chan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jasonbchan/">Jason Chan on LinkedIn</a></li><li><a title="Follow Jason on Twitter / X" rel="nofollow" href="https://twitter.com/chanjbs">Follow Jason on Twitter / X</a></li><li><a title="Jason Chan - Bessemer Venture Partners" rel="nofollow" href="https://www.bvp.com/team/jason-chan">Jason Chan - Bessemer Venture Partners</a> &mdash; Jason Chan is an operating advisor at Bessemer where he brings over twenty years of experience in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices. Most recently, Jason built and led the information security team at Netflix for over a decade. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kymberlee Price reflects on life at the MSRC, hacker/vendor engagement, bug bounties</title>
  <link>http://securityconversations.fireside.fm/kymberlee-price</link>
  <guid isPermaLink="false">ba435301-e21a-48fa-86e5-f60fac79d8c7</guid>
  <pubDate>Wed, 12 Jul 2023 09:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ba435301-e21a-48fa-86e5-f60fac79d8c7.mp3" length="45477037" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</itunes:subtitle>
  <itunes:duration>48:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/ba435301-e21a-48fa-86e5-f60fac79d8c7/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market. 
</description>
  <itunes:keywords>microsoft, msrc, bug bounties, product security, appsec</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Microsoft's Justin Campbell on offensive security research</title>
  <link>http://securityconversations.fireside.fm/justin-campbell-microsoft</link>
  <guid isPermaLink="false">367c5dd6-8956-42a5-b804-887991a31ff3</guid>
  <pubDate>Sat, 08 Jan 2022 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/367c5dd6-8956-42a5-b804-887991a31ff3.mp3" length="23909293" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces.</itunes:subtitle>
  <itunes:duration>27:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/367c5dd6-8956-42a5-b804-887991a31ff3/cover.jpg?v=1"/>
  <description>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces. 
</description>
  <itunes:keywords>microsoft, windows, memory safety, shift-left, secure coding, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Microsoft's David Weston on the surge in firmware attacks</title>
  <link>http://securityconversations.fireside.fm/david-weston-microsoft-windows</link>
  <guid isPermaLink="false">9589ad97-fc83-458f-8781-44ce8eb8bbf3</guid>
  <pubDate>Tue, 06 Apr 2021 11:45:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9589ad97-fc83-458f-8781-44ce8eb8bbf3.mp3" length="35474013" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Microsoft's David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   

As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the 'invisible' layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</itunes:subtitle>
  <itunes:duration>33:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9589ad97-fc83-458f-8781-44ce8eb8bbf3/cover.jpg?v=1"/>
  <description>Microsoft's David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   
As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the 'invisible' layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space. 
</description>
  <itunes:keywords>microsoft, firmware, uefi, bios, windows os, eclypsium, IOT, security updates</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Microsoft&#39;s David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   </p>

<p>As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the &#39;invisible&#39; layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Microsoft&#39;s David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   </p>

<p>As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the &#39;invisible&#39; layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>David Weston, Principal Security Engineering Manager, Microsoft</title>
  <link>http://securityconversations.fireside.fm/david-weston-microsoft</link>
  <guid isPermaLink="false">904ca3fd-d3eb-481f-8a0e-819e0bfd87c4</guid>
  <pubDate>Sun, 24 Jun 2018 18:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4.mp3" length="37022785" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem.</itunes:subtitle>
  <itunes:duration>46:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4/cover.jpg?v=3"/>
  <description>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem. 
</description>
  <content:encoded>
    <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
