<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 07:00:13 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Midnight Blizzard”</title>
    <link>https://securityconversations.fireside.fm/tags/midnight%20blizzard</link>
    <pubDate>Fri, 11 Oct 2024 13:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Typhoons and Blizzards: Cyberespionage and national security on front burner</title>
  <link>http://securityconversations.fireside.fm/tbp-ep16</link>
  <guid isPermaLink="false">b270f0b1-359a-43e1-b218-7b1329f43093</guid>
  <pubDate>Fri, 11 Oct 2024 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b270f0b1-359a-43e1-b218-7b1329f43093.mp3" length="52742416" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
  <itunes:duration>1:09:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b270f0b1-359a-43e1-b218-7b1329f43093/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 16:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Cybersecurity Threats, APT29 Cyber Attacks, Salt Typhoon Hacks, Espionage and Cyber Warfare, National Security Risks, SVR cyber threat, APT29 tactics, Russia cyber espionage, Chinese cyber actors, Salt Typhoon vulnerability, Microsoft Teams exploitation, JetBrains TeamCity vulnerability, Supply chain cyber attack, National security cyber risks, Cyber threat indicators</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="NCSC exposé on SVR/APT29 history and tactics" rel="nofollow" href="https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities">NCSC exposé on SVR/APT29 history and tactics</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://attack.mitre.org/groups/G0016/">APT29 / Midnight Blizzard</a></li><li><a title="VIDEO: A Surprise Encounter With A Telco APT" rel="nofollow" href="https://www.youtube.com/watch?v=xCU47bJoLho&amp;ab_channel=HackInTheBoxSecurityConference">VIDEO: A Surprise Encounter With A Telco APT</a></li><li><a title="The Athens Affair - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/the-athens-affair">The Athens Affair - IEEE Spectrum</a> &mdash; How some extremely smart hackers pulled off the most audacious cell-network break-in ever</li><li><a title="Wikipedia: The Athens Affair" rel="nofollow" href="https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305">Wikipedia: The Athens Affair</a></li><li><a title="WSJ report on Salt Typhoon hacks" rel="nofollow" href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951">WSJ report on Salt Typhoon hacks</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Microsoft Confirms Exploited Zero-Day in Windows Management Console" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-confirms-exploited-zero-day-in-windows-management-console/">Microsoft Confirms Exploited Zero-Day in Windows Management Console</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="NCSC exposé on SVR/APT29 history and tactics" rel="nofollow" href="https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities">NCSC exposé on SVR/APT29 history and tactics</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://attack.mitre.org/groups/G0016/">APT29 / Midnight Blizzard</a></li><li><a title="VIDEO: A Surprise Encounter With A Telco APT" rel="nofollow" href="https://www.youtube.com/watch?v=xCU47bJoLho&amp;ab_channel=HackInTheBoxSecurityConference">VIDEO: A Surprise Encounter With A Telco APT</a></li><li><a title="The Athens Affair - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/the-athens-affair">The Athens Affair - IEEE Spectrum</a> &mdash; How some extremely smart hackers pulled off the most audacious cell-network break-in ever</li><li><a title="Wikipedia: The Athens Affair" rel="nofollow" href="https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305">Wikipedia: The Athens Affair</a></li><li><a title="WSJ report on Salt Typhoon hacks" rel="nofollow" href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951">WSJ report on Salt Typhoon hacks</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Microsoft Confirms Exploited Zero-Day in Windows Management Console" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-confirms-exploited-zero-day-in-windows-management-console/">Microsoft Confirms Exploited Zero-Day in Windows Management Console</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
