<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 07:11:13 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Nation State Apts”</title>
    <link>https://securityconversations.fireside.fm/tags/nation-state%20apts</link>
    <pubDate>Tue, 07 Nov 2023 14:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Cisco Talos researcher Nick Biasini on chasing APTs, mercenary hackers</title>
  <link>http://securityconversations.fireside.fm/nick-biasini-cisco-talos</link>
  <guid isPermaLink="false">d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed</guid>
  <pubDate>Tue, 07 Nov 2023 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed.mp3" length="30416978" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</itunes:subtitle>
  <itunes:duration>31:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers. 
</description>
  <itunes:keywords>Nation-state APTs, Cisco Talos, Ransomware, PSOAs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p><p>Links:</p><ul><li><a title="Nick Biasini on Twitter" rel="nofollow" href="https://twitter.com/infosec_nick">Nick Biasini on Twitter</a></li><li><a title="Cisco Talos Library of Reports" rel="nofollow" href="https://talosintelligence.com/resources">Cisco Talos Library of Reports</a></li><li><a title="Nick Biasini on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/nick-biasini-00707950/">Nick Biasini on LinkedIn</a></li><li><a title="Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)" rel="nofollow" href="https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/">Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)</a></li><li><a title="US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa" rel="nofollow" href="https://www.securityweek.com/us-gov-mercenary-spyware-clampdown-hits-cytrox-intellexa/">US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p><p>Links:</p><ul><li><a title="Nick Biasini on Twitter" rel="nofollow" href="https://twitter.com/infosec_nick">Nick Biasini on Twitter</a></li><li><a title="Cisco Talos Library of Reports" rel="nofollow" href="https://talosintelligence.com/resources">Cisco Talos Library of Reports</a></li><li><a title="Nick Biasini on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/nick-biasini-00707950/">Nick Biasini on LinkedIn</a></li><li><a title="Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)" rel="nofollow" href="https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/">Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)</a></li><li><a title="US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa" rel="nofollow" href="https://www.securityweek.com/us-gov-mercenary-spyware-clampdown-hits-cytrox-intellexa/">US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
