<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 10:11:02 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Network Inspectability”</title>
    <link>https://securityconversations.fireside.fm/tags/network%20inspectability</link>
    <pubDate>Sat, 30 Nov 2024 11:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Volexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectability</title>
  <link>http://securityconversations.fireside.fm/steven-adair-nearest-neighbor-wifi-hack</link>
  <guid isPermaLink="false">38eb067c-05af-457d-91b4-9e809083d842</guid>
  <pubDate>Sat, 30 Nov 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/38eb067c-05af-457d-91b4-9e809083d842.mp3" length="68926322" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 23:  Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.

We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET's discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).

Honorary buddy: Steven Adair (Volexity)</itunes:subtitle>
  <itunes:duration>1:18:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/38eb067c-05af-457d-91b4-9e809083d842/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 23: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.
We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET's discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
Honorary buddy: Steven Adair (https://twitter.com/sadair) (Volexity)
</description>
  <itunes:keywords>Volexity, memory analysis, incident response, EDR, DEFCAMP, network telemetry,  Wi-Fi security, edge devices, ESET, TOR, Binarly, Bootkitty,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 23</strong>: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.</p>

<p>We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET&#39;s discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>

<p><strong>Honorary buddy:</strong> <a href="https://twitter.com/sadair" rel="nofollow">Steven Adair</a> (Volexity)</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10qv33zxzGUqQFkFc3FQ8ErRIdEdg4P8wUjBoIW5V1ZY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Steven Adair on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/sadair/">Steven Adair on LinkedIn</a></li><li><a title="The Nearest Neighbor Wi-Fi Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">The Nearest Neighbor Wi-Fi Attack </a></li><li><a title="Detecting Compromise of Palo Alto Networks GlobalProtect Devices" rel="nofollow" href="https://www.volexity.com/blog/2024/05/15/detecting-compromise-of-cve-2024-3400-on-palo-alto-networks-globalprotect-devices/">Detecting Compromise of Palo Alto Networks GlobalProtect Devices</a></li><li><a title="Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days" rel="nofollow" href="https://www.securityweek.com/volexity-catches-chinese-hackers-exploiting-ivanti-vpn-zero-days/">Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days</a></li><li><a title="Volexity Warns of &#39;Active Exploitation&#39; of Zimbra Zero-Day" rel="nofollow" href="https://www.securityweek.com/volexity-warns-active-exploitation-zimbra-zero-day/">Volexity Warns of 'Active Exploitation' of Zimbra Zero-Day</a></li><li><a title="RomCom exploits Firefox and Windows zero days in the wild" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/">RomCom exploits Firefox and Windows zero days in the wild</a></li><li><a title="Bootkitty: Analyzing the first UEFI bootkit for Linux" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/">Bootkitty: Analyzing the first UEFI bootkit for Linux</a></li><li><a title="Binarly: LogoFAIL Exploited to Deploy Bootkitty" rel="nofollow" href="https://www.binarly.io/blog/logofail-exploited-to-deploy-bootkitty-the-first-uefi-bootkit-for-linux">Binarly: LogoFAIL Exploited to Deploy Bootkitty</a></li><li><a title="T-Mobile statement on Salt Typhooon" rel="nofollow" href="https://www.t-mobile.com/news/un-carrier/update-cyberattacks-targeting-us-wireless-companies">T-Mobile statement on Salt Typhooon</a></li><li><a title="LABScon24 Replay -- Cristina Cifuentes" rel="nofollow" href="https://www.youtube.com/watch?v=wo3xEa2elp4&amp;ab_channel=SentinelOne">LABScon24 Replay -- Cristina Cifuentes</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 23</strong>: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.</p>

<p>We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET&#39;s discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>

<p><strong>Honorary buddy:</strong> <a href="https://twitter.com/sadair" rel="nofollow">Steven Adair</a> (Volexity)</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10qv33zxzGUqQFkFc3FQ8ErRIdEdg4P8wUjBoIW5V1ZY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Steven Adair on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/sadair/">Steven Adair on LinkedIn</a></li><li><a title="The Nearest Neighbor Wi-Fi Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">The Nearest Neighbor Wi-Fi Attack </a></li><li><a title="Detecting Compromise of Palo Alto Networks GlobalProtect Devices" rel="nofollow" href="https://www.volexity.com/blog/2024/05/15/detecting-compromise-of-cve-2024-3400-on-palo-alto-networks-globalprotect-devices/">Detecting Compromise of Palo Alto Networks GlobalProtect Devices</a></li><li><a title="Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days" rel="nofollow" href="https://www.securityweek.com/volexity-catches-chinese-hackers-exploiting-ivanti-vpn-zero-days/">Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days</a></li><li><a title="Volexity Warns of &#39;Active Exploitation&#39; of Zimbra Zero-Day" rel="nofollow" href="https://www.securityweek.com/volexity-warns-active-exploitation-zimbra-zero-day/">Volexity Warns of 'Active Exploitation' of Zimbra Zero-Day</a></li><li><a title="RomCom exploits Firefox and Windows zero days in the wild" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/">RomCom exploits Firefox and Windows zero days in the wild</a></li><li><a title="Bootkitty: Analyzing the first UEFI bootkit for Linux" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/">Bootkitty: Analyzing the first UEFI bootkit for Linux</a></li><li><a title="Binarly: LogoFAIL Exploited to Deploy Bootkitty" rel="nofollow" href="https://www.binarly.io/blog/logofail-exploited-to-deploy-bootkitty-the-first-uefi-bootkit-for-linux">Binarly: LogoFAIL Exploited to Deploy Bootkitty</a></li><li><a title="T-Mobile statement on Salt Typhooon" rel="nofollow" href="https://www.t-mobile.com/news/un-carrier/update-cyberattacks-targeting-us-wireless-companies">T-Mobile statement on Salt Typhooon</a></li><li><a title="LABScon24 Replay -- Cristina Cifuentes" rel="nofollow" href="https://www.youtube.com/watch?v=wo3xEa2elp4&amp;ab_channel=SentinelOne">LABScon24 Replay -- Cristina Cifuentes</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
