<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 04:18:10 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Project Zero”</title>
    <link>https://securityconversations.fireside.fm/tags/project%20zero</link>
    <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep3: Dave Aitel joins debate on nation-state hacking responsibilities</title>
  <link>http://securityconversations.fireside.fm/tbp-ep3</link>
  <guid isPermaLink="false">068888b9-32ca-4c20-b8f9-d38c6e24608f</guid>
  <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/068888b9-32ca-4c20-b8f9-d38c6e24608f.mp3" length="58460157" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 3:  Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 

We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 

The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.

* Costin Raiu is on vacation.</itunes:subtitle>
  <itunes:duration>1:04:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/068888b9-32ca-4c20-b8f9-d38c6e24608f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 
We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 
The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.
Costin Raiu is on vacation. 
</description>
  <itunes:keywords>Microsoft, CSRB, CISA, Triangulation, Chevron deference, Project Zero, Google</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Project Zero's Maddie Stone on the surge in zero-day discoveries</title>
  <link>http://securityconversations.fireside.fm/maddie-stone-project-zero</link>
  <guid isPermaLink="false">97c47b7c-f218-4b1b-a4ae-1322852da212</guid>
  <pubDate>Tue, 10 May 2022 12:15:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97c47b7c-f218-4b1b-a4ae-1322852da212.mp3" length="30298830" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</itunes:subtitle>
  <itunes:duration>42:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97c47b7c-f218-4b1b-a4ae-1322852da212/cover.jpg?v=1"/>
  <description>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors. 
</description>
  <itunes:keywords>zero-day, exploits, project zero, google, memory safety, transparency, disclosure</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Shane Huntley on zero-days and the nation-state threat landscape</title>
  <link>http://securityconversations.fireside.fm/shane-huntley-google-tag</link>
  <guid isPermaLink="false">fb354ea5-acaf-443d-a97d-373e1adc92b0</guid>
  <pubDate>Mon, 04 Apr 2022 06:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fb354ea5-acaf-443d-a97d-373e1adc92b0.mp3" length="79196359" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</itunes:subtitle>
  <itunes:duration>40:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fb354ea5-acaf-443d-a97d-373e1adc92b0/cover.jpg?v=1"/>
  <description>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more... 
</description>
  <itunes:keywords>google, zero-day, nation-state, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Patrick Howell O'Neill, Cybersecurity Editor, MIT Technology Review</title>
  <link>http://securityconversations.fireside.fm/patrick-howell-oneill-mit-tech-review</link>
  <guid isPermaLink="false">02fc5a7f-d41b-434f-a25d-5f6c0a046dbc</guid>
  <pubDate>Tue, 30 Mar 2021 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc.mp3" length="24838523" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle> 
Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  [Follow Patrick on Twitter](https://twitter.com/howelloneill).</itunes:subtitle>
  <itunes:duration>25:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc/cover.jpg?v=1"/>
  <description>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop (https://securityconversations.com/on-disrupting-gov-malware-attacks/) on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  Follow Patrick on Twitter (https://twitter.com/howelloneill). 
</description>
  <itunes:keywords>journalism, story-telling, google, project zero, APT, nation-state malware, attribution</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
