<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 03:53:14 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Psoas”</title>
    <link>https://securityconversations.fireside.fm/tags/psoas</link>
    <pubDate>Tue, 07 Nov 2023 14:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Cisco Talos researcher Nick Biasini on chasing APTs, mercenary hackers</title>
  <link>http://securityconversations.fireside.fm/nick-biasini-cisco-talos</link>
  <guid isPermaLink="false">d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed</guid>
  <pubDate>Tue, 07 Nov 2023 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed.mp3" length="30416978" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</itunes:subtitle>
  <itunes:duration>31:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly (https://binarly.io)
FwHunt (https://fwhunt.run)
Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers. 
</description>
  <itunes:keywords>Nation-state APTs, Cisco Talos, Ransomware, PSOAs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p><p>Links:</p><ul><li><a title="Nick Biasini on Twitter" rel="nofollow" href="https://twitter.com/infosec_nick">Nick Biasini on Twitter</a></li><li><a title="Cisco Talos Library of Reports" rel="nofollow" href="https://talosintelligence.com/resources">Cisco Talos Library of Reports</a></li><li><a title="Nick Biasini on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/nick-biasini-00707950/">Nick Biasini on LinkedIn</a></li><li><a title="Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)" rel="nofollow" href="https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/">Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)</a></li><li><a title="US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa" rel="nofollow" href="https://www.securityweek.com/us-gov-mercenary-spyware-clampdown-hits-cytrox-intellexa/">US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p><p>Links:</p><ul><li><a title="Nick Biasini on Twitter" rel="nofollow" href="https://twitter.com/infosec_nick">Nick Biasini on Twitter</a></li><li><a title="Cisco Talos Library of Reports" rel="nofollow" href="https://talosintelligence.com/resources">Cisco Talos Library of Reports</a></li><li><a title="Nick Biasini on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/nick-biasini-00707950/">Nick Biasini on LinkedIn</a></li><li><a title="Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)" rel="nofollow" href="https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/">Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)</a></li><li><a title="US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa" rel="nofollow" href="https://www.securityweek.com/us-gov-mercenary-spyware-clampdown-hits-cytrox-intellexa/">US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Costin Raiu on the .gov mobile exploitation business</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-mobile-exploitation</link>
  <guid isPermaLink="false">e7355605-c0fe-41c9-b55d-6f2775d8cc86</guid>
  <pubDate>Thu, 23 Dec 2021 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e7355605-c0fe-41c9-b55d-6f2775d8cc86.mp3" length="39704215" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Global director of Kaspersky's GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</itunes:subtitle>
  <itunes:duration>41:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e7355605-c0fe-41c9-b55d-6f2775d8cc86/cover.jpg?v=1"/>
  <description>Global director of Kaspersky's GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem. 
</description>
  <itunes:keywords>zero-day, exploits, PSOAs, iOS malware, NSO Pegasus, Apple, Android</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p><p>Links:</p><ul><li><a title="Google Says NSO Pegasus Zero-Click &#39;Most Technically Sophisticated Exploit Ever Seen&#39;" rel="nofollow" href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen">Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit</a></li><li><a title="The Million Dollar Dissident: NSO Group&#39;s iPhone Zero-Days" rel="nofollow" href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">The Million Dollar Dissident: NSO Group's iPhone Zero-Days</a></li><li><a title="Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor" rel="nofollow" href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor</a></li><li><a title="Proliferation of Cyber Capabilities in International Arms Markets" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/">Proliferation of Cyber Capabilities in International Arms Markets</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p><p>Links:</p><ul><li><a title="Google Says NSO Pegasus Zero-Click &#39;Most Technically Sophisticated Exploit Ever Seen&#39;" rel="nofollow" href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen">Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit</a></li><li><a title="The Million Dollar Dissident: NSO Group&#39;s iPhone Zero-Days" rel="nofollow" href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">The Million Dollar Dissident: NSO Group's iPhone Zero-Days</a></li><li><a title="Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor" rel="nofollow" href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor</a></li><li><a title="Proliferation of Cyber Capabilities in International Arms Markets" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/">Proliferation of Cyber Capabilities in International Arms Markets</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
