<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 00:01:46 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Pwn2own”</title>
    <link>https://securityconversations.fireside.fm/tags/pwn2own</link>
    <pubDate>Thu, 11 Apr 2024 10:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Cris Neckar on the early days of securing Chrome, chasing browser exploits</title>
  <link>http://securityconversations.fireside.fm/cris-neckar-chrome-security-stories</link>
  <guid isPermaLink="false">8151cb78-e91b-4526-95cc-6ea1dd6ddec5</guid>
  <pubDate>Thu, 11 Apr 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8151cb78-e91b-4526-95cc-6ea1dd6ddec5.mp3" length="52672988" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- XZ.fail backdoor detector  (https://xz.fail)

Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</itunes:subtitle>
  <itunes:duration>54:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8151cb78-e91b-4526-95cc-6ea1dd6ddec5/cover.jpg?v=4"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
XZ.fail backdoor detector  (https://xz.fail)
Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market. 
</description>
  <itunes:keywords>venture capital, investments, supply chain, Chrome, Pwn2Own</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p><p>Links:</p><ul><li><a title="Unedited transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading=h.ulpyi4qqiq06">Unedited transcript (AI-generated)</a></li><li><a title="Cris Neckar on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/crisneckar/">Cris Neckar on LinkedIn</a></li><li><a title="Cris Neckar Bio (Two Bear Capital)" rel="nofollow" href="https://www.twobearcapital.com/team/cris-neckar">Cris Neckar Bio (Two Bear Capital)</a></li><li><a title="Teenager hacks Google Chrome with three 0days" rel="nofollow" href="https://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/">Teenager hacks Google Chrome with three 0days</a></li><li><a title="Research on Trident zero-day flaws" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/trident-pegasus-technical-details">Research on Trident zero-day flaws</a></li><li><a title="Cris Neckar podcast transcript (Unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading">Cris Neckar podcast transcript (Unedited)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p><p>Links:</p><ul><li><a title="Unedited transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading=h.ulpyi4qqiq06">Unedited transcript (AI-generated)</a></li><li><a title="Cris Neckar on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/crisneckar/">Cris Neckar on LinkedIn</a></li><li><a title="Cris Neckar Bio (Two Bear Capital)" rel="nofollow" href="https://www.twobearcapital.com/team/cris-neckar">Cris Neckar Bio (Two Bear Capital)</a></li><li><a title="Teenager hacks Google Chrome with three 0days" rel="nofollow" href="https://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/">Teenager hacks Google Chrome with three 0days</a></li><li><a title="Research on Trident zero-day flaws" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/trident-pegasus-technical-details">Research on Trident zero-day flaws</a></li><li><a title="Cris Neckar podcast transcript (Unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading">Cris Neckar podcast transcript (Unedited)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Charlie Miller on hacking iPhones, Macbooks, Jeep and Self-Driving Cars</title>
  <link>http://securityconversations.fireside.fm/charlie-miller-hacking-iphones-self-driving-cars</link>
  <guid isPermaLink="false">c59b2c9f-f374-403d-b8dc-684cac518d43</guid>
  <pubDate>Tue, 18 Oct 2022 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c59b2c9f-f374-403d-b8dc-684cac518d43.mp3" length="52629491" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 
- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the 'No More Free Bugs' campaign, the Jeep hack that led to a recall and his current work securing Cruise's self-driving fleet.</itunes:subtitle>
  <itunes:duration>59:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c59b2c9f-f374-403d-b8dc-684cac518d43/cover.jpg?v=1"/>
  <description>Episode sponsors:
- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)
Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the 'No More Free Bugs' campaign, the Jeep hack that led to a recall and his current work securing Cruise's self-driving fleet. Plus, an interesting take on iOS Lockdown Mode. 
</description>
  <itunes:keywords>zero-day, exploits, apple, iphone, macbook, jeep, self-driving cars, browsers, pwn2own, exploit sales</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the &#39;No More Free Bugs&#39; campaign, the Jeep hack that led to a recall and his current work securing Cruise&#39;s self-driving fleet. Plus, an interesting take on iOS Lockdown Mode.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the &#39;No More Free Bugs&#39; campaign, the Jeep hack that led to a recall and his current work securing Cruise&#39;s self-driving fleet. Plus, an interesting take on iOS Lockdown Mode.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Google's Shane Huntley on zero-days and the nation-state threat landscape</title>
  <link>http://securityconversations.fireside.fm/shane-huntley-google-tag</link>
  <guid isPermaLink="false">fb354ea5-acaf-443d-a97d-373e1adc92b0</guid>
  <pubDate>Mon, 04 Apr 2022 06:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fb354ea5-acaf-443d-a97d-373e1adc92b0.mp3" length="79196359" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</itunes:subtitle>
  <itunes:duration>40:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fb354ea5-acaf-443d-a97d-373e1adc92b0/cover.jpg?v=1"/>
  <description>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more... 
</description>
  <itunes:keywords>google, zero-day, nation-state, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Throwback: Zero-day exploit broker Chaouki Bekrar</title>
  <link>http://securityconversations.fireside.fm/chaouki-bekrar</link>
  <guid isPermaLink="false">6cc88aa8-eacc-4bb0-a992-c0172b5915ea</guid>
  <pubDate>Wed, 03 Mar 2021 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6cc88aa8-eacc-4bb0-a992-c0172b5915ea.mp3" length="21298595" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. 

The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar's team of hackers demo'd a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  

Please excuse the audio quality and background noise.</itunes:subtitle>
  <itunes:duration>24:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6cc88aa8-eacc-4bb0-a992-c0172b5915ea/cover.jpg?v=1"/>
  <description>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. 
The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar's team of hackers demo'd a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  
(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room). 
</description>
  <itunes:keywords>zero-day, exploits, pwn2own, zerodium, vupen, exploit brokers</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
