<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 08:45:34 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Russia”</title>
    <link>https://securityconversations.fireside.fm/tags/russia</link>
    <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click </title>
  <link>http://securityconversations.fireside.fm/salt-typhoon-iocs-google-disruption-unit-whatsapp-zero-click</link>
  <guid isPermaLink="false">1ec2ef88-a1b1-4df7-b737-24542f8462c8</guid>
  <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1ec2ef88-a1b1-4df7-b737-24542f8462c8.mp3" length="101225542" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.

Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 

We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>2:24:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1ec2ef88-a1b1-4df7-b737-24542f8462c8/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.
Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 
We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
</description>
  <itunes:keywords>Salt Typhoon, Cisco, Ivanti, YARA, Ghost Emperor, UNC5807, Dutch MIVD AIVD, Mirai, LIghtBasin, Google, active-defense, hacking back, WhatsApp, Apple, iOS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate</title>
  <link>http://securityconversations.fireside.fm/russia-ukraine-badsuccessor-debate</link>
  <guid isPermaLink="false">c29a1c55-dabb-4e6c-849f-9ce8e38326ac</guid>
  <pubDate>Fri, 23 May 2025 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c29a1c55-dabb-4e6c-849f-9ce8e38326ac.mp3" length="117693808" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 47:  We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.

The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 

Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>2:30:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c29a1c55-dabb-4e6c-849f-9ce8e38326ac/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.
The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 
Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Russia, China, Ukraine, GRU, Fancy Bear, Sofacy, APT28, Akamai, Microsoft, responsible disclosure, Signal, Windows Recall, NSO, Japan, OpenAI, Privacy</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Careto returns, IDA Pro pricing controversy, crypto's North Korea problem</title>
  <link>http://securityconversations.fireside.fm/tbp-ep15</link>
  <guid isPermaLink="false">dae2bdfe-9bc3-41af-88f1-c41782d35f84</guid>
  <pubDate>Fri, 04 Oct 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/dae2bdfe-9bc3-41af-88f1-c41782d35f84.mp3" length="73939478" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
  <itunes:duration>1:30:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/dae2bdfe-9bc3-41af-88f1-c41782d35f84/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 15:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Virus Bulletin, Careto, HexRays, IDA Pro, Yara, VirusTotal, North Korea, Russia, crypto, spyware, Paragon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1UaVJw7KE2Bl1p1ftqiE5g_CvMXe91eqNfv1_pKAx9uY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="VB abstract: The Mask has been unmasked again" rel="nofollow" href="https://www.virusbulletin.com/conference/vb2024/abstracts/mask-has-been-unmasked-again/">VB abstract: The Mask has been unmasked again</a></li><li><a title="Discover IDA 9.0" rel="nofollow" href="https://hex-rays.com/blog/discover-ida-9.0-exciting-new-features-and-improvements">Discover IDA 9.0</a></li><li><a title="Binary Ninja" rel="nofollow" href="https://binary.ninja/">Binary Ninja</a></li><li><a title="Vertex Synapse" rel="nofollow" href="https://vertex.link/synapse">Vertex Synapse</a></li><li><a title="YARA-X" rel="nofollow" href="https://virustotal.github.io/yara-x/">YARA-X</a></li><li><a title="Microsoft on Star Blizzard disruption" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/03/protecting-democratic-institutions-from-cyber-threats/">Microsoft on Star Blizzard disruption</a></li><li><a title="Tom Rid: The lies Russia tells itself" rel="nofollow" href="https://archive.ph/ZCFqK">Tom Rid: The lies Russia tells itself</a></li><li><a title="North Korea caught targeting German missile manufacturer" rel="nofollow" href="https://www.securityweek.com/north-korea-hackers-linked-to-breach-of-german-missile-manufacturer/">North Korea caught targeting German missile manufacturer</a></li><li><a title="How North Korea infiltrated the crypto industry" rel="nofollow" href="https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/">How North Korea infiltrated the crypto industry</a></li><li><a title="ICE signs $2M contract with spyware maker Paragon" rel="nofollow" href="https://archive.ph/nCEjT">ICE signs $2M contract with spyware maker Paragon</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1UaVJw7KE2Bl1p1ftqiE5g_CvMXe91eqNfv1_pKAx9uY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="VB abstract: The Mask has been unmasked again" rel="nofollow" href="https://www.virusbulletin.com/conference/vb2024/abstracts/mask-has-been-unmasked-again/">VB abstract: The Mask has been unmasked again</a></li><li><a title="Discover IDA 9.0" rel="nofollow" href="https://hex-rays.com/blog/discover-ida-9.0-exciting-new-features-and-improvements">Discover IDA 9.0</a></li><li><a title="Binary Ninja" rel="nofollow" href="https://binary.ninja/">Binary Ninja</a></li><li><a title="Vertex Synapse" rel="nofollow" href="https://vertex.link/synapse">Vertex Synapse</a></li><li><a title="YARA-X" rel="nofollow" href="https://virustotal.github.io/yara-x/">YARA-X</a></li><li><a title="Microsoft on Star Blizzard disruption" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/03/protecting-democratic-institutions-from-cyber-threats/">Microsoft on Star Blizzard disruption</a></li><li><a title="Tom Rid: The lies Russia tells itself" rel="nofollow" href="https://archive.ph/ZCFqK">Tom Rid: The lies Russia tells itself</a></li><li><a title="North Korea caught targeting German missile manufacturer" rel="nofollow" href="https://www.securityweek.com/north-korea-hackers-linked-to-breach-of-german-missile-manufacturer/">North Korea caught targeting German missile manufacturer</a></li><li><a title="How North Korea infiltrated the crypto industry" rel="nofollow" href="https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/">How North Korea infiltrated the crypto industry</a></li><li><a title="ICE signs $2M contract with spyware maker Paragon" rel="nofollow" href="https://archive.ph/nCEjT">ICE signs $2M contract with spyware maker Paragon</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep11: Cyberwarfare takes an ominous turn</title>
  <link>http://securityconversations.fireside.fm/cyberwarfare-takes-an-ominous-turn</link>
  <guid isPermaLink="false">f6139b28-a754-4280-9c11-a9de522d2348</guid>
  <pubDate>Fri, 06 Sep 2024 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f6139b28-a754-4280-9c11-a9de522d2348.mp3" length="59083969" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 11:  Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:15:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f6139b28-a754-4280-9c11-a9de522d2348/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.
Cast:  Juan Andres Guerrero-Saade  (https://x.com/juanandres_gs)(SentinelLabs), Costin Raiu (https://x.com/craiu) (Art of Noh), Ryan Naraine (https://x.com/ryanaraine) (SecurityWeek)
</description>
  <itunes:keywords>GRU, Russia, China, North Korea, South Korea, Unit 29155, Doppelganger, YARA, CISA, zero-day, influence operations, Skripal, skills shortage</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep7: Crowd2K and the kernel, PKFail supply chain failures, Paris trains sabotage and Russian Olympic attacks</title>
  <link>http://securityconversations.fireside.fm/tbp-ep7</link>
  <guid isPermaLink="false">644134aa-4795-434a-8b2d-9a748cab7561</guid>
  <pubDate>Fri, 02 Aug 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/644134aa-4795-434a-8b2d-9a748cab7561.mp3" length="66162188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 7:  In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.

The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:10:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/644134aa-4795-434a-8b2d-9a748cab7561/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 7:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.
The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.
Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>Microsoft, CrowdStrike, Windows kernel, Russia, cyberwar, Dan Geer, PKFail, secure boot bypass, software liability, infrastructure attacks, Olympics, prisoner exchange, Stuxnet</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Xbor_CopwaQiZpInKRXNnyf5CF80bInYP1Yvl_2-wQ0/edit?usp=sharing">Episode Transcript</a></li><li><a title="Microsoft VP David Weston on CrowdStrike issue" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/">Microsoft VP David Weston on CrowdStrike issue</a></li><li><a title="Delta seeking damages from CrowdStrike, Microsoft" rel="nofollow" href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html">Delta seeking damages from CrowdStrike, Microsoft</a></li><li><a title="Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme" rel="nofollow" href="https://www.securityweek.com/wealthy-russian-with-kremlin-ties-gets-9-years-in-prison-for-hacking-and-insider-trading-scheme/">Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme</a></li><li><a title="Industroyer" rel="nofollow" href="https://en.wikipedia.org/wiki/Industroyer">Industroyer</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon</a></li><li><a title="LABScon Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers</a></li><li><a title="Livestream from DEFCON 32" rel="nofollow" href="https://bishopfox.com/defcon-32-livestream">Livestream from DEFCON 32</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Xbor_CopwaQiZpInKRXNnyf5CF80bInYP1Yvl_2-wQ0/edit?usp=sharing">Episode Transcript</a></li><li><a title="Microsoft VP David Weston on CrowdStrike issue" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/">Microsoft VP David Weston on CrowdStrike issue</a></li><li><a title="Delta seeking damages from CrowdStrike, Microsoft" rel="nofollow" href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html">Delta seeking damages from CrowdStrike, Microsoft</a></li><li><a title="Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme" rel="nofollow" href="https://www.securityweek.com/wealthy-russian-with-kremlin-ties-gets-9-years-in-prison-for-hacking-and-insider-trading-scheme/">Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme</a></li><li><a title="Industroyer" rel="nofollow" href="https://en.wikipedia.org/wiki/Industroyer">Industroyer</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon</a></li><li><a title="LABScon Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers</a></li><li><a title="Livestream from DEFCON 32" rel="nofollow" href="https://bishopfox.com/defcon-32-livestream">Livestream from DEFCON 32</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Ep2: A deep-dive on disrupting and exposing nation-state malware ops</title>
  <link>http://securityconversations.fireside.fm/tbp-ep2</link>
  <guid isPermaLink="false">4a6fe671-fe7a-4699-ae08-fe99fd11f49f</guid>
  <pubDate>Sat, 29 Jun 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4a6fe671-fe7a-4699-ae08-fe99fd11f49f.mp3" length="60890552" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.

We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</itunes:subtitle>
  <itunes:duration>1:08:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4a6fe671-fe7a-4699-ae08-fe99fd11f49f/cover.jpg?v=2"/>
  <description>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. 
A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.
We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise. 
</description>
  <itunes:keywords>google project zero, disrupting nation-state operations, mercenary hacking, teamviewer breach, Polyfill supply chain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
