<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 12:00:55 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Salt Typhoon”</title>
    <link>https://securityconversations.fireside.fm/tags/salt%20typhoon</link>
    <pubDate>Sat, 07 Dec 2024 11:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Inside the Turla Playbook: Hijacking APTs and fourth-party espionage</title>
  <link>http://securityconversations.fireside.fm/inside-turla-playbook-hijacking-apt-fourth-party-collection</link>
  <guid isPermaLink="false">af6d806f-6e02-4b8a-b12c-ed94b0f61215</guid>
  <pubDate>Sat, 07 Dec 2024 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/af6d806f-6e02-4b8a-b12c-ed94b0f61215.mp3" length="89199523" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 24:  In this episode, we dig into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.

Cast: Juan Andres Guerrero-Saade, Costin Raiu, Ryan Naraine.</itunes:subtitle>
  <itunes:duration>1:47:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/af6d806f-6e02-4b8a-b12c-ed94b0f61215/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 24:  In this episode, we did into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu)and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>Monokle, Salt Typhoon, Turla, Solana, spyware, cyberespionage, ransomware, crypto, hacking, surveillance, encryption, regulations, elections, drones, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1agQ0TqskvYwnB69rmf2jcUReWMJQDfiIv6nrphsEWo0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian APT Turla Caught Stealing From Pakistani APT" rel="nofollow" href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/">Russian APT Turla Caught Stealing From Pakistani APT</a></li><li><a title="Snowblind: The Invisible Hand of Secret Blizzard" rel="nofollow" href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a></li><li><a title="Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog</a></li><li><a title="EpicTurla.com" rel="nofollow" href="https://epicturla.com">EpicTurla.com</a></li><li><a title="Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware" rel="nofollow" href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware</a></li><li><a title="Lookout Security research paper on Monokle spyware" rel="nofollow" href="https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf">Lookout Security research paper on Monokle spyware</a></li><li><a title="Parubets: How a programmer foiled his own FSB recruitment" rel="nofollow" href="https://dept.one/story/parubets/">Parubets: How a programmer foiled his own FSB recruitment</a></li><li><a title="CISA/FBI guidance to repel Salt Typhoon" rel="nofollow" href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">CISA/FBI guidance to repel Salt Typhoon</a></li><li><a title="US officials say they still have not expelled Chinese telco hackers" rel="nofollow" href="https://archive.ph/pncES">US officials say they still have not expelled Chinese telco hackers</a></li><li><a title="Solana backdoored in supply chain hack" rel="nofollow" href="https://github.com/solana-labs/solana-web3.js/releases">Solana backdoored in supply chain hack</a></li><li><a title="Romania&#39;s top court annuls first round of presidential vote won by far-right candidate" rel="nofollow" href="https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b">Romania's top court annuls first round of presidential vote won by far-right candidate</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1agQ0TqskvYwnB69rmf2jcUReWMJQDfiIv6nrphsEWo0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian APT Turla Caught Stealing From Pakistani APT" rel="nofollow" href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/">Russian APT Turla Caught Stealing From Pakistani APT</a></li><li><a title="Snowblind: The Invisible Hand of Secret Blizzard" rel="nofollow" href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a></li><li><a title="Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog</a></li><li><a title="EpicTurla.com" rel="nofollow" href="https://epicturla.com">EpicTurla.com</a></li><li><a title="Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware" rel="nofollow" href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware</a></li><li><a title="Lookout Security research paper on Monokle spyware" rel="nofollow" href="https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf">Lookout Security research paper on Monokle spyware</a></li><li><a title="Parubets: How a programmer foiled his own FSB recruitment" rel="nofollow" href="https://dept.one/story/parubets/">Parubets: How a programmer foiled his own FSB recruitment</a></li><li><a title="CISA/FBI guidance to repel Salt Typhoon" rel="nofollow" href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">CISA/FBI guidance to repel Salt Typhoon</a></li><li><a title="US officials say they still have not expelled Chinese telco hackers" rel="nofollow" href="https://archive.ph/pncES">US officials say they still have not expelled Chinese telco hackers</a></li><li><a title="Solana backdoored in supply chain hack" rel="nofollow" href="https://github.com/solana-labs/solana-web3.js/releases">Solana backdoored in supply chain hack</a></li><li><a title="Romania&#39;s top court annuls first round of presidential vote won by far-right candidate" rel="nofollow" href="https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b">Romania's top court annuls first round of presidential vote won by far-right candidate</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Typhoons and Blizzards: Cyberespionage and national security on front burner</title>
  <link>http://securityconversations.fireside.fm/tbp-ep16</link>
  <guid isPermaLink="false">b270f0b1-359a-43e1-b218-7b1329f43093</guid>
  <pubDate>Fri, 11 Oct 2024 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b270f0b1-359a-43e1-b218-7b1329f43093.mp3" length="52742416" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
  <itunes:duration>1:09:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b270f0b1-359a-43e1-b218-7b1329f43093/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 16:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Cybersecurity Threats, APT29 Cyber Attacks, Salt Typhoon Hacks, Espionage and Cyber Warfare, National Security Risks, SVR cyber threat, APT29 tactics, Russia cyber espionage, Chinese cyber actors, Salt Typhoon vulnerability, Microsoft Teams exploitation, JetBrains TeamCity vulnerability, Supply chain cyber attack, National security cyber risks, Cyber threat indicators</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="NCSC exposé on SVR/APT29 history and tactics" rel="nofollow" href="https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities">NCSC exposé on SVR/APT29 history and tactics</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://attack.mitre.org/groups/G0016/">APT29 / Midnight Blizzard</a></li><li><a title="VIDEO: A Surprise Encounter With A Telco APT" rel="nofollow" href="https://www.youtube.com/watch?v=xCU47bJoLho&amp;ab_channel=HackInTheBoxSecurityConference">VIDEO: A Surprise Encounter With A Telco APT</a></li><li><a title="The Athens Affair - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/the-athens-affair">The Athens Affair - IEEE Spectrum</a> &mdash; How some extremely smart hackers pulled off the most audacious cell-network break-in ever</li><li><a title="Wikipedia: The Athens Affair" rel="nofollow" href="https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305">Wikipedia: The Athens Affair</a></li><li><a title="WSJ report on Salt Typhoon hacks" rel="nofollow" href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951">WSJ report on Salt Typhoon hacks</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Microsoft Confirms Exploited Zero-Day in Windows Management Console" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-confirms-exploited-zero-day-in-windows-management-console/">Microsoft Confirms Exploited Zero-Day in Windows Management Console</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="NCSC exposé on SVR/APT29 history and tactics" rel="nofollow" href="https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities">NCSC exposé on SVR/APT29 history and tactics</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://attack.mitre.org/groups/G0016/">APT29 / Midnight Blizzard</a></li><li><a title="VIDEO: A Surprise Encounter With A Telco APT" rel="nofollow" href="https://www.youtube.com/watch?v=xCU47bJoLho&amp;ab_channel=HackInTheBoxSecurityConference">VIDEO: A Surprise Encounter With A Telco APT</a></li><li><a title="The Athens Affair - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/the-athens-affair">The Athens Affair - IEEE Spectrum</a> &mdash; How some extremely smart hackers pulled off the most audacious cell-network break-in ever</li><li><a title="Wikipedia: The Athens Affair" rel="nofollow" href="https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305">Wikipedia: The Athens Affair</a></li><li><a title="WSJ report on Salt Typhoon hacks" rel="nofollow" href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951">WSJ report on Salt Typhoon hacks</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Microsoft Confirms Exploited Zero-Day in Windows Management Console" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-confirms-exploited-zero-day-in-windows-management-console/">Microsoft Confirms Exploited Zero-Day in Windows Management Console</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
