<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 06:53:39 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Snowflake”</title>
    <link>https://securityconversations.fireside.fm/tags/snowflake</link>
    <pubDate>Fri, 12 Jul 2024 15:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep4: The AT&amp;T mega-breach, iPhone mercenary spyware, Microsoft zero-days</title>
  <link>http://securityconversations.fireside.fm/tbp-ep4</link>
  <guid isPermaLink="false">37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f</guid>
  <pubDate>Fri, 12 Jul 2024 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f.mp3" length="61000643" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 4:  Listen as the hosts delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:11:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f/cover.jpg?v=2"/>
  <description>Three Buddy Problem - Episode 4:  The boys delve into the massive AT&amp;amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.
Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).
</description>
  <itunes:keywords>AT&amp;T, Snowflake, Microsoft, CSRB, Apple, CISA</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
