<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 24 Apr 2026 22:31:01 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Spyware”</title>
    <link>https://securityconversations.fireside.fm/tags/spyware</link>
    <pubDate>Sat, 29 Nov 2025 11:30:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture</title>
  <link>http://securityconversations.fireside.fm/regulatory-retreats-russian-ai-fault-line</link>
  <guid isPermaLink="false">7c947947-5644-4334-baea-80d629cfb457</guid>
  <pubDate>Sat, 29 Nov 2025 11:30:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7c947947-5644-4334-baea-80d629cfb457.mp3" length="97441193" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 74: We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.

We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
  <itunes:duration>1:57:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7c947947-5644-4334-baea-80d629cfb457/cover.jpg?v=3"/>
  <description>(Presented by Material Security (https://material.security): We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.)
Three Buddy Problem - Episode 74:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.
We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu). 
</description>
  <itunes:keywords>Microsoft, CISO, CYBERWARCON, Geneva Convention, Shai-Hulud, npm, supply chain, GitHub, CISA, Apple, iOS, Android, spyware, Arctic Wolf, Russia, Ukraine, FCC, Amazon, telcos, Material Security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1t0o3sQmcv3EUJyMZCM25MH3SPB4cFAhVfB3qMvwvOQ4/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft CISO LinkedIn comments" rel="nofollow" href="https://www.linkedin.com/posts/igor-tsyganskiy-9385951_last-week-at-cyberwarcon-i-gave-a-short-activity-7398088148834086912-_Y1A/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAfLqABykGPZb2fgxnSm0cjGdhFUlQg658">Microsoft CISO LinkedIn comments</a></li><li><a title="Shai Hulud 2.0 Strikes Again" rel="nofollow" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Shai Hulud 2.0 Strikes Again</a></li><li><a title="Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed" rel="nofollow" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed</a></li><li><a title="CISA guidance on mobile spyware on iOS, Android" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-11/guidance-mobile-communications-best-practices-20251124_508c.pdf">CISA guidance on mobile spyware on iOS, Android</a></li><li><a title="NSO Group argues WhatsApp injunction threatens existence" rel="nofollow" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/">NSO Group argues WhatsApp injunction threatens existence</a></li><li><a title="Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine" rel="nofollow" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/">Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine</a></li><li><a title="FCC revokes telecom cybersecurity rules after Salt Typhoon hacks" rel="nofollow" href="https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-vote">FCC revokes telecom cybersecurity rules after Salt Typhoon hacks</a></li><li><a title="FCC Chairman statement on removing telco rules" rel="nofollow" href="https://www.fcc.gov/news-events/blog/2025/10/29/halloween-treats">FCC Chairman statement on removing telco rules</a></li><li><a title="Amazon Is Using Specialized AI Agents for Deep Bug Hunting" rel="nofollow" href="https://archive.ph/Vq28p">Amazon Is Using Specialized AI Agents for Deep Bug Hunting</a></li><li><a title="Anthropic CEO called to testify on AI cyber threats" rel="nofollow" href="https://www.axios.com/2025/11/26/anthropic-google-cloud-quantum-xchange-house-homeland-hearing">Anthropic CEO called to testify on AI cyber threats</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Material Security (Book a demo)" rel="nofollow" href="https://material.security/product">Material Security (Book a demo)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1t0o3sQmcv3EUJyMZCM25MH3SPB4cFAhVfB3qMvwvOQ4/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft CISO LinkedIn comments" rel="nofollow" href="https://www.linkedin.com/posts/igor-tsyganskiy-9385951_last-week-at-cyberwarcon-i-gave-a-short-activity-7398088148834086912-_Y1A/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAfLqABykGPZb2fgxnSm0cjGdhFUlQg658">Microsoft CISO LinkedIn comments</a></li><li><a title="Shai Hulud 2.0 Strikes Again" rel="nofollow" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Shai Hulud 2.0 Strikes Again</a></li><li><a title="Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed" rel="nofollow" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed</a></li><li><a title="CISA guidance on mobile spyware on iOS, Android" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-11/guidance-mobile-communications-best-practices-20251124_508c.pdf">CISA guidance on mobile spyware on iOS, Android</a></li><li><a title="NSO Group argues WhatsApp injunction threatens existence" rel="nofollow" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/">NSO Group argues WhatsApp injunction threatens existence</a></li><li><a title="Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine" rel="nofollow" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/">Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine</a></li><li><a title="FCC revokes telecom cybersecurity rules after Salt Typhoon hacks" rel="nofollow" href="https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-vote">FCC revokes telecom cybersecurity rules after Salt Typhoon hacks</a></li><li><a title="FCC Chairman statement on removing telco rules" rel="nofollow" href="https://www.fcc.gov/news-events/blog/2025/10/29/halloween-treats">FCC Chairman statement on removing telco rules</a></li><li><a title="Amazon Is Using Specialized AI Agents for Deep Bug Hunting" rel="nofollow" href="https://archive.ph/Vq28p">Amazon Is Using Specialized AI Agents for Deep Bug Hunting</a></li><li><a title="Anthropic CEO called to testify on AI cyber threats" rel="nofollow" href="https://www.axios.com/2025/11/26/anthropic-google-cloud-quantum-xchange-house-homeland-hearing">Anthropic CEO called to testify on AI cyber threats</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Material Security (Book a demo)" rel="nofollow" href="https://material.security/product">Material Security (Book a demo)</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?</title>
  <link>http://securityconversations.fireside.fm/apple-new-memory-safety-anti-exploit-iphone-spyware</link>
  <guid isPermaLink="false">25a25e4d-d101-4a90-af30-ae85214f326e</guid>
  <pubDate>Tue, 09 Sep 2025 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25a25e4d-d101-4a90-af30-ae85214f326e.mp3" length="133531462" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. 

Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>2:45:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25a25e4d-d101-4a90-af30-ae85214f326e/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. 
Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
</description>
  <itunes:keywords>supply chain, Salesforce, Apple, China, Russia, Israel, Iran, Google, Microsoft, CISA, NPM, GitHub, Signal, Android, zero-day, WhatsApp, Meta, Apple, MIE, Memory Safety</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1TFCmWNzyYKL35z_3jmiaXs6xpR7egZOjyY4WhScJTzg/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Salesforce advisory on Salesloft Drift hack" rel="nofollow" href="https://status.salesforce.com/generalmessages/20000217">Salesforce advisory on Salesloft Drift hack</a></li><li><a title="Salesloft Drift Breach Tracker" rel="nofollow" href="https://www.driftbreach.com/">Salesloft Drift Breach Tracker</a></li><li><a title="Mandiant Drift and Salesloft Application Investigations" rel="nofollow" href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations">Mandiant Drift and Salesloft Application Investigations</a></li><li><a title="Widespread Data Theft Targets Salesforce Instances via Salesloft Drift" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift">Widespread Data Theft Targets Salesforce Instances via Salesloft Drift</a></li><li><a title="Large-Scale NPM Attack" rel="nofollow" href="https://cointelegraph.com/news/large-scale-npm-attack-compromised-less-50-dollars">Large-Scale NPM Attack</a></li><li><a title="NPM attack failed, with almost no victims" rel="nofollow" href="https://x.com/P3b7_/status/1965336272550899932">NPM attack failed, with almost no victims</a></li><li><a title="Chinese Hackers Pretended to Be a Top U.S. Lawmaker" rel="nofollow" href="https://archive.ph/KlhAo">Chinese Hackers Pretended to Be a Top U.S. Lawmaker</a></li><li><a title="Czech cyber agency warns against using services and products that send data to China" rel="nofollow" href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china">Czech cyber agency warns against using services and products that send data to China</a></li><li><a title="Apple Debuts Memory Integrity Enforcement (MIE)" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple Debuts Memory Integrity Enforcement (MIE)</a></li><li><a title="Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations" rel="nofollow" href="https://www.huntress.com/blog/rare-look-inside-attacker-operation">Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations</a></li><li><a title="LABScon 2025 Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2025/agenda">LABScon 2025 Agenda</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1TFCmWNzyYKL35z_3jmiaXs6xpR7egZOjyY4WhScJTzg/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Salesforce advisory on Salesloft Drift hack" rel="nofollow" href="https://status.salesforce.com/generalmessages/20000217">Salesforce advisory on Salesloft Drift hack</a></li><li><a title="Salesloft Drift Breach Tracker" rel="nofollow" href="https://www.driftbreach.com/">Salesloft Drift Breach Tracker</a></li><li><a title="Mandiant Drift and Salesloft Application Investigations" rel="nofollow" href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations">Mandiant Drift and Salesloft Application Investigations</a></li><li><a title="Widespread Data Theft Targets Salesforce Instances via Salesloft Drift" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift">Widespread Data Theft Targets Salesforce Instances via Salesloft Drift</a></li><li><a title="Large-Scale NPM Attack" rel="nofollow" href="https://cointelegraph.com/news/large-scale-npm-attack-compromised-less-50-dollars">Large-Scale NPM Attack</a></li><li><a title="NPM attack failed, with almost no victims" rel="nofollow" href="https://x.com/P3b7_/status/1965336272550899932">NPM attack failed, with almost no victims</a></li><li><a title="Chinese Hackers Pretended to Be a Top U.S. Lawmaker" rel="nofollow" href="https://archive.ph/KlhAo">Chinese Hackers Pretended to Be a Top U.S. Lawmaker</a></li><li><a title="Czech cyber agency warns against using services and products that send data to China" rel="nofollow" href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china">Czech cyber agency warns against using services and products that send data to China</a></li><li><a title="Apple Debuts Memory Integrity Enforcement (MIE)" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple Debuts Memory Integrity Enforcement (MIE)</a></li><li><a title="Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations" rel="nofollow" href="https://www.huntress.com/blog/rare-look-inside-attacker-operation">Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations</a></li><li><a title="LABScon 2025 Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2025/agenda">LABScon 2025 Agenda</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security</title>
  <link>http://securityconversations.fireside.fm/tom-rid-joins-the-show</link>
  <guid isPermaLink="false">a43a154a-06cd-4cf3-97fa-3945dc08f544</guid>
  <pubDate>Fri, 25 Apr 2025 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a43a154a-06cd-4cf3-97fa-3945dc08f544.mp3" length="77152373" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 

Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 

Cast: Thomas Rid, Juan Andres Guerrero-Saade and Ryan Naraine.  

* Costin Raiu is away this week.</itunes:subtitle>
  <itunes:duration>1:33:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a43a154a-06cd-4cf3-97fa-3945dc08f544/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 43:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 
Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 
Cast: Thomas Rid (https://sais.jhu.edu/users/trid2), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) and Ryan Naraine (https://twitter.com/ryanaraine).   Costin Raiu (https://twitter.com/craiu) is away this week. 
</description>
  <itunes:keywords>China, NSA, attribution, Volt Typhoon, Apple iOS, zero-day, CVE, MITRE, CISA, Microsoft, Europe, Anthropic, TP-Link</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Careto returns, IDA Pro pricing controversy, crypto's North Korea problem</title>
  <link>http://securityconversations.fireside.fm/tbp-ep15</link>
  <guid isPermaLink="false">dae2bdfe-9bc3-41af-88f1-c41782d35f84</guid>
  <pubDate>Fri, 04 Oct 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/dae2bdfe-9bc3-41af-88f1-c41782d35f84.mp3" length="73939478" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
  <itunes:duration>1:30:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/dae2bdfe-9bc3-41af-88f1-c41782d35f84/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 15:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
</description>
  <itunes:keywords>Virus Bulletin, Careto, HexRays, IDA Pro, Yara, VirusTotal, North Korea, Russia, crypto, spyware, Paragon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1UaVJw7KE2Bl1p1ftqiE5g_CvMXe91eqNfv1_pKAx9uY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="VB abstract: The Mask has been unmasked again" rel="nofollow" href="https://www.virusbulletin.com/conference/vb2024/abstracts/mask-has-been-unmasked-again/">VB abstract: The Mask has been unmasked again</a></li><li><a title="Discover IDA 9.0" rel="nofollow" href="https://hex-rays.com/blog/discover-ida-9.0-exciting-new-features-and-improvements">Discover IDA 9.0</a></li><li><a title="Binary Ninja" rel="nofollow" href="https://binary.ninja/">Binary Ninja</a></li><li><a title="Vertex Synapse" rel="nofollow" href="https://vertex.link/synapse">Vertex Synapse</a></li><li><a title="YARA-X" rel="nofollow" href="https://virustotal.github.io/yara-x/">YARA-X</a></li><li><a title="Microsoft on Star Blizzard disruption" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/03/protecting-democratic-institutions-from-cyber-threats/">Microsoft on Star Blizzard disruption</a></li><li><a title="Tom Rid: The lies Russia tells itself" rel="nofollow" href="https://archive.ph/ZCFqK">Tom Rid: The lies Russia tells itself</a></li><li><a title="North Korea caught targeting German missile manufacturer" rel="nofollow" href="https://www.securityweek.com/north-korea-hackers-linked-to-breach-of-german-missile-manufacturer/">North Korea caught targeting German missile manufacturer</a></li><li><a title="How North Korea infiltrated the crypto industry" rel="nofollow" href="https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/">How North Korea infiltrated the crypto industry</a></li><li><a title="ICE signs $2M contract with spyware maker Paragon" rel="nofollow" href="https://archive.ph/nCEjT">ICE signs $2M contract with spyware maker Paragon</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1UaVJw7KE2Bl1p1ftqiE5g_CvMXe91eqNfv1_pKAx9uY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="VB abstract: The Mask has been unmasked again" rel="nofollow" href="https://www.virusbulletin.com/conference/vb2024/abstracts/mask-has-been-unmasked-again/">VB abstract: The Mask has been unmasked again</a></li><li><a title="Discover IDA 9.0" rel="nofollow" href="https://hex-rays.com/blog/discover-ida-9.0-exciting-new-features-and-improvements">Discover IDA 9.0</a></li><li><a title="Binary Ninja" rel="nofollow" href="https://binary.ninja/">Binary Ninja</a></li><li><a title="Vertex Synapse" rel="nofollow" href="https://vertex.link/synapse">Vertex Synapse</a></li><li><a title="YARA-X" rel="nofollow" href="https://virustotal.github.io/yara-x/">YARA-X</a></li><li><a title="Microsoft on Star Blizzard disruption" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/03/protecting-democratic-institutions-from-cyber-threats/">Microsoft on Star Blizzard disruption</a></li><li><a title="Tom Rid: The lies Russia tells itself" rel="nofollow" href="https://archive.ph/ZCFqK">Tom Rid: The lies Russia tells itself</a></li><li><a title="North Korea caught targeting German missile manufacturer" rel="nofollow" href="https://www.securityweek.com/north-korea-hackers-linked-to-breach-of-german-missile-manufacturer/">North Korea caught targeting German missile manufacturer</a></li><li><a title="How North Korea infiltrated the crypto industry" rel="nofollow" href="https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/">How North Korea infiltrated the crypto industry</a></li><li><a title="ICE signs $2M contract with spyware maker Paragon" rel="nofollow" href="https://archive.ph/nCEjT">ICE signs $2M contract with spyware maker Paragon</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
