<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 15 Apr 2026 12:49:09 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Stuxnet”</title>
    <link>https://securityconversations.fireside.fm/tags/stuxnet</link>
    <pubDate>Fri, 05 Apr 2024 12:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Costin Raiu joins the XZ Utils backdoor investigation</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-xz-backdoor</link>
  <guid isPermaLink="false">f664c77a-dbbc-41a0-b392-7b4cd7223523</guid>
  <pubDate>Fri, 05 Apr 2024 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f664c77a-dbbc-41a0-b392-7b4cd7223523.mp3" length="47530772" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- XZ.fail backdoor detector  (https://xz.fail)

Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why 'Tia Jan' is the handiwork of a cunning nation-state.

Based on all the clues available, Costin pinpoints three main suspects -- North Korea's Lazarus, China's APT41 or Russia's APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</itunes:subtitle>
  <itunes:duration>51:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f664c77a-dbbc-41a0-b392-7b4cd7223523/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
XZ.fail backdoor detector  (https://xz.fail)
Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why 'Tia Jan' is the handiwork of a cunning nation-state.
Based on all the clues available, Costin pinpoints three main suspects -- North Korea's Lazarus, China's APT41 or Russia's APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains. 
</description>
  <itunes:keywords>XZ Utils, APT, Stuxnet, SolarWinds, Lazarus, APT29</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p><p>Links:</p><ul><li><a title="Binarly XZ backdoor detector" rel="nofollow" href="https://xz.fail/">Binarly XZ backdoor detector</a></li><li><a title="XZ Utils Backdoor FAQ (by Dan Goodin)" rel="nofollow" href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">XZ Utils Backdoor FAQ (by Dan Goodin)</a></li><li><a title="CISA advisory on backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094">CISA advisory on backdoor</a></li><li><a title="The JiaT75 (Jia Tan) timeline" rel="nofollow" href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor">The JiaT75 (Jia Tan) timeline</a></li><li><a title="Unedited transcript" rel="nofollow" href="https://docs.google.com/document/d/1S2Fs3TJyA1SHfKOHXvZr9oFdWzG7HYCd9oa17sm02zM/edit">Unedited transcript</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p><p>Links:</p><ul><li><a title="Binarly XZ backdoor detector" rel="nofollow" href="https://xz.fail/">Binarly XZ backdoor detector</a></li><li><a title="XZ Utils Backdoor FAQ (by Dan Goodin)" rel="nofollow" href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">XZ Utils Backdoor FAQ (by Dan Goodin)</a></li><li><a title="CISA advisory on backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094">CISA advisory on backdoor</a></li><li><a title="The JiaT75 (Jia Tan) timeline" rel="nofollow" href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor">The JiaT75 (Jia Tan) timeline</a></li><li><a title="Unedited transcript" rel="nofollow" href="https://docs.google.com/document/d/1S2Fs3TJyA1SHfKOHXvZr9oFdWzG7HYCd9oa17sm02zM/edit">Unedited transcript</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
