<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 15:07:18 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Surveillance”</title>
    <link>https://securityconversations.fireside.fm/tags/surveillance</link>
    <pubDate>Thu, 05 Mar 2026 16:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery</title>
  <link>http://securityconversations.fireside.fm/matthias-frielingsdorf-coruna-ios-exploit-kit</link>
  <guid isPermaLink="false">7669e3ee-6fd7-484c-a56f-bb6abb9f9207</guid>
  <pubDate>Thu, 05 Mar 2026 16:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7669e3ee-6fd7-484c-a56f-bb6abb9f9207.mp3" length="34892689" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to 'Coruna', an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. 

We talk about a "gut feeling" connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. 

Matthias walks through what iVerify can and can't do on Apple's locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</itunes:subtitle>
  <itunes:duration>39:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7669e3ee-6fd7-484c-a56f-bb6abb9f9207/cover.jpg?v=4"/>
  <description>(Presented by TLPBLACK (https://tlpblack.net): High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)
Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to 'Coruna', an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. 
We talk about a "gut feeling" connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. 
Matthias walks through what iVerify can and can't do on Apple's locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.
</description>
  <itunes:keywords>coruna, google, ios, apple, iphone, lockdown mode, peter williams, trenchant, exploit kit, china, russia, EDR, malware</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to &#39;Coruna&#39;, an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. </p>

<p>We talk about a &quot;gut feeling&quot; connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. </p>

<p>Matthias walks through what iVerify can and can&#39;t do on Apple&#39;s locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</p><p>Links:</p><ul><li><a title="Raw Transcript" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Raw Transcript</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)" rel="nofollow" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking">Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)</a></li><li><a title="Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals" rel="nofollow" href="https://archive.ph/r7jGc">Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals</a></li><li><a title="Lockdown Mode or Nothing " rel="nofollow" href="https://www.youtube.com/watch?v=fAhTPMmvrB0">Lockdown Mode or Nothing </a></li><li><a title="Zero-day reality check: iOS exploitation " rel="nofollow" href="https://www.youtube.com/watch?v=YTRQ56n0yHA">Zero-day reality check: iOS exploitation </a></li><li><a title="About Lockdown Mode (Apple)" rel="nofollow" href="https://support.apple.com/en-us/105120">About Lockdown Mode (Apple)</a></li><li><a title="Charlie Miller on hacking iPhones, Macbooks" rel="nofollow" href="https://securityconversations.com/episode/charlie-miller-on-hacking-iphones-macbooks-jeep-and-self-driving-cars/">Charlie Miller on hacking iPhones, Macbooks</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions">TLPBLACK</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to &#39;Coruna&#39;, an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. </p>

<p>We talk about a &quot;gut feeling&quot; connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. </p>

<p>Matthias walks through what iVerify can and can&#39;t do on Apple&#39;s locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</p><p>Links:</p><ul><li><a title="Raw Transcript" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Raw Transcript</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)" rel="nofollow" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking">Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)</a></li><li><a title="Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals" rel="nofollow" href="https://archive.ph/r7jGc">Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals</a></li><li><a title="Lockdown Mode or Nothing " rel="nofollow" href="https://www.youtube.com/watch?v=fAhTPMmvrB0">Lockdown Mode or Nothing </a></li><li><a title="Zero-day reality check: iOS exploitation " rel="nofollow" href="https://www.youtube.com/watch?v=YTRQ56n0yHA">Zero-day reality check: iOS exploitation </a></li><li><a title="About Lockdown Mode (Apple)" rel="nofollow" href="https://support.apple.com/en-us/105120">About Lockdown Mode (Apple)</a></li><li><a title="Charlie Miller on hacking iPhones, Macbooks" rel="nofollow" href="https://securityconversations.com/episode/charlie-miller-on-hacking-iphones-macbooks-jeep-and-self-driving-cars/">Charlie Miller on hacking iPhones, Macbooks</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions">TLPBLACK</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?</title>
  <link>http://securityconversations.fireside.fm/apple-new-memory-safety-anti-exploit-iphone-spyware</link>
  <guid isPermaLink="false">25a25e4d-d101-4a90-af30-ae85214f326e</guid>
  <pubDate>Tue, 09 Sep 2025 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25a25e4d-d101-4a90-af30-ae85214f326e.mp3" length="133531462" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. 

Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
  <itunes:duration>2:45:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25a25e4d-d101-4a90-af30-ae85214f326e/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. 
Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs),  Ryan Naraine (https://twitter.com/ryanaraine) and    Costin Raiu (https://twitter.com/craiu).
</description>
  <itunes:keywords>supply chain, Salesforce, Apple, China, Russia, Israel, Iran, Google, Microsoft, CISA, NPM, GitHub, Signal, Android, zero-day, WhatsApp, Meta, Apple, MIE, Memory Safety</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1TFCmWNzyYKL35z_3jmiaXs6xpR7egZOjyY4WhScJTzg/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Salesforce advisory on Salesloft Drift hack" rel="nofollow" href="https://status.salesforce.com/generalmessages/20000217">Salesforce advisory on Salesloft Drift hack</a></li><li><a title="Salesloft Drift Breach Tracker" rel="nofollow" href="https://www.driftbreach.com/">Salesloft Drift Breach Tracker</a></li><li><a title="Mandiant Drift and Salesloft Application Investigations" rel="nofollow" href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations">Mandiant Drift and Salesloft Application Investigations</a></li><li><a title="Widespread Data Theft Targets Salesforce Instances via Salesloft Drift" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift">Widespread Data Theft Targets Salesforce Instances via Salesloft Drift</a></li><li><a title="Large-Scale NPM Attack" rel="nofollow" href="https://cointelegraph.com/news/large-scale-npm-attack-compromised-less-50-dollars">Large-Scale NPM Attack</a></li><li><a title="NPM attack failed, with almost no victims" rel="nofollow" href="https://x.com/P3b7_/status/1965336272550899932">NPM attack failed, with almost no victims</a></li><li><a title="Chinese Hackers Pretended to Be a Top U.S. Lawmaker" rel="nofollow" href="https://archive.ph/KlhAo">Chinese Hackers Pretended to Be a Top U.S. Lawmaker</a></li><li><a title="Czech cyber agency warns against using services and products that send data to China" rel="nofollow" href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china">Czech cyber agency warns against using services and products that send data to China</a></li><li><a title="Apple Debuts Memory Integrity Enforcement (MIE)" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple Debuts Memory Integrity Enforcement (MIE)</a></li><li><a title="Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations" rel="nofollow" href="https://www.huntress.com/blog/rare-look-inside-attacker-operation">Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations</a></li><li><a title="LABScon 2025 Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2025/agenda">LABScon 2025 Agenda</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1TFCmWNzyYKL35z_3jmiaXs6xpR7egZOjyY4WhScJTzg/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Salesforce advisory on Salesloft Drift hack" rel="nofollow" href="https://status.salesforce.com/generalmessages/20000217">Salesforce advisory on Salesloft Drift hack</a></li><li><a title="Salesloft Drift Breach Tracker" rel="nofollow" href="https://www.driftbreach.com/">Salesloft Drift Breach Tracker</a></li><li><a title="Mandiant Drift and Salesloft Application Investigations" rel="nofollow" href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations">Mandiant Drift and Salesloft Application Investigations</a></li><li><a title="Widespread Data Theft Targets Salesforce Instances via Salesloft Drift" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift">Widespread Data Theft Targets Salesforce Instances via Salesloft Drift</a></li><li><a title="Large-Scale NPM Attack" rel="nofollow" href="https://cointelegraph.com/news/large-scale-npm-attack-compromised-less-50-dollars">Large-Scale NPM Attack</a></li><li><a title="NPM attack failed, with almost no victims" rel="nofollow" href="https://x.com/P3b7_/status/1965336272550899932">NPM attack failed, with almost no victims</a></li><li><a title="Chinese Hackers Pretended to Be a Top U.S. Lawmaker" rel="nofollow" href="https://archive.ph/KlhAo">Chinese Hackers Pretended to Be a Top U.S. Lawmaker</a></li><li><a title="Czech cyber agency warns against using services and products that send data to China" rel="nofollow" href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china">Czech cyber agency warns against using services and products that send data to China</a></li><li><a title="Apple Debuts Memory Integrity Enforcement (MIE)" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple Debuts Memory Integrity Enforcement (MIE)</a></li><li><a title="Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations" rel="nofollow" href="https://www.huntress.com/blog/rare-look-inside-attacker-operation">Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations</a></li><li><a title="LABScon 2025 Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2025/agenda">LABScon 2025 Agenda</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security</title>
  <link>http://securityconversations.fireside.fm/tom-rid-joins-the-show</link>
  <guid isPermaLink="false">a43a154a-06cd-4cf3-97fa-3945dc08f544</guid>
  <pubDate>Fri, 25 Apr 2025 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a43a154a-06cd-4cf3-97fa-3945dc08f544.mp3" length="77152373" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 

Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 

Cast: Thomas Rid, Juan Andres Guerrero-Saade and Ryan Naraine.  

* Costin Raiu is away this week.</itunes:subtitle>
  <itunes:duration>1:33:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a43a154a-06cd-4cf3-97fa-3945dc08f544/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 43:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 
Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 
Cast: Thomas Rid (https://sais.jhu.edu/users/trid2), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) and Ryan Naraine (https://twitter.com/ryanaraine).   Costin Raiu (https://twitter.com/craiu) is away this week. 
</description>
  <itunes:keywords>China, NSA, attribution, Volt Typhoon, Apple iOS, zero-day, CVE, MITRE, CISA, Microsoft, Europe, Anthropic, TP-Link</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>China doxxes NSA, CVE's funding crisis, Apple's zero-day troubles</title>
  <link>http://securityconversations.fireside.fm/china-doxxes-nsa-cisa-cve-apple-zero-days</link>
  <guid isPermaLink="false">4ef18f59-700b-4713-93c0-db500e43ed18</guid>
  <pubDate>Thu, 17 Apr 2025 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4ef18f59-700b-4713-93c0-db500e43ed18.mp3" length="82057286" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   

Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
  <itunes:duration>1:39:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4ef18f59-700b-4713-93c0-db500e43ed18/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 42:  We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   
Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.
Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine). 
</description>
  <itunes:keywords>China, NSA, attribution, Volt Typhoon, Apple iOS, zero-day, CVE, MITRE, CISA, Microsoft, Europe</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 42</strong>:  We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   </p>

<p>Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs&#39; exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LM4EHnm8-uHKIur7iqOp3y4Z1wrItETvASD5IRnKJqo/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="China names alleged NSA cyberattack agents" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/chinas-harbin-says-us-launched-advanced-cyber-attacks-winter-games-2025-04-15/">China names alleged NSA cyberattack agents</a></li><li><a title="WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks" rel="nofollow" href="https://archive.ph/yDvP3">WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks</a></li><li><a title="Apple Quashes Two Zero-Days With iOS, MacOS Patches" rel="nofollow" href="https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/">Apple Quashes Two Zero-Days With iOS, MacOS Patches</a></li><li><a title="Apple bulletin - iOS 18.4.1 Security Vulnerabilities" rel="nofollow" href="https://support.apple.com/en-us/122282">Apple bulletin - iOS 18.4.1 Security Vulnerabilities</a></li><li><a title="Android zero-days documented" rel="nofollow" href="https://source.android.com/docs/security/bulletin/2025-04-01">Android zero-days documented</a></li><li><a title="MITRE CVE Program Gets Last-Hour Funding Reprieve" rel="nofollow" href="https://www.securityweek.com/mitre-cve-program-gets-last-hour-funding-reprieve/">MITRE CVE Program Gets Last-Hour Funding Reprieve</a></li><li><a title="NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD" rel="nofollow" href="https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/">NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD</a></li><li><a title="EU issues US-bound staff with burner phones to avoid espionage" rel="nofollow" href="https://archive.ph/VcBLY">EU issues US-bound staff with burner phones to avoid espionage</a></li><li><a title="Exploitation of CLFS zero-day leads to ransomware " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/">Exploitation of CLFS zero-day leads to ransomware </a></li><li><a title="Google announces Sec-Gemini v1 cybersecurity model" rel="nofollow" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html">Google announces Sec-Gemini v1 cybersecurity model</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 42</strong>:  We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   </p>

<p>Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs&#39; exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LM4EHnm8-uHKIur7iqOp3y4Z1wrItETvASD5IRnKJqo/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="China names alleged NSA cyberattack agents" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/chinas-harbin-says-us-launched-advanced-cyber-attacks-winter-games-2025-04-15/">China names alleged NSA cyberattack agents</a></li><li><a title="WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks" rel="nofollow" href="https://archive.ph/yDvP3">WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks</a></li><li><a title="Apple Quashes Two Zero-Days With iOS, MacOS Patches" rel="nofollow" href="https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/">Apple Quashes Two Zero-Days With iOS, MacOS Patches</a></li><li><a title="Apple bulletin - iOS 18.4.1 Security Vulnerabilities" rel="nofollow" href="https://support.apple.com/en-us/122282">Apple bulletin - iOS 18.4.1 Security Vulnerabilities</a></li><li><a title="Android zero-days documented" rel="nofollow" href="https://source.android.com/docs/security/bulletin/2025-04-01">Android zero-days documented</a></li><li><a title="MITRE CVE Program Gets Last-Hour Funding Reprieve" rel="nofollow" href="https://www.securityweek.com/mitre-cve-program-gets-last-hour-funding-reprieve/">MITRE CVE Program Gets Last-Hour Funding Reprieve</a></li><li><a title="NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD" rel="nofollow" href="https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/">NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD</a></li><li><a title="EU issues US-bound staff with burner phones to avoid espionage" rel="nofollow" href="https://archive.ph/VcBLY">EU issues US-bound staff with burner phones to avoid espionage</a></li><li><a title="Exploitation of CLFS zero-day leads to ransomware " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/">Exploitation of CLFS zero-day leads to ransomware </a></li><li><a title="Google announces Sec-Gemini v1 cybersecurity model" rel="nofollow" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html">Google announces Sec-Gemini v1 cybersecurity model</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
