<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 18 Apr 2026 01:47:12 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Targeted Attacks”</title>
    <link>https://securityconversations.fireside.fm/tags/targeted-attacks</link>
    <pubDate>Mon, 03 Sep 2018 04:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Costin Raiu, Global Director, GReAT, Kaspersky Lab</title>
  <link>http://securityconversations.fireside.fm/costin-raiu-great</link>
  <guid isPermaLink="false">c49758d1-bc1a-43d5-8eee-5f91c6d7021f</guid>
  <pubDate>Mon, 03 Sep 2018 04:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c49758d1-bc1a-43d5-8eee-5f91c6d7021f.mp3" length="47022834" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</itunes:subtitle>
  <itunes:duration>51:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c49758d1-bc1a-43d5-8eee-5f91c6d7021f/cover.jpg?v=3"/>
  <description>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Robert M. Lee, Chief Executive Officer, Dragos Inc.</title>
  <link>http://securityconversations.fireside.fm/robert-m-lee-dragos</link>
  <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=488</guid>
  <pubDate>Thu, 10 May 2018 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/12cf4cec-e81b-4f38-b8ff-956979ab0e93.mp3" length="65117301" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The founder and CEO of Dragos, Inc. Robert M. Lee cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</itunes:subtitle>
  <itunes:duration>54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/12cf4cec-e81b-4f38-b8ff-956979ab0e93/cover.jpg?v=4"/>
  <description>&lt;p&gt;The founder and CEO of Dragos, Inc. Robert M. Lee (&lt;a href="https://twitter.com/RobertMLee"&gt;RobertMLee&lt;/a&gt;) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3"&gt;https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3&lt;/a&gt;
 
</description>
  <content:encoded>
    <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
  </itunes:summary>
</item>
<item>
  <title>Tim Maurer, Scholar, Carnegie Endowment for International Peace</title>
  <link>http://securityconversations.fireside.fm/tim-maurer-carnegie-endowment-for-international-peace</link>
  <guid isPermaLink="false">4cddd571-1e73-4625-acb1-321bb47e706f</guid>
  <pubDate>Mon, 05 Mar 2018 15:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4cddd571-1e73-4625-acb1-321bb47e706f.mp3" length="29020105" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</itunes:subtitle>
  <itunes:duration>32:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4cddd571-1e73-4625-acb1-321bb47e706f/cover.jpg?v=3"/>
  <description>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Christopher Ahlberg, CEO, Recorded Future</title>
  <link>http://securityconversations.fireside.fm/christopher-ahlberg-recorded-future</link>
  <guid isPermaLink="false">6fc1d3cb-e930-484f-84e6-8c521ddb9e97</guid>
  <pubDate>Tue, 30 Jan 2018 14:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fc1d3cb-e930-484f-84e6-8c521ddb9e97.mp3" length="33265132" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</itunes:subtitle>
  <itunes:duration>29:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fc1d3cb-e930-484f-84e6-8c521ddb9e97/cover.jpg?v=4"/>
  <description>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Kim Zetter, Journalist and Author</title>
  <link>http://securityconversations.fireside.fm/kim-zetter</link>
  <guid isPermaLink="false">bf98d79b-204e-4a5f-9418-75c5b554a26e</guid>
  <pubDate>Fri, 29 Dec 2017 13:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/bf98d79b-204e-4a5f-9418-75c5b554a26e.mp3" length="56197391" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</itunes:subtitle>
  <itunes:duration>52:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
  <description>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry. 
</description>
  <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
