<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 15 Apr 2026 12:50:42 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Volt Typhoon”</title>
    <link>https://securityconversations.fireside.fm/tags/volt%20typhoon</link>
    <pubDate>Fri, 30 Aug 2024 11:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep10: Volt Typhoon zero-day, Russia's APT29 reusing spyware exploits, Pavel Durov's arrest</title>
  <link>http://securityconversations.fireside.fm/tbp-ep10</link>
  <guid isPermaLink="false">a8b95520-0c50-46d8-bc16-25bbab115bb9</guid>
  <pubDate>Fri, 30 Aug 2024 11:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a8b95520-0c50-46d8-bc16-25bbab115bb9.mp3" length="60633397" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Three Buddy Problem - Episode 10 -- Top stories this week: Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France. Plus, the NSA is launching a podcast.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:18:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a8b95520-0c50-46d8-bc16-25bbab115bb9/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 10: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France.  Plus, the NSA is launching a podcast.
Hosts: Costin Raiu (https://x.com/craiu) (Art of Noh), Juan Andres Guerrero-Saade  (https://x.com/juanandres_gs)(SentinelLabs), Ryan Naraine (https://x.com/ryanaraine) (SecurityWeek)
</description>
  <itunes:keywords>Volt Typhoon, Versa Director, zero-day, network-based attacks, ransomware, APT groups, exploit reuse, iOS exploitation, Pavel Durov, Telegram, encryption, LABScon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 10</strong>: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia&#39;s APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France.  Plus, the NSA is launching a podcast.</p>

<p><strong>Hosts:</strong> <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Ke2F-qUJpxb6Mnx7wOFYeteoZqfDs_bPqg0jXAyXtGU/edit#heading=h.roy1ekwa04iz">Transcript (unedited)</a></li><li><a title="China&#39;s Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-caught-exploiting-versa-networks-sd-wan-zero-day/">China's Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs</a></li><li><a title="Versa Director Zero-Day Exploitation - Black Lotus Labs" rel="nofollow" href="https://blog.lumen.com/taking-the-crossroads-the-versa-director-zero-day-exploitation/">Versa Director Zero-Day Exploitation - Black Lotus Labs</a></li><li><a title="CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability" rel="nofollow" href="https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/">CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability</a></li><li><a title="Google TAG: APT29 using same exploits as Intellexa, NSO Group" rel="nofollow" href="https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/">Google TAG: APT29 using same exploits as Intellexa, NSO Group</a></li><li><a title="Russia&#39;s APT29 Reusing Exploits From Spyware Merchants" rel="nofollow" href="https://www.securityweek.com/google-catches-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/">Russia's APT29 Reusing Exploits From Spyware Merchants</a></li><li><a title="Official Pavel Durov charges (PDF)" rel="nofollow" href="https://www.tribunal-de-paris.justice.fr/sites/default/files/2024-08/2024-08-26%20-%20CP%20TELEGRAM%20.pdf">Official Pavel Durov charges (PDF)</a></li><li><a title="WSJ: Pavel Durov&#39;s iPhone was hacked by France, UAE" rel="nofollow" href="https://archive.ph/FFPt2">WSJ: Pavel Durov's iPhone was hacked by France, UAE</a></li><li><a title="Microsoft Calls EDR Summit" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/08/23/microsoft-to-host-windows-endpoint-security-ecosystem-summit-in-september/">Microsoft Calls EDR Summit</a></li><li><a title="NSA to Launch ‘No Such Podcast’" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/article/3888139/nsa-to-launch-no-such-podcast-pulling-back-curtain-on-mission-culture-people/">NSA to Launch ‘No Such Podcast’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/apt29">APT29 / Midnight Blizzard</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 10</strong>: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia&#39;s APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France.  Plus, the NSA is launching a podcast.</p>

<p><strong>Hosts:</strong> <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Ke2F-qUJpxb6Mnx7wOFYeteoZqfDs_bPqg0jXAyXtGU/edit#heading=h.roy1ekwa04iz">Transcript (unedited)</a></li><li><a title="China&#39;s Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-caught-exploiting-versa-networks-sd-wan-zero-day/">China's Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs</a></li><li><a title="Versa Director Zero-Day Exploitation - Black Lotus Labs" rel="nofollow" href="https://blog.lumen.com/taking-the-crossroads-the-versa-director-zero-day-exploitation/">Versa Director Zero-Day Exploitation - Black Lotus Labs</a></li><li><a title="CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability" rel="nofollow" href="https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/">CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability</a></li><li><a title="Google TAG: APT29 using same exploits as Intellexa, NSO Group" rel="nofollow" href="https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/">Google TAG: APT29 using same exploits as Intellexa, NSO Group</a></li><li><a title="Russia&#39;s APT29 Reusing Exploits From Spyware Merchants" rel="nofollow" href="https://www.securityweek.com/google-catches-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/">Russia's APT29 Reusing Exploits From Spyware Merchants</a></li><li><a title="Official Pavel Durov charges (PDF)" rel="nofollow" href="https://www.tribunal-de-paris.justice.fr/sites/default/files/2024-08/2024-08-26%20-%20CP%20TELEGRAM%20.pdf">Official Pavel Durov charges (PDF)</a></li><li><a title="WSJ: Pavel Durov&#39;s iPhone was hacked by France, UAE" rel="nofollow" href="https://archive.ph/FFPt2">WSJ: Pavel Durov's iPhone was hacked by France, UAE</a></li><li><a title="Microsoft Calls EDR Summit" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/08/23/microsoft-to-host-windows-endpoint-security-ecosystem-summit-in-september/">Microsoft Calls EDR Summit</a></li><li><a title="NSA to Launch ‘No Such Podcast’" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/article/3888139/nsa-to-launch-no-such-podcast-pulling-back-curtain-on-mission-culture-people/">NSA to Launch ‘No Such Podcast’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/apt29">APT29 / Midnight Blizzard</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers</title>
  <link>http://securityconversations.fireside.fm/danny-adamitis-volt-typhoon-botnet</link>
  <guid isPermaLink="false">73110ffd-bb15-40c4-924d-5bf7b89ed152</guid>
  <pubDate>Fri, 05 Jan 2024 09:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/73110ffd-bb15-40c4-924d-5bf7b89ed152.mp3" length="34693170" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.

Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</itunes:subtitle>
  <itunes:duration>34:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/73110ffd-bb15-40c4-924d-5bf7b89ed152/cover.jpg?v=1"/>
  <description>Episode sponsors:
Binarly, the supply chain security experts (https://binarly.io)
FwHunt (https://fwhunt.run)
Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.
Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer. 
</description>
  <itunes:keywords>Volt Typoon, China, Critical Infrastructure, routers</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
