<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 14 May 2026 10:54:23 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Windows”</title>
    <link>https://securityconversations.fireside.fm/tags/windows</link>
    <pubDate>Fri, 26 Jul 2024 01:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?</title>
  <link>http://securityconversations.fireside.fm/tbp-ep6</link>
  <guid isPermaLink="false">874c67ec-26cd-4395-8713-df1b58629041</guid>
  <pubDate>Fri, 26 Jul 2024 01:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/874c67ec-26cd-4395-8713-df1b58629041.mp3" length="71350827" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 6:  As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.

Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:16:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/874c67ec-26cd-4395-8713-df1b58629041/cover.jpg?v=2"/>
  <description>&lt;p&gt;&lt;strong&gt;Three Buddy Problem - Episode 6&lt;/strong&gt;:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.&lt;/p&gt;

&lt;p&gt;Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hosts:&lt;/strong&gt; Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)&lt;/p&gt;
</description>
  <itunes:keywords>CrowdStrike, Windows, BSOD, detection update, testing, validation, EDR, detection, APT45, groups, IOCs, North Korea, NSO lawsuit, surveillance industry, exploits, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Microsoft's Justin Campbell on offensive security research</title>
  <link>http://securityconversations.fireside.fm/justin-campbell-microsoft</link>
  <guid isPermaLink="false">367c5dd6-8956-42a5-b804-887991a31ff3</guid>
  <pubDate>Sat, 08 Jan 2022 12:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/367c5dd6-8956-42a5-b804-887991a31ff3.mp3" length="23909293" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces.</itunes:subtitle>
  <itunes:duration>27:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/367c5dd6-8956-42a5-b804-887991a31ff3/cover.jpg?v=1"/>
  <description>&lt;p&gt;Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces. &lt;/p&gt;
</description>
  <itunes:keywords>microsoft, windows, memory safety, shift-left, secure coding, zero-days</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>David Weston, Principal Security Engineering Manager, Microsoft</title>
  <link>http://securityconversations.fireside.fm/david-weston-microsoft</link>
  <guid isPermaLink="false">904ca3fd-d3eb-481f-8a0e-819e0bfd87c4</guid>
  <pubDate>Sun, 24 Jun 2018 18:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4.mp3" length="37022785" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem.</itunes:subtitle>
  <itunes:duration>46:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4/cover.jpg?v=3"/>
  <description>&lt;p&gt;David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem. &lt;/p&gt;
</description>
  <content:encoded>
    <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
