<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 13 Apr 2026 08:01:09 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem - Episodes Tagged with “Xiaomi”</title>
    <link>https://securityconversations.fireside.fm/tags/xiaomi</link>
    <pubDate>Fri, 23 Aug 2024 10:00:00 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Technology"/>
<item>
  <title>Ep9: The blurring lines between nation-state APTs and the ransomware epidemic</title>
  <link>http://securityconversations.fireside.fm/tbp-ep9</link>
  <guid isPermaLink="false">7e54af0b-f1c0-4741-8b5c-e90eddd617b7</guid>
  <pubDate>Fri, 23 Aug 2024 10:00:00 -0700</pubDate>
  <author>Security Conversations</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7e54af0b-f1c0-4741-8b5c-e90eddd617b7.mp3" length="57472403" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Security Conversations</itunes:author>
  <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 9:  On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 

Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024  keynote stage.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
  <itunes:duration>1:06:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7e54af0b-f1c0-4741-8b5c-e90eddd617b7/cover.jpg?v=1"/>
  <description>Three Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 
Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.
Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)
</description>
  <itunes:keywords>Taiwan, Hitcon, APTs, ransomware, visibility, attribution, threat intelligence, MIVD, Dutch Intel, Netherlands, Japan, Switzerland, cyber operations, ransomware, Iranian hacking, election interference, patching shenanigans, Xiaomi</itunes:keywords>
  <content:encoded>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
