<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/feed.xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:fireside="https://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>feed01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 06 Mar 2026 14:36:17 -0600</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Three Buddy Problem</title>
    <link>http://securityconversations.fireside.fm</link>
    <atom:link href="https://feeds.fireside.fm/securityconversations/rss" rel="self" type="application/rss+xml"/>
    <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub"/>
    <pubDate>Fri, 06 Mar 2026 13:35:58 -0700</pubDate>
    <description>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</description>
    <language>en-us</language>
    <copyright>© 2026 The Naraine Group</copyright>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A Security Conversations podcast</itunes:subtitle>
    <itunes:author>Security Conversations</itunes:author>
    <itunes:summary>The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. 
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
&lt;a href="https://twitter.com/ryanaraine"&gt;Connect with Ryan on Twitter&lt;/a&gt; (Open DMs).
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
    <itunes:explicit>false</itunes:explicit>
    <itunes:keywords>cybersecurity, ciso, infosec, security, hacking, information security, research</itunes:keywords>
    <itunes:owner>
      <itunes:name>Security Conversations</itunes:name>
      <itunes:email>naraine@gmail.com</itunes:email>
    </itunes:owner>
    <podcast:locked email="naraine@gmail.com">yes</podcast:locked>
    <podcast:podping usesPodping="true"/>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
    <item>
      <title>Trenchant, Peter Williams, and the proliferation of a Shadow Brokers-level iOS exploit framework</title>
      <link>http://securityconversations.fireside.fm/trenchant-peter-williams-coruna-ios-exploit-framework</link>
      <guid isPermaLink="false">502a67da-c82e-4e95-bfae-642c47b5faee</guid>
      <pubDate>Fri, 06 Mar 2026 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/502a67da-c82e-4e95-bfae-642c47b5faee.mp3" length="94165630" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 88: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.

Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>1:59:43</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/502a67da-c82e-4e95-bfae-642c47b5faee/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 88</strong>: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.</p>

<p>Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Peter Williams, Trenchant, Apple, iOS, Trenchant, iVerify, exploit kit, condor, FBI, San Bernardino, zero-days, Kaspersky, surveillance, Israel, Iran, cyberwar, Anthropic, OpenAI, Aardvark, Codex</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 88</strong>: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.</p>

<p>Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (raw, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1hjqvWGMuFA7K5oQ5ZWC8ZbMRg9sHsHYXEAi-liB2d9w/edit?usp=sharing">Transcript (raw, AI-generated)</a></li><li><a title="Thinkst Canary (how it works)" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary (how it works)</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery" rel="nofollow" href="https://securityconversations.com/episode/matthias-frielingsdorf-on-the-mysterious-coruna-ios-exploit-kit-discovery/">Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery</a></li><li><a title="Matthias Frielingsdorf on Coruna (raw transcript)" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Matthias Frielingsdorf on Coruna (raw transcript)</a></li><li><a title="Coruna-related hashes on VirusTotal" rel="nofollow" href="https://x.com/Now_on_VT/status/2029887800909156681">Coruna-related hashes on VirusTotal</a></li><li><a title="Kaspersky: No signs Coruna iPhone exploit kit made by US" rel="nofollow" href="https://www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/">Kaspersky: No signs Coruna iPhone exploit kit made by US</a></li><li><a title="Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI" rel="nofollow" href="https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/">Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI</a></li><li><a title="2025 Zero-Days in Review (Google)" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review">2025 Zero-Days in Review (Google)</a></li><li><a title="FBI investigating ‘suspicious’ cyber activities on critical surveillance network" rel="nofollow" href="https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network?cid=ios_app">FBI investigating ‘suspicious’ cyber activities on critical surveillance network</a></li><li><a title="Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes" rel="nofollow" href="https://archive.ph/KLQSf">Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes</a></li><li><a title="Interplay between Iranian Targeting of IP Cameras and Physical Warfare" rel="nofollow" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/">Interplay between Iranian Targeting of IP Cameras and Physical Warfare</a></li><li><a title="Israel says it knocked out Iran’s cyber warfare headquarters" rel="nofollow" href="https://archive.ph/4IUgU">Israel says it knocked out Iran’s cyber warfare headquarters</a></li><li><a title="Amazon Bahrain facility targeted for U.S. military support" rel="nofollow" href="https://www.cnbc.com/2026/03/04/amazon-bahrain-data-centers-targeted-iran-drone-strike.html">Amazon Bahrain facility targeted for U.S. military support</a></li><li><a title="Full transcript of Anthropic CEO Dario Amodei interview" rel="nofollow" href="https://www.cbsnews.com/news/anthropic-ceo-dario-amodei-full-transcript/">Full transcript of Anthropic CEO Dario Amodei interview</a></li><li><a title="Codex Security (formerly Aardvark) now in research preview" rel="nofollow" href="https://openai.com/index/codex-security-now-in-research-preview/">Codex Security (formerly Aardvark) now in research preview</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 88</strong>: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals.</p>

<p>Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI’s disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic’s public stumbles.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (raw, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1hjqvWGMuFA7K5oQ5ZWC8ZbMRg9sHsHYXEAi-liB2d9w/edit?usp=sharing">Transcript (raw, AI-generated)</a></li><li><a title="Thinkst Canary (how it works)" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary (how it works)</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery" rel="nofollow" href="https://securityconversations.com/episode/matthias-frielingsdorf-on-the-mysterious-coruna-ios-exploit-kit-discovery/">Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery</a></li><li><a title="Matthias Frielingsdorf on Coruna (raw transcript)" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Matthias Frielingsdorf on Coruna (raw transcript)</a></li><li><a title="Coruna-related hashes on VirusTotal" rel="nofollow" href="https://x.com/Now_on_VT/status/2029887800909156681">Coruna-related hashes on VirusTotal</a></li><li><a title="Kaspersky: No signs Coruna iPhone exploit kit made by US" rel="nofollow" href="https://www.theregister.com/2026/03/04/kaspersky_dismisses_claims_that_coruna/">Kaspersky: No signs Coruna iPhone exploit kit made by US</a></li><li><a title="Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI" rel="nofollow" href="https://www.washingtonpost.com/technology/2021/04/14/azimuth-san-bernardino-apple-iphone-fbi/">Azimuth unlocked the San Bernardino shooter’s iPhone for the FBI</a></li><li><a title="2025 Zero-Days in Review (Google)" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review">2025 Zero-Days in Review (Google)</a></li><li><a title="FBI investigating ‘suspicious’ cyber activities on critical surveillance network" rel="nofollow" href="https://edition.cnn.com/2026/03/05/politics/fbi-investigating-cyber-breach-critical-surveillance-network?cid=ios_app">FBI investigating ‘suspicious’ cyber activities on critical surveillance network</a></li><li><a title="Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes" rel="nofollow" href="https://archive.ph/KLQSf">Iranian Hacking Groups Go Dark Amid US, Israeli Military Strikes</a></li><li><a title="Interplay between Iranian Targeting of IP Cameras and Physical Warfare" rel="nofollow" href="https://research.checkpoint.com/2026/interplay-between-iranian-targeting-of-ip-cameras-and-physical-warfare-in-the-middle-east/">Interplay between Iranian Targeting of IP Cameras and Physical Warfare</a></li><li><a title="Israel says it knocked out Iran’s cyber warfare headquarters" rel="nofollow" href="https://archive.ph/4IUgU">Israel says it knocked out Iran’s cyber warfare headquarters</a></li><li><a title="Amazon Bahrain facility targeted for U.S. military support" rel="nofollow" href="https://www.cnbc.com/2026/03/04/amazon-bahrain-data-centers-targeted-iran-drone-strike.html">Amazon Bahrain facility targeted for U.S. military support</a></li><li><a title="Full transcript of Anthropic CEO Dario Amodei interview" rel="nofollow" href="https://www.cbsnews.com/news/anthropic-ceo-dario-amodei-full-transcript/">Full transcript of Anthropic CEO Dario Amodei interview</a></li><li><a title="Codex Security (formerly Aardvark) now in research preview" rel="nofollow" href="https://openai.com/index/codex-security-now-in-research-preview/">Codex Security (formerly Aardvark) now in research preview</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ufBdEhqD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ufBdEhqD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Matthias Frielingsdorf on the mysterious Coruna iOS exploit kit discovery</title>
      <link>http://securityconversations.fireside.fm/matthias-frielingsdorf-coruna-ios-exploit-kit</link>
      <guid isPermaLink="false">7669e3ee-6fd7-484c-a56f-bb6abb9f9207</guid>
      <pubDate>Thu, 05 Mar 2026 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7669e3ee-6fd7-484c-a56f-bb6abb9f9207.mp3" length="34892689" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to 'Coruna', an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. 

We talk about a "gut feeling" connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. 

Matthias walks through what iVerify can and can't do on Apple's locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</itunes:subtitle>
      <itunes:duration>39:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7669e3ee-6fd7-484c-a56f-bb6abb9f9207/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to &#39;Coruna&#39;, an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. </p>

<p>We talk about a &quot;gut feeling&quot; connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. </p>

<p>Matthias walks through what iVerify can and can&#39;t do on Apple&#39;s locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</p>]]>
      </description>
      <itunes:keywords>coruna, google, ios, apple, iphone, lockdown mode, peter williams, trenchant, exploit kit, china, russia, EDR, malware</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to &#39;Coruna&#39;, an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. </p>

<p>We talk about a &quot;gut feeling&quot; connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. </p>

<p>Matthias walks through what iVerify can and can&#39;t do on Apple&#39;s locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</p><p>Links:</p><ul><li><a title="Raw Transcript" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Raw Transcript</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)" rel="nofollow" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking">Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)</a></li><li><a title="Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals" rel="nofollow" href="https://archive.ph/r7jGc">Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals</a></li><li><a title="Lockdown Mode or Nothing " rel="nofollow" href="https://www.youtube.com/watch?v=fAhTPMmvrB0">Lockdown Mode or Nothing </a></li><li><a title="Zero-day reality check: iOS exploitation " rel="nofollow" href="https://www.youtube.com/watch?v=YTRQ56n0yHA">Zero-day reality check: iOS exploitation </a></li><li><a title="About Lockdown Mode (Apple)" rel="nofollow" href="https://support.apple.com/en-us/105120">About Lockdown Mode (Apple)</a></li><li><a title="Charlie Miller on hacking iPhones, Macbooks" rel="nofollow" href="https://securityconversations.com/episode/charlie-miller-on-hacking-iphones-macbooks-jeep-and-self-driving-cars/">Charlie Miller on hacking iPhones, Macbooks</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions">TLPBLACK</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to &#39;Coruna&#39;, an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. </p>

<p>We talk about a &quot;gut feeling&quot; connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. </p>

<p>Matthias walks through what iVerify can and can&#39;t do on Apple&#39;s locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.</p><p>Links:</p><ul><li><a title="Raw Transcript" rel="nofollow" href="https://docs.google.com/document/d/192CYhxiWAGXdhU7EEYB2SXLUq24f1E03/edit">Raw Transcript</a></li><li><a title="Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/coruna-powerful-ios-exploit-kit">Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit</a></li><li><a title="iVerify Details First Known Mass iOS Attack" rel="nofollow" href="https://iverify.io/press-releases/first-known-mass-ios-attack">iVerify Details First Known Mass iOS Attack</a></li><li><a title="Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)" rel="nofollow" href="https://iverify.io/blog/coruna-inside-the-nation-state-grade-ios-exploit-kit-we-ve-been-tracking">Coruna: Inside the Nation-State-Grade iOS Exploit Kit (iVerify)</a></li><li><a title="Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals" rel="nofollow" href="https://archive.ph/r7jGc">Wired: A Possible US Government iPhone-Hacking Toolkit Is Now in the Hands of Foreign Spies and Criminals</a></li><li><a title="Lockdown Mode or Nothing " rel="nofollow" href="https://www.youtube.com/watch?v=fAhTPMmvrB0">Lockdown Mode or Nothing </a></li><li><a title="Zero-day reality check: iOS exploitation " rel="nofollow" href="https://www.youtube.com/watch?v=YTRQ56n0yHA">Zero-day reality check: iOS exploitation </a></li><li><a title="About Lockdown Mode (Apple)" rel="nofollow" href="https://support.apple.com/en-us/105120">About Lockdown Mode (Apple)</a></li><li><a title="Charlie Miller on hacking iPhones, Macbooks" rel="nofollow" href="https://securityconversations.com/episode/charlie-miller-on-hacking-iphones-macbooks-jeep-and-self-driving-cars/">Charlie Miller on hacking iPhones, Macbooks</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions">TLPBLACK</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+4naveIlg</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+4naveIlg" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Threat Hunter Greg Linares on the modern ransomware playbook</title>
      <link>http://securityconversations.fireside.fm/greg-linares-modern-ransomware-playbook</link>
      <guid isPermaLink="false">b9815070-450a-43d3-8970-287ef88e305c</guid>
      <pubDate>Tue, 03 Mar 2026 13:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b9815070-450a-43d3-8970-287ef88e305c.mp3" length="42939010" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. 

The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</itunes:subtitle>
      <itunes:duration>49:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b9815070-450a-43d3-8970-287ef88e305c/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. </p>

<p>The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</p>]]>
      </description>
      <itunes:keywords>huntress, greg linares, ransomware, akira, ransomhub, medusa, qilin, rmm abuse, remote monitoring, lolbins, LOTL</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. </p>

<p>The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Huntress 2025 Cyber Threat Report" rel="nofollow" href="https://www.huntress.com/resources/2025-cyber-threat-report">Huntress 2025 Cyber Threat Report</a></li><li><a title="Microsoft: Think before you Click(Fix)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">Microsoft: Think before you Click(Fix)</a></li><li><a title="Akira Ransomware" rel="nofollow" href="https://www.ic3.gov/CSA/2025/251113.pdf">Akira Ransomware</a></li><li><a title="CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a">CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software</a></li><li><a title="Ep9: The blurring lines between nation-state APTs and the ransomware epidemic " rel="nofollow" href="https://securityconversations.com/episode/ep9-the-blurring-lines-between-nation-state-apts-and-the-ransomware-epidemic/">Ep9: The blurring lines between nation-state APTs and the ransomware epidemic </a></li><li><a title="Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines" rel="nofollow" href="https://www.securityweek.com/chinese-apt-tools-found-in-ransomware-schemes-blurring-attribution-lines/">Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p>Huntress threat intelligence analyst Greg Linares shares insights on the modern ransomware ecosystem, including how crews operate like businesses and why Akira, Medusa, RansomHub, and Qilin cause so much damage. Plus, signs of overlap between ransomware and nation-state activity, what “time to ransom” really means for defenders, and why techniques like ClickFix and credential theft keep working at scale. </p>

<p>The conversation also covers the surge in RMM tool abuse, how “living off the land” attacks can unfold without traditional malware, and the basic defenses smaller organizations can prioritize.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Huntress 2025 Cyber Threat Report" rel="nofollow" href="https://www.huntress.com/resources/2025-cyber-threat-report">Huntress 2025 Cyber Threat Report</a></li><li><a title="Microsoft: Think before you Click(Fix)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">Microsoft: Think before you Click(Fix)</a></li><li><a title="Akira Ransomware" rel="nofollow" href="https://www.ic3.gov/CSA/2025/251113.pdf">Akira Ransomware</a></li><li><a title="CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-025a">CISA: Protecting Against Malicious Use of Remote Monitoring and Management Software</a></li><li><a title="Ep9: The blurring lines between nation-state APTs and the ransomware epidemic " rel="nofollow" href="https://securityconversations.com/episode/ep9-the-blurring-lines-between-nation-state-apts-and-the-ransomware-epidemic/">Ep9: The blurring lines between nation-state APTs and the ransomware epidemic </a></li><li><a title="Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines" rel="nofollow" href="https://www.securityweek.com/chinese-apt-tools-found-in-ransomware-schemes-blurring-attribution-lines/">Chinese APT Tools Found in Ransomware Schemes, Blurring Attribution Lines</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+hOwx2fZ_</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+hOwx2fZ_" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>War in Iran, Anthropic v Pentagon, Trenchant zero-day sanctions, AI stock market shocks</title>
      <link>http://securityconversations.fireside.fm/war-iran-anthropic-usgov-trenchant-zero-day-sanctions</link>
      <guid isPermaLink="false">7d707098-e32e-45a7-9069-fb8a34620302</guid>
      <pubDate>Sat, 28 Feb 2026 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7d707098-e32e-45a7-9069-fb8a34620302.mp3" length="105895784" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 87:  We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:08:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7d707098-e32e-45a7-9069-fb8a34620302/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Israel, Iran, cyberwar, Peter Williams, Operation Zero, Trenchant, Anthropic, OpenAI, CrowdStrike, Cisco Talos, China, DeepSeek, Meta, cyberespionage</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1pVVw2L0YShpPy1ArqBLUcvApTJcjFxSQBYUepjj1yF0/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/#pricing">Thinkst Canary</a></li><li><a title="Live updates: US and Israel strike Iran" rel="nofollow" href="https://apnews.com/live/live-updates-israel-iran-february-28-2026">Live updates: US and Israel strike Iran</a></li><li><a title="Episode 80: Hamid Kashfi on the situation in Iran" rel="nofollow" href="https://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela">Episode 80: Hamid Kashfi on the situation in Iran</a></li><li><a title="‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers" rel="nofollow" href="https://www.politico.com/news/2026/02/26/incoherent-hegseths-anthropic-ultimatum-confounds-ai-policymakers-00800135">‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers</a></li><li><a title="Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks" rel="nofollow" href="https://www.linkedin.com/pulse/anthropics-new-claude-ai-security-tool-wipes-out-17jje/">Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks</a></li><li><a title="CrowdStrike CEO responds to stock price hit" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:7431417202505064448/">CrowdStrike CEO responds to stock price hit</a></li><li><a title="Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets" rel="nofollow" href="https://www.state.gov/releases/office-of-the-spokesperson/2026/02/designation-of-russia-based-zero-day-exploits-broker-and-affiliates-for-theft-of-u-s-trade-secrets/">Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets</a></li><li><a title="Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools " rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools </a></li><li><a title="Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison" rel="nofollow" href="https://www.zetter-zeroday.com/trenchant-exec-who-sold-his-employers-zero-day-exploits-to-russian-buyer-sentenced-to-7-years-in-prison/">Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison</a></li><li><a title="AWS says AI-augmented threat actor accesses FortiGate devices at scale" rel="nofollow" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AWS says AI-augmented threat actor accesses FortiGate devices at scale</a></li><li><a title="Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" rel="nofollow" href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Active exploitation of Cisco Catalyst SD-WAN by UAT-8616</a></li><li><a title="Anthropic Claud Code Security" rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claud Code Security</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></li><li><a title="iPhone and iPad approved to handle classified NATO information" rel="nofollow" href="https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/">iPhone and iPad approved to handle classified NATO information</a></li><li><a title="Fortinet Achieves Certification for Secure Product Development" rel="nofollow" href="https://www.fortinet.com/blog/operational-technology/fortinet-achieves-iec-62443-4-1-ml2-certification-for-secure-product-development">Fortinet Achieves Certification for Secure Product Development</a></li><li><a title="Cisco SD-WAN threat hunting guide" rel="nofollow" href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Cisco SD-WAN threat hunting guide</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 87</strong>: We wake up to news of U.S./Israel military action against Iran and the expected fallout, including Tehran’s cyber capabilities and proxy risks. Plus: Anthropic’s clash with the Pentagon over AI use in warfare, market shockwaves from AI-driven security tools, mass layoffs tied to automation, Trenchant exec sentencing and sanctions in the exploit trade, and fresh questions around Cisco’s SD-WAN breach and supply-chain trust.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1pVVw2L0YShpPy1ArqBLUcvApTJcjFxSQBYUepjj1yF0/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/#pricing">Thinkst Canary</a></li><li><a title="Live updates: US and Israel strike Iran" rel="nofollow" href="https://apnews.com/live/live-updates-israel-iran-february-28-2026">Live updates: US and Israel strike Iran</a></li><li><a title="Episode 80: Hamid Kashfi on the situation in Iran" rel="nofollow" href="https://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela">Episode 80: Hamid Kashfi on the situation in Iran</a></li><li><a title="‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers" rel="nofollow" href="https://www.politico.com/news/2026/02/26/incoherent-hegseths-anthropic-ultimatum-confounds-ai-policymakers-00800135">‘Incoherent’: Hegseth’s Anthropic ultimatum confounds AI policymakers</a></li><li><a title="Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks" rel="nofollow" href="https://www.linkedin.com/pulse/anthropics-new-claude-ai-security-tool-wipes-out-17jje/">Anthropic Claude AI Security Tool Wipes Out Over $15 Billion From Cybersecurity Stocks</a></li><li><a title="CrowdStrike CEO responds to stock price hit" rel="nofollow" href="https://www.linkedin.com/feed/update/urn:li:activity:7431417202505064448/">CrowdStrike CEO responds to stock price hit</a></li><li><a title="Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets" rel="nofollow" href="https://www.state.gov/releases/office-of-the-spokesperson/2026/02/designation-of-russia-based-zero-day-exploits-broker-and-affiliates-for-theft-of-u-s-trade-secrets/">Designation of Zero-Day Exploits Broker for Theft of U.S. Trade Secrets</a></li><li><a title="Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools " rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0404">Treasury Sanctions Exploit Broker Network for Theft and Sale of U.S. Government Cyber Tools </a></li><li><a title="Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison" rel="nofollow" href="https://www.zetter-zeroday.com/trenchant-exec-who-sold-his-employers-zero-day-exploits-to-russian-buyer-sentenced-to-7-years-in-prison/">Trenchant Exec Who Sold Zero-Day Exploits to Russian Buyer Sentenced to 7 Years in Prison</a></li><li><a title="AWS says AI-augmented threat actor accesses FortiGate devices at scale" rel="nofollow" href="https://aws.amazon.com/blogs/security/ai-augmented-threat-actor-accesses-fortigate-devices-at-scale/">AWS says AI-augmented threat actor accesses FortiGate devices at scale</a></li><li><a title="Active exploitation of Cisco Catalyst SD-WAN by UAT-8616" rel="nofollow" href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Active exploitation of Cisco Catalyst SD-WAN by UAT-8616</a></li><li><a title="Anthropic Claud Code Security" rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claud Code Security</a></li><li><a title="Anthropic: Detecting and preventing distillation attacks" rel="nofollow" href="https://www.anthropic.com/news/detecting-and-preventing-distillation-attacks">Anthropic: Detecting and preventing distillation attacks</a></li><li><a title="GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/distillation-experimentation-integration-ai-adversarial-use">GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use</a></li><li><a title="iPhone and iPad approved to handle classified NATO information" rel="nofollow" href="https://www.apple.com/newsroom/2026/02/iphone-and-ipad-approved-to-handle-classified-nato-information/">iPhone and iPad approved to handle classified NATO information</a></li><li><a title="Fortinet Achieves Certification for Secure Product Development" rel="nofollow" href="https://www.fortinet.com/blog/operational-technology/fortinet-achieves-iec-62443-4-1-ml2-certification-for-secure-product-development">Fortinet Achieves Certification for Secure Product Development</a></li><li><a title="Cisco SD-WAN threat hunting guide" rel="nofollow" href="https://www.cyber.gov.au/sites/default/files/2026-02/ACSC-led%20Cisco%20SD-WAN%20Hunt%20Guide.pdf">Cisco SD-WAN threat hunting guide</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+WECqRrSi</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+WECqRrSi" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>GitLab doxxes North Korea .gov hackers; fresh Ivanti zero-days; AI addiction and human purpose</title>
      <link>http://securityconversations.fireside.fm/gitlab-north-korea-ivanti-zero-day-ai-human-purpose</link>
      <guid isPermaLink="false">6850debe-7ea0-498e-9857-123d30c24e8d</guid>
      <pubDate>Fri, 20 Feb 2026 01:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6850debe-7ea0-498e-9857-123d30c24e8d.mp3" length="106607056" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by TLPBLACK - High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

Three Buddy Problem - Episode 86: We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  

Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:16:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6850debe-7ea0-498e-9857-123d30c24e8d/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 86</strong>:  We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  </p>

<p>Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>GitLab, North Korea, Contageous Interview, China, Russia, Ivanti, Unit 42, zero-day, Mandiant, CVE-2026-22769, Dell, OpenAI, Aardvard, Codex Security, Deutsche Bahn, hybrid war, AIVD, MIVD, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 86</strong>:  We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  </p>

<p>Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions-pdns">TLPBLACK</a></li><li><a title="GitLab exposes North Korean malware tradecraft" rel="nofollow" href="https://about.gitlab.com/blog/gitlab-threat-intelligence-reveals-north-korean-tradecraft/">GitLab exposes North Korean malware tradecraft</a></li><li><a title="Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)" rel="nofollow" href="https://sp4rk.medium.com/beyond-the-backdoor-how-contagious-interview-is-surgically-tampering-with-metamask-wallets-0314ae901d85">Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)</a></li><li><a title="Critical Vulnerabilities in Ivanti EPMM Exploited" rel="nofollow" href="https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/">Critical Vulnerabilities in Ivanti EPMM Exploited</a></li><li><a title="Dell RecoverPoint for Virtual Machines Zero-Day" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day">Dell RecoverPoint for Virtual Machines Zero-Day</a></li><li><a title="Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability" rel="nofollow" href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a></li><li><a title="Critical Dell bug exploited for two years" rel="nofollow" href="https://www.thestack.technology/dell-critical-vulnerability-vmware-cve-202622769/">Critical Dell bug exploited for two years</a></li><li><a title="OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT" rel="nofollow" href="https://openai.com/index/introducing-lockdown-mode-and-elevated-risk-labels-in-chatgpt/">OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT</a></li><li><a title="OpenAI is rebranding Aardvark " rel="nofollow" href="https://x.com/btibor91/status/2024613054638608558">OpenAI is rebranding Aardvark </a></li><li><a title="Anthropic Claude Code Security " rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claude Code Security </a></li><li><a title="Jason Lang: Real Human Concerns In The Age of AI" rel="nofollow" href="https://x.com/curi0usJack/status/2024184571974000984">Jason Lang: Real Human Concerns In The Age of AI</a></li><li><a title="JAGS&#39; batteries-included Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' batteries-included Claude Code SDLC config</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://tlpblack.net" rel="nofollow">TLPBLACK</a>: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.</em>)</p>

<p><strong>Three Buddy Problem - Episode 86</strong>:  We dig into GitLab’s explosive look at North Korea’s “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent.  </p>

<p>Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple’s shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/#solutions-pdns">TLPBLACK</a></li><li><a title="GitLab exposes North Korean malware tradecraft" rel="nofollow" href="https://about.gitlab.com/blog/gitlab-threat-intelligence-reveals-north-korean-tradecraft/">GitLab exposes North Korean malware tradecraft</a></li><li><a title="Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)" rel="nofollow" href="https://sp4rk.medium.com/beyond-the-backdoor-how-contagious-interview-is-surgically-tampering-with-metamask-wallets-0314ae901d85">Beyond the Backdoor: How Contagious Interview Is Surgically Tampering with MetaMask Wallets (Seongsu Park)</a></li><li><a title="Critical Vulnerabilities in Ivanti EPMM Exploited" rel="nofollow" href="https://unit42.paloaltonetworks.com/ivanti-cve-2026-1281-cve-2026-1340/">Critical Vulnerabilities in Ivanti EPMM Exploited</a></li><li><a title="Dell RecoverPoint for Virtual Machines Zero-Day" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day">Dell RecoverPoint for Virtual Machines Zero-Day</a></li><li><a title="Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability" rel="nofollow" href="https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079">Dell Bulletin - RecoverPoint for Virtual Machines Hardcoded Credential Vulnerability</a></li><li><a title="Critical Dell bug exploited for two years" rel="nofollow" href="https://www.thestack.technology/dell-critical-vulnerability-vmware-cve-202622769/">Critical Dell bug exploited for two years</a></li><li><a title="OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT" rel="nofollow" href="https://openai.com/index/introducing-lockdown-mode-and-elevated-risk-labels-in-chatgpt/">OpenAI intros Lockdown Mode and Elevated Risk labels in ChatGPT</a></li><li><a title="OpenAI is rebranding Aardvark " rel="nofollow" href="https://x.com/btibor91/status/2024613054638608558">OpenAI is rebranding Aardvark </a></li><li><a title="Anthropic Claude Code Security " rel="nofollow" href="https://www.anthropic.com/news/claude-code-security">Anthropic Claude Code Security </a></li><li><a title="Jason Lang: Real Human Concerns In The Age of AI" rel="nofollow" href="https://x.com/curi0usJack/status/2024184571974000984">Jason Lang: Real Human Concerns In The Age of AI</a></li><li><a title="JAGS&#39; batteries-included Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' batteries-included Claude Code SDLC config</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="NEBULA:FOG 2026 | AI x Security Hackathon" rel="nofollow" href="https://nebulafog.ai/">NEBULA:FOG 2026 | AI x Security Hackathon</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+_ZJLKv9C</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+_ZJLKv9C" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Palo Alto and the uncomfortable politics of APT attribution</title>
      <link>http://securityconversations.fireside.fm/drones-elpaso-palo-alto-china-attribution</link>
      <guid isPermaLink="false">1964971a-bff0-48c5-9d43-8874e3b38d67</guid>
      <pubDate>Fri, 13 Feb 2026 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1964971a-bff0-48c5-9d43-8874e3b38d67.mp3" length="118296559" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 85: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.

Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:30:30</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1964971a-bff0-48c5-9d43-8874e3b38d67/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 85</strong>: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.</p>

<p>Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>drones, El Paso, FAA, anti-drone, notepad++, SUO5, Microsoft, Patch Tuesday, zeroday, ios 26.3, Estonia, Russia, China, Palo Alto, Singapore, Germany, Tianfu Cup</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 85</strong>: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.</p>

<p>Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10uh_I7o0vdCt34EWS84SVdt_b6hmyXuigAPkP7HwYJQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="What We Know About the El Paso Airspace Shutdown" rel="nofollow" href="https://archive.ph/7JHqq">What We Know About the El Paso Airspace Shutdown</a></li><li><a title="El Paso Closure Caused by Firing Anti-Drone Laser " rel="nofollow" href="https://archive.ph/xi7BU">El Paso Closure Caused by Firing Anti-Drone Laser </a></li><li><a title="Notepad++ supply chain hack (new IOCs)" rel="nofollow" href="https://notepad-plus-plus.org/assets/data/IoCFromFormerHostingProvider.txt">Notepad++ supply chain hack (new IOCs)</a></li><li><a title="Ukatemi: Notepad++ attack related samples" rel="nofollow" href="https://blog.ukatemi.com/blog/2026-02-12-notepad++-supply-chain-samples/">Ukatemi: Notepad++ attack related samples</a></li><li><a title="Notepad&#39;s new Markdown powers served with a side of RCE" rel="nofollow" href="https://www.theregister.com/2026/02/11/notepad_rce_flaw/">Notepad's new Markdown powers served with a side of RCE</a></li><li><a title="Microsoft: Windows Notepad App RCE Vulnerability " rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841">Microsoft: Windows Notepad App RCE Vulnerability </a></li><li><a title="iOS 26.3 security advisory (exploited 0day)" rel="nofollow" href="https://support.apple.com/en-us/126346">iOS 26.3 security advisory (exploited 0day)</a></li><li><a title="Estonian Foreign Intelligence Service annual report" rel="nofollow" href="https://raport.valisluureamet.ee/2026/en/">Estonian Foreign Intelligence Service annual report</a></li><li><a title="PSIRT | FortiGuard Labs High-Risk Advisory" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1052">PSIRT | FortiGuard Labs High-Risk Advisory</a></li><li><a title="Germany prepares to attack cyber enemies" rel="nofollow" href="https://www.politico.eu/article/germany-prepares-hack-back-cyber-enemies/">Germany prepares to attack cyber enemies</a></li><li><a title="Palo Alto chose not to tie China to hacking campaign for fear of retaliation" rel="nofollow" href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Palo Alto chose not to tie China to hacking campaign for fear of retaliation</a></li><li><a title="The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)</a></li><li><a title="Singapore .gov on nation-state telco hacks" rel="nofollow" href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Singapore .gov on nation-state telco hacks</a></li><li><a title="TLP-BLACK" rel="nofollow" href="https://tlpblack.net/">TLP-BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 85</strong>: Top stories this week include drone incursions over El Paso and the murky line between cartel activity, anti-drone tech testing, and full-blown hybrid warfare; updates on the Notepad++ supply chain fallout; Microsoft’s zero-day treadmill and AI-enabled attack surfaces; and Apple’s “extremely sophisticated” iOS exploits.</p>

<p>Plus, Europe’s growing appetite for offensive cyber, Palo Alto and the uncomfortable politics of cyber attribution, Singapore on telco intrusions, and the economics of end-of-life infrastructure.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10uh_I7o0vdCt34EWS84SVdt_b6hmyXuigAPkP7HwYJQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="What We Know About the El Paso Airspace Shutdown" rel="nofollow" href="https://archive.ph/7JHqq">What We Know About the El Paso Airspace Shutdown</a></li><li><a title="El Paso Closure Caused by Firing Anti-Drone Laser " rel="nofollow" href="https://archive.ph/xi7BU">El Paso Closure Caused by Firing Anti-Drone Laser </a></li><li><a title="Notepad++ supply chain hack (new IOCs)" rel="nofollow" href="https://notepad-plus-plus.org/assets/data/IoCFromFormerHostingProvider.txt">Notepad++ supply chain hack (new IOCs)</a></li><li><a title="Ukatemi: Notepad++ attack related samples" rel="nofollow" href="https://blog.ukatemi.com/blog/2026-02-12-notepad++-supply-chain-samples/">Ukatemi: Notepad++ attack related samples</a></li><li><a title="Notepad&#39;s new Markdown powers served with a side of RCE" rel="nofollow" href="https://www.theregister.com/2026/02/11/notepad_rce_flaw/">Notepad's new Markdown powers served with a side of RCE</a></li><li><a title="Microsoft: Windows Notepad App RCE Vulnerability " rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841">Microsoft: Windows Notepad App RCE Vulnerability </a></li><li><a title="iOS 26.3 security advisory (exploited 0day)" rel="nofollow" href="https://support.apple.com/en-us/126346">iOS 26.3 security advisory (exploited 0day)</a></li><li><a title="Estonian Foreign Intelligence Service annual report" rel="nofollow" href="https://raport.valisluureamet.ee/2026/en/">Estonian Foreign Intelligence Service annual report</a></li><li><a title="PSIRT | FortiGuard Labs High-Risk Advisory" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1052">PSIRT | FortiGuard Labs High-Risk Advisory</a></li><li><a title="Germany prepares to attack cyber enemies" rel="nofollow" href="https://www.politico.eu/article/germany-prepares-hack-back-cyber-enemies/">Germany prepares to attack cyber enemies</a></li><li><a title="Palo Alto chose not to tie China to hacking campaign for fear of retaliation" rel="nofollow" href="https://www.reuters.com/world/china/palo-alto-chose-not-tie-china-hacking-campaign-fear-retaliation-beijing-sources-2026-02-12/">Palo Alto chose not to tie China to hacking campaign for fear of retaliation</a></li><li><a title="The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">The Shadow Campaigns: Uncovering Global Espionage (Palo Alto)</a></li><li><a title="Singapore .gov on nation-state telco hacks" rel="nofollow" href="https://www.csa.gov.sg/news-events/press-releases/largest-multi-agency-cyber-operation-mounted-to-counter-threat-posed-by-advanced-persistent-threat--apt--actor-unc3886-to-singapore-s-telecommunications-sector/">Singapore .gov on nation-state telco hacks</a></li><li><a title="TLP-BLACK" rel="nofollow" href="https://tlpblack.net/">TLP-BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Uhf0mJoS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Uhf0mJoS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>From Epstein to Notepad++: Redactions, Zero-Days and Supply Chain Attacks</title>
      <link>http://securityconversations.fireside.fm/epstein-notepad-plus-zerodays-supply-chain-attacks</link>
      <guid isPermaLink="false">d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8</guid>
      <pubDate>Sun, 08 Feb 2026 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8.mp3" length="113124412" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Thinkst Canary. Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With 0 admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.)

Three Buddy Problem - Episode 84:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. 

Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic's AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:17:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d4b5dfb8-20b2-4dc6-aa39-6f582bd8dae8/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DamIQqfq_QYsYm7xby3ntH4bI30T98emmOSkNnQzY84/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people&#39;?" rel="nofollow" href="https://www.yahoo.com/news/articles/did-renowned-hacker-help-jeffrey-120148711.html">Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people'?</a></li><li><a title="DOJ releases details alleged talented hacker working for Jeffrey Epstein" rel="nofollow" href="https://securityaffairs.com/187515/laws-and-regulations/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein.html">DOJ releases details alleged talented hacker working for Jeffrey Epstein</a></li><li><a title="Claude Opus 4.6 \ Anthropic" rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-6">Claude Opus 4.6 \ Anthropic</a></li><li><a title="0-Days \ red.anthropic.com" rel="nofollow" href="https://red.anthropic.com/2026/zero-days/">0-Days \ red.anthropic.com</a></li><li><a title="JAGS&#39; Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' Claude Code SDLC config</a></li><li><a title="CERT-Ukraine on zero-day attacks via MS Office" rel="nofollow" href="https://cert.gov.ua/article/6287250">CERT-Ukraine on zero-day attacks via MS Office</a></li><li><a title="Executive security shuffle at Microsoft" rel="nofollow" href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/">Executive security shuffle at Microsoft</a></li><li><a title="TLPBLACK: What we know about the Notepad++ supply chain attack" rel="nofollow" href="https://medium.com/@costin.raiu/what-we-know-about-the-notepad-supply-chain-attack-0f428b4aee08">TLPBLACK: What we know about the Notepad++ supply chain attack</a></li><li><a title="Lotus Blossom APT targets critical infrastructure via Notepad++." rel="nofollow" href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Lotus Blossom APT targets critical infrastructure via Notepad++.</a></li><li><a title="Kaspersky: Notepad++ supply chain attack breakdown" rel="nofollow" href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky: Notepad++ supply chain attack breakdown</a></li><li><a title="Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise" rel="nofollow" href="https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/">Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise</a></li><li><a title="Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it" rel="nofollow" href="https://www.hostinger.com/blog/notepad-unauthorized-access">Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it</a></li><li><a title="Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework" rel="nofollow" href="https://blog.talosintelligence.com/knife-cutting-the-edge/">Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework</a></li><li><a title="Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage</a></li><li><a title="FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled" rel="nofollow" href="https://www.404media.co/fbi-couldnt-get-into-wapo-reporters-iphone-because-it-had-lockdown-mode-enabled/">FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled</a></li><li><a title="Court document: FBI Washington Post Lockdown Mode" rel="nofollow" href="https://www.documentcloud.org/documents/26808056-fbi-washington-post-lockdown-mode/">Court document: FBI Washington Post Lockdown Mode</a></li><li><a title="PIVOTcon" rel="nofollow" href="https://pivotcon.org/">PIVOTcon</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="Decipher podcast (Dennis Fisher)" rel="nofollow" href="https://open.spotify.com/episode/5k9xpXyD7YSlJRkYqoCQde">Decipher podcast (Dennis Fisher)</a></li><li><a title="Detection Engineering newsletter (Zack Allen)" rel="nofollow" href="https://www.detectionengineering.net/p/dew-144-pyramid-of-permanence-and">Detection Engineering newsletter (Zack Allen)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://canary.tools" rel="nofollow">Thinkst Canary</a>: Most Companies find out way too late that they’ve been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching ’em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.</em>)</p>

<p><strong>Three Buddy Problem - Episode 84</strong>:  We process the cybersecurity fallout from the latest Epstein document dump, focusing on why redactions fail in the AI era and how quickly modern tools can unravel them. The conversation moves from sloppy redaction practices and exploit mythology to harder questions about ethics, accountability, and silence within the infosec community. </p>

<p>Plus, inside the Notepad++ supply-chain compromise attributed to a known Chinese APT, Microsoft’s security executive changes, Anthropic&#39;s AI-driven vulnerability discovery, China-linked network implants, and Lockdown Mode thwarting FBI investigators.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Thinkst Canary - Customer Love" rel="nofollow" href="https://canary.tools/love">Thinkst Canary - Customer Love</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DamIQqfq_QYsYm7xby3ntH4bI30T98emmOSkNnQzY84/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people&#39;?" rel="nofollow" href="https://www.yahoo.com/news/articles/did-renowned-hacker-help-jeffrey-120148711.html">Did a renowned hacker help Jeffrey Epstein get ‘dirt on other people'?</a></li><li><a title="DOJ releases details alleged talented hacker working for Jeffrey Epstein" rel="nofollow" href="https://securityaffairs.com/187515/laws-and-regulations/doj-releases-details-alleged-talented-hacker-working-for-jeffrey-epstein.html">DOJ releases details alleged talented hacker working for Jeffrey Epstein</a></li><li><a title="Claude Opus 4.6 \ Anthropic" rel="nofollow" href="https://www.anthropic.com/news/claude-opus-4-6">Claude Opus 4.6 \ Anthropic</a></li><li><a title="0-Days \ red.anthropic.com" rel="nofollow" href="https://red.anthropic.com/2026/zero-days/">0-Days \ red.anthropic.com</a></li><li><a title="JAGS&#39; Claude Code SDLC config" rel="nofollow" href="https://github.com/juanandresgs/claude-system">JAGS' Claude Code SDLC config</a></li><li><a title="CERT-Ukraine on zero-day attacks via MS Office" rel="nofollow" href="https://cert.gov.ua/article/6287250">CERT-Ukraine on zero-day attacks via MS Office</a></li><li><a title="Executive security shuffle at Microsoft" rel="nofollow" href="https://blogs.microsoft.com/blog/2026/02/04/updates-in-two-of-our-core-priorities/">Executive security shuffle at Microsoft</a></li><li><a title="TLPBLACK: What we know about the Notepad++ supply chain attack" rel="nofollow" href="https://medium.com/@costin.raiu/what-we-know-about-the-notepad-supply-chain-attack-0f428b4aee08">TLPBLACK: What we know about the Notepad++ supply chain attack</a></li><li><a title="Lotus Blossom APT targets critical infrastructure via Notepad++." rel="nofollow" href="https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/">Lotus Blossom APT targets critical infrastructure via Notepad++.</a></li><li><a title="Kaspersky: Notepad++ supply chain attack breakdown" rel="nofollow" href="https://securelist.com/notepad-supply-chain-attack/118708/">Kaspersky: Notepad++ supply chain attack breakdown</a></li><li><a title="Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise" rel="nofollow" href="https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/">Validin: Exploring the C2 Infrastructure of the Notepad++ Compromise</a></li><li><a title="Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it" rel="nofollow" href="https://www.hostinger.com/blog/notepad-unauthorized-access">Hostinger server unauthorized access case: What happened with Notepad++ and how we resolved it</a></li><li><a title="Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework" rel="nofollow" href="https://blog.talosintelligence.com/knife-cutting-the-edge/">Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework</a></li><li><a title="Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage" rel="nofollow" href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/">Palo Alto Unit 42: The Shadow Campaigns - Uncovering Global Espionage</a></li><li><a title="FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled" rel="nofollow" href="https://www.404media.co/fbi-couldnt-get-into-wapo-reporters-iphone-because-it-had-lockdown-mode-enabled/">FBI Couldn’t Get into WaPo Reporter’s iPhone Because It Had Lockdown Mode Enabled</a></li><li><a title="Court document: FBI Washington Post Lockdown Mode" rel="nofollow" href="https://www.documentcloud.org/documents/26808056-fbi-washington-post-lockdown-mode/">Court document: FBI Washington Post Lockdown Mode</a></li><li><a title="PIVOTcon" rel="nofollow" href="https://pivotcon.org/">PIVOTcon</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="Decipher podcast (Dennis Fisher)" rel="nofollow" href="https://open.spotify.com/episode/5k9xpXyD7YSlJRkYqoCQde">Decipher podcast (Dennis Fisher)</a></li><li><a title="Detection Engineering newsletter (Zack Allen)" rel="nofollow" href="https://www.detectionengineering.net/p/dew-144-pyramid-of-permanence-and">Detection Engineering newsletter (Zack Allen)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+vQnqcR_X</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+vQnqcR_X" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>A destructive cyberattack in Poland raises NATO 'red-line' questions</title>
      <link>http://securityconversations.fireside.fm/destructive-cyber-poland-nato-red-line-questions</link>
      <guid isPermaLink="false">c425eddb-3de4-49f4-b6da-d3701d26642f</guid>
      <pubDate>Fri, 30 Jan 2026 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c425eddb-3de4-49f4-b6da-d3701d26642f.mp3" length="134749410" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 83:  Poland's CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.

Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:53:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c425eddb-3de4-49f4-b6da-d3701d26642f/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 83</strong>:  Poland&#39;s CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.</p>

<p>Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>IOS, Apple, Poland, Sandworm, Berserk Bear, FSB, Russia, ESET, NATO, Fortinet, Ivanti, Microsoft, zero-day, WinRAR, China, Google,  WhatsApp, Singapore, CISA</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 83</strong>:  Poland&#39;s CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.</p>

<p>Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1imC13dSZLhHk1Lf7fEuVeuajlbgiqk2ypQdJow2qGkI/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (Use Cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (Use Cases)</a></li><li><a title="ESET DynoWiper update: Technical analysis and attribution" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/">ESET DynoWiper update: Technical analysis and attribution</a></li><li><a title="Poland CERT on Russian wiper attacks" rel="nofollow" href="https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf">Poland CERT on Russian wiper attacks</a></li><li><a title="Poland blames two Ukrainians allegedly working for Russia for railway blast" rel="nofollow" href="https://www.aljazeera.com/news/2025/11/18/poland-blames-two-ukrainians-allegedly-working-for-russia-for-railway-blast">Poland blames two Ukrainians allegedly working for Russia for railway blast</a></li><li><a title="Britain’s New Spy Chief Has a New Mission" rel="nofollow" href="https://archive.is/kbx9b">Britain’s New Spy Chief Has a New Mission</a></li><li><a title="Two New Ivanti 0days Exploited" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Two New Ivanti 0days Exploited</a></li><li><a title="Microsoft ships emergency Office patch to thwart attacks" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509">Microsoft ships emergency Office patch to thwart attacks</a></li><li><a title="Analysis of Single Sign-On Abuse on FortiOS" rel="nofollow" href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios">Analysis of Single Sign-On Abuse on FortiOS</a></li><li><a title="Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060">Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass</a></li><li><a title="Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability">Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088</a></li><li><a title="WhatsApp Strict Account Settings" rel="nofollow" href="https://about.fb.com/news/2026/01/whatsapp-strict-account-settings-safeguarding-against-cyber-attacks/">WhatsApp Strict Account Settings</a></li><li><a title="China Executes 11 People Linked to Cyberscam Centers in Myanmar" rel="nofollow" href="https://archive.ph/5UTzW">China Executes 11 People Linked to Cyberscam Centers in Myanmar</a></li><li><a title="Singapore to start caning for scammers" rel="nofollow" href="https://www.police.gov.sg/Knowledge-Hub/Legislation/Caning-for-Scams-and-Scams-related-Offences">Singapore to start caning for scammers</a></li><li><a title="Germany on hacking attacks: &quot;We will strike back, including abroad&quot;" rel="nofollow" href="https://www.welt.de/politik/deutschland/article6973feeaf5499fb954b6401d/hackerangriffe-auf-deutschland-wir-werden-zurueckschlagen-auch-im-ausland-dobrindt-will-cyber-gegenwehr-verschaerfen.html">Germany on hacking attacks: "We will strike back, including abroad"</a></li><li><a title="Acting CISA chief uploaded sensitive files into a public version of ChatGPT" rel="nofollow" href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">Acting CISA chief uploaded sensitive files into a public version of ChatGPT</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="KasperSekrets" rel="nofollow" href="https://x.com/kaspersekrets/">KasperSekrets</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 83</strong>:  Poland&#39;s CERT documents a rare, explicit wiper attack on civilians in a NATO country, including detailed attribution of a Russian government op targeting the electric grid in the heart of winter. We examine why this crosses a long-avoided threshold, why attribution suddenly matters again, and what it says about pre-positioned access, vendor insecurity, and the shrinking gap between cyber operations and acts of war.</p>

<p>Plus, another Fortinet fiasco, a new batch of Ivanti zero-days under attack, an emergency patch from Microsoft and the return of the mysterious KasperSekrets account.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1imC13dSZLhHk1Lf7fEuVeuajlbgiqk2ypQdJow2qGkI/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (Use Cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (Use Cases)</a></li><li><a title="ESET DynoWiper update: Technical analysis and attribution" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/">ESET DynoWiper update: Technical analysis and attribution</a></li><li><a title="Poland CERT on Russian wiper attacks" rel="nofollow" href="https://cert.pl/uploads/docs/CERT_Polska_Energy_Sector_Incident_Report_2025.pdf">Poland CERT on Russian wiper attacks</a></li><li><a title="Poland blames two Ukrainians allegedly working for Russia for railway blast" rel="nofollow" href="https://www.aljazeera.com/news/2025/11/18/poland-blames-two-ukrainians-allegedly-working-for-russia-for-railway-blast">Poland blames two Ukrainians allegedly working for Russia for railway blast</a></li><li><a title="Britain’s New Spy Chief Has a New Mission" rel="nofollow" href="https://archive.is/kbx9b">Britain’s New Spy Chief Has a New Mission</a></li><li><a title="Two New Ivanti 0days Exploited" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US">Two New Ivanti 0days Exploited</a></li><li><a title="Microsoft ships emergency Office patch to thwart attacks" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509">Microsoft ships emergency Office patch to thwart attacks</a></li><li><a title="Analysis of Single Sign-On Abuse on FortiOS" rel="nofollow" href="https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios">Analysis of Single Sign-On Abuse on FortiOS</a></li><li><a title="Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-26-060">Fortinet PSIRT: Administrative FortiCloud SSO authentication bypass</a></li><li><a title="Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/exploiting-critical-winrar-vulnerability">Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088</a></li><li><a title="WhatsApp Strict Account Settings" rel="nofollow" href="https://about.fb.com/news/2026/01/whatsapp-strict-account-settings-safeguarding-against-cyber-attacks/">WhatsApp Strict Account Settings</a></li><li><a title="China Executes 11 People Linked to Cyberscam Centers in Myanmar" rel="nofollow" href="https://archive.ph/5UTzW">China Executes 11 People Linked to Cyberscam Centers in Myanmar</a></li><li><a title="Singapore to start caning for scammers" rel="nofollow" href="https://www.police.gov.sg/Knowledge-Hub/Legislation/Caning-for-Scams-and-Scams-related-Offences">Singapore to start caning for scammers</a></li><li><a title="Germany on hacking attacks: &quot;We will strike back, including abroad&quot;" rel="nofollow" href="https://www.welt.de/politik/deutschland/article6973feeaf5499fb954b6401d/hackerangriffe-auf-deutschland-wir-werden-zurueckschlagen-auch-im-ausland-dobrindt-will-cyber-gegenwehr-verschaerfen.html">Germany on hacking attacks: "We will strike back, including abroad"</a></li><li><a title="Acting CISA chief uploaded sensitive files into a public version of ChatGPT" rel="nofollow" href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361">Acting CISA chief uploaded sensitive files into a public version of ChatGPT</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li><li><a title="LABScon 2026" rel="nofollow" href="https://www.labscon.io/">LABScon 2026</a></li><li><a title="KasperSekrets" rel="nofollow" href="https://x.com/kaspersekrets/">KasperSekrets</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+HhgQnwGo</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+HhgQnwGo" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Cheap, AI-generated zero-days and the real meaning of ‘advanced’ malware</title>
      <link>http://securityconversations.fireside.fm/ai-generated-malware-real-meaning-advanced-attacks</link>
      <guid isPermaLink="false">40dc6ef5-03de-4767-ae99-5b8d91ba37f7</guid>
      <pubDate>Fri, 23 Jan 2026 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/40dc6ef5-03de-4767-ae99-5b8d91ba37f7.mp3" length="104173843" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 82:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. 

Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA's new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland's electricity sector.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:09:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/40dc6ef5-03de-4767-ae99-5b8d91ba37f7/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 82</strong>:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. </p>

<p>Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA&#39;s new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland&#39;s electricity sector.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>AI, Check Point, Sean Heelan, VoidLInk, CISA, BRICKSTORM, Node.js, Bard, cURL, zero-days, Microsoft, Google, FBI, BitLocker, Fortinet, Cisco, CISA,  </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 82</strong>:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. </p>

<p>Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA&#39;s new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland&#39;s electricity sector.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VTSffx5pgJQd7V1V2XtIu9BS3AgzPZ82VWSkPNKCsqk/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (use cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (use cases)</a></li><li><a title="Sean Heelan on the coming industrialisation of exploit generation with LLMs" rel="nofollow" href="https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/">Sean Heelan on the coming industrialisation of exploit generation with LLMs</a></li><li><a title="VoidLink Shows AI-Generated Malware Has Begun" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/">VoidLink Shows AI-Generated Malware Has Begun</a></li><li><a title="LLMs in the SOC: Why Benchmarks Fail Security Operations Teams" rel="nofollow" href="https://www.sentinelone.com/labs/llms-in-the-soc-part-1-why-benchmarks-fail-security-operations-teams/">LLMs in the SOC: Why Benchmarks Fail Security Operations Teams</a></li><li><a title="CISA advisory on BRICKSTORM backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/analysis-reports/ar25-338a">CISA advisory on BRICKSTORM backdoor</a></li><li><a title="Node.js — New HackerOne Signal Requirement  " rel="nofollow" href="https://nodejs.org/en/blog/announcements/hackerone-signal-requirement">Node.js — New HackerOne Signal Requirement  </a></li><li><a title="AI slop security reports submitted to cURL" rel="nofollow" href="https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd">AI slop security reports submitted to cURL</a></li><li><a title="Arctic Wolf on FortiGate attacks via SSO accounts" rel="nofollow" href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/">Arctic Wolf on FortiGate attacks via SSO accounts</a></li><li><a title="New Cisco Remote Code Execution Vulnerability" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b">New Cisco Remote Code Execution Vulnerability</a></li><li><a title="From Protest to Peril: Cellebrite Used Against Jordanian Civil Society" rel="nofollow" href="https://citizenlab.ca/research/from-protest-to-peril-cellebrite-used-against-jordanian-civil-society/">From Protest to Peril: Cellebrite Used Against Jordanian Civil Society</a></li><li><a title="Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/">Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint</a></li><li><a title="Microsoft Gave FBI BitLocker Encryption Keys " rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/">Microsoft Gave FBI BitLocker Encryption Keys </a></li><li><a title="The Mastermind: Drugs. Empire. Murder. Betrayal " rel="nofollow" href="https://www.amazon.com/Mastermind-Drugs-Empire-Murder-Betrayal/dp/0399590412">The Mastermind: Drugs. Empire. Murder. Betrayal </a></li><li><a title="Kim Zetter: Cyberattack on Poland’s energy grid used a wiper" rel="nofollow" href="https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/">Kim Zetter: Cyberattack on Poland’s energy grid used a wiper</a></li><li><a title="ESET on &#39;DynoWiper&#39; malware" rel="nofollow" href="https://x.com/ESETresearch/status/2014737644048044267">ESET on 'DynoWiper' malware</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 82</strong>:  We parse news that China-linked VoidLink is a malware framework created entirely by AI and the collapsing line between elite APT operations and everyday threat actors. </p>

<p>Plus, a new Sean Heelan essay on low-cost exploit generation and why “AI guardrails” are mostly a comforting myth; AI slop overwhelming bug bounty programs; CISA&#39;s new Brickstorm YARA rules; and fresh research on a wiper-malware found in Russian attacks against Poland&#39;s electricity sector.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VTSffx5pgJQd7V1V2XtIu9BS3AgzPZ82VWSkPNKCsqk/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security (use cases)" rel="nofollow" href="https://material.security/use-cases">Material Security (use cases)</a></li><li><a title="Sean Heelan on the coming industrialisation of exploit generation with LLMs" rel="nofollow" href="https://sean.heelan.io/2026/01/18/on-the-coming-industrialisation-of-exploit-generation-with-llms/">Sean Heelan on the coming industrialisation of exploit generation with LLMs</a></li><li><a title="VoidLink Shows AI-Generated Malware Has Begun" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-early-ai-generated-malware-framework/">VoidLink Shows AI-Generated Malware Has Begun</a></li><li><a title="LLMs in the SOC: Why Benchmarks Fail Security Operations Teams" rel="nofollow" href="https://www.sentinelone.com/labs/llms-in-the-soc-part-1-why-benchmarks-fail-security-operations-teams/">LLMs in the SOC: Why Benchmarks Fail Security Operations Teams</a></li><li><a title="CISA advisory on BRICKSTORM backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/analysis-reports/ar25-338a">CISA advisory on BRICKSTORM backdoor</a></li><li><a title="Node.js — New HackerOne Signal Requirement  " rel="nofollow" href="https://nodejs.org/en/blog/announcements/hackerone-signal-requirement">Node.js — New HackerOne Signal Requirement  </a></li><li><a title="AI slop security reports submitted to cURL" rel="nofollow" href="https://gist.github.com/bagder/07f7581f6e3d78ef37dfbfc81fd1d1cd">AI slop security reports submitted to cURL</a></li><li><a title="Arctic Wolf on FortiGate attacks via SSO accounts" rel="nofollow" href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/">Arctic Wolf on FortiGate attacks via SSO accounts</a></li><li><a title="New Cisco Remote Code Execution Vulnerability" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b">New Cisco Remote Code Execution Vulnerability</a></li><li><a title="From Protest to Peril: Cellebrite Used Against Jordanian Civil Society" rel="nofollow" href="https://citizenlab.ca/research/from-protest-to-peril-cellebrite-used-against-jordanian-civil-society/">From Protest to Peril: Cellebrite Used Against Jordanian Civil Society</a></li><li><a title="Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2026/01/21/multistage-aitm-phishing-bec-campaign-abusing-sharepoint/">Microsoft on multi‑stage AiTM phishing and BEC campaign abusing SharePoint</a></li><li><a title="Microsoft Gave FBI BitLocker Encryption Keys " rel="nofollow" href="https://www.forbes.com/sites/thomasbrewster/2026/01/22/microsoft-gave-fbi-keys-to-unlock-bitlocker-encrypted-data/">Microsoft Gave FBI BitLocker Encryption Keys </a></li><li><a title="The Mastermind: Drugs. Empire. Murder. Betrayal " rel="nofollow" href="https://www.amazon.com/Mastermind-Drugs-Empire-Murder-Betrayal/dp/0399590412">The Mastermind: Drugs. Empire. Murder. Betrayal </a></li><li><a title="Kim Zetter: Cyberattack on Poland’s energy grid used a wiper" rel="nofollow" href="https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/">Kim Zetter: Cyberattack on Poland’s energy grid used a wiper</a></li><li><a title="ESET on &#39;DynoWiper&#39; malware" rel="nofollow" href="https://x.com/ESETresearch/status/2014737644048044267">ESET on 'DynoWiper' malware</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Hqo4p5aT</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Hqo4p5aT" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Google Pixel 'zero-click' exploit caused by AI, mysterious Poland grid attacks, China bans US cybersecurity software</title>
      <link>http://securityconversations.fireside.fm/project-zero-click-pixel-attack-surface</link>
      <guid isPermaLink="false">9e16b30e-091e-44f0-bcf0-03e0f74e465f</guid>
      <pubDate>Fri, 16 Jan 2026 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9e16b30e-091e-44f0-bcf0-03e0f74e465f.mp3" length="114472744" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 81:  We dissect New York Times reporting on the "precision" of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and "letters of marque" for private hackers. Plus, a mysterious failed cyber attack on Poland's power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China's ban on US/Israeli cybersecurity software.

We also cover Check Point's research on "VoidLink" (is it a successor to ShadowPad?), Microsoft's threat intelligence sharing practices, and Google Project Zero's disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:24:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9e16b30e-091e-44f0-bcf0-03e0f74e465f/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 81</strong>: We dissect New York Times reporting on the &quot;precision&quot; of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and &quot;letters of marque&quot; for private hackers. Plus, a mysterious failed cyber attack on Poland&#39;s power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China&#39;s ban on US/Israeli cybersecurity software.</p>

<p>We also cover Check Point&#39;s research on &quot;VoidLink&quot; (is it a successor to ShadowPad?), Microsoft&#39;s threat intelligence sharing practices, and Google Project Zero&#39;s disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Iran, Verizon, Israel, China, Palo Alto, Microsoft, CISA, Poland, Project Zero, Google, Apple, Pixel, zero-click, Venezuela, cyberwar</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 81</strong>: We dissect New York Times reporting on the &quot;precision&quot; of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and &quot;letters of marque&quot; for private hackers. Plus, a mysterious failed cyber attack on Poland&#39;s power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China&#39;s ban on US/Israeli cybersecurity software.</p>

<p>We also cover Check Point&#39;s research on &quot;VoidLink&quot; (is it a successor to ShadowPad?), Microsoft&#39;s threat intelligence sharing practices, and Google Project Zero&#39;s disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/14CwFDiK41p3VK3jeEiHVs9xK0oIF1iVs8midU-nvX7k/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/product">Sponsor: Material Security</a></li><li><a title="Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities " rel="nofollow" href="https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html">Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities </a></li><li><a title="Massive cyberattack on Polish power system in December failed, minister says  " rel="nofollow" href="https://www.reuters.com/sustainability/climate-energy/massive-cyberattack-polish-power-system-december-failed-minister-says-2026-01-13/">Massive cyberattack on Polish power system in December failed, minister says  </a></li><li><a title="What happened in Poland? (Ruben Santamarta)" rel="nofollow" href="https://www.linkedin.com/pulse/what-happened-poland-part-i-ruben-santamarta-bknye/">What happened in Poland? (Ruben Santamarta)</a></li><li><a title="Costin Raiu: What’s Happening in Iran?" rel="nofollow" href="https://medium.com/@costin.raiu/whats-happening-in-iran-93cc103863ab">Costin Raiu: What’s Happening in Iran?</a></li><li><a title="Verizon just had a big outage. Here’s what we know" rel="nofollow" href="https://www.npr.org/2026/01/15/nx-s1-5678889/verizon-outage-what-happened">Verizon just had a big outage. Here’s what we know</a></li><li><a title="Beijing tells Chinese firms to stop using US and Israeli cyber products" rel="nofollow" href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Beijing tells Chinese firms to stop using US and Israeli cyber products</a></li><li><a title=" MS Patch Tuesday CVE-2026-20805 (exploited in the wild)" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805"> MS Patch Tuesday CVE-2026-20805 (exploited in the wild)</a></li><li><a title="VoidLink: The Cloud-Native Malware Framework" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/">VoidLink: The Cloud-Native Malware Framework</a></li><li><a title="Microsoft disrupts global cybercrime subscription service" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2026/01/14/microsoft-disrupts-cybercrime/">Microsoft disrupts global cybercrime subscription service</a></li><li><a title="Project Zero: A 0-click exploit chain for the Pixel 9 " rel="nofollow" href="https://projectzero.google/2026/01/pixel-0-click-part-1.html">Project Zero: A 0-click exploit chain for the Pixel 9 </a></li><li><a title="Joint statement from Google and Apple" rel="nofollow" href="https://blog.google/company-news/inside-google/company-announcements/joint-statement-google-apple/">Joint statement from Google and Apple</a></li><li><a title="Sean Plankey re-nominated to lead CISA " rel="nofollow" href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/">Sean Plankey re-nominated to lead CISA </a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="DistrictCon Agenda" rel="nofollow" href="https://www.districtcon.org/agenda">DistrictCon Agenda</a></li><li><a title="Ekoparty Miami  " rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami  </a></li><li><a title="The Thinking Game (Full Documentary)" rel="nofollow" href="https://www.youtube.com/watch?v=d95J8yzvjbQ">The Thinking Game (Full Documentary)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 81</strong>: We dissect New York Times reporting on the &quot;precision&quot; of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and &quot;letters of marque&quot; for private hackers. Plus, a mysterious failed cyber attack on Poland&#39;s power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China&#39;s ban on US/Israeli cybersecurity software.</p>

<p>We also cover Check Point&#39;s research on &quot;VoidLink&quot; (is it a successor to ShadowPad?), Microsoft&#39;s threat intelligence sharing practices, and Google Project Zero&#39;s disclosure of zero-click vulnerabilities caused by AI-powered transcription features.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/14CwFDiK41p3VK3jeEiHVs9xK0oIF1iVs8midU-nvX7k/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/product">Sponsor: Material Security</a></li><li><a title="Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities " rel="nofollow" href="https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html">Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities </a></li><li><a title="Massive cyberattack on Polish power system in December failed, minister says  " rel="nofollow" href="https://www.reuters.com/sustainability/climate-energy/massive-cyberattack-polish-power-system-december-failed-minister-says-2026-01-13/">Massive cyberattack on Polish power system in December failed, minister says  </a></li><li><a title="What happened in Poland? (Ruben Santamarta)" rel="nofollow" href="https://www.linkedin.com/pulse/what-happened-poland-part-i-ruben-santamarta-bknye/">What happened in Poland? (Ruben Santamarta)</a></li><li><a title="Costin Raiu: What’s Happening in Iran?" rel="nofollow" href="https://medium.com/@costin.raiu/whats-happening-in-iran-93cc103863ab">Costin Raiu: What’s Happening in Iran?</a></li><li><a title="Verizon just had a big outage. Here’s what we know" rel="nofollow" href="https://www.npr.org/2026/01/15/nx-s1-5678889/verizon-outage-what-happened">Verizon just had a big outage. Here’s what we know</a></li><li><a title="Beijing tells Chinese firms to stop using US and Israeli cyber products" rel="nofollow" href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/">Beijing tells Chinese firms to stop using US and Israeli cyber products</a></li><li><a title=" MS Patch Tuesday CVE-2026-20805 (exploited in the wild)" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805"> MS Patch Tuesday CVE-2026-20805 (exploited in the wild)</a></li><li><a title="VoidLink: The Cloud-Native Malware Framework" rel="nofollow" href="https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/">VoidLink: The Cloud-Native Malware Framework</a></li><li><a title="Microsoft disrupts global cybercrime subscription service" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2026/01/14/microsoft-disrupts-cybercrime/">Microsoft disrupts global cybercrime subscription service</a></li><li><a title="Project Zero: A 0-click exploit chain for the Pixel 9 " rel="nofollow" href="https://projectzero.google/2026/01/pixel-0-click-part-1.html">Project Zero: A 0-click exploit chain for the Pixel 9 </a></li><li><a title="Joint statement from Google and Apple" rel="nofollow" href="https://blog.google/company-news/inside-google/company-announcements/joint-statement-google-apple/">Joint statement from Google and Apple</a></li><li><a title="Sean Plankey re-nominated to lead CISA " rel="nofollow" href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/">Sean Plankey re-nominated to lead CISA </a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="DistrictCon Agenda" rel="nofollow" href="https://www.districtcon.org/agenda">DistrictCon Agenda</a></li><li><a title="Ekoparty Miami  " rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami  </a></li><li><a title="The Thinking Game (Full Documentary)" rel="nofollow" href="https://www.youtube.com/watch?v=d95J8yzvjbQ">The Thinking Game (Full Documentary)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ISvbNXsp</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ISvbNXsp" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Hamid Kashfi on the situation in Iran; Did cyber cause Venezuela blackouts?</title>
      <link>http://securityconversations.fireside.fm/hamid-kashfi-iran-protests-cyber-venezuela</link>
      <guid isPermaLink="false">e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7</guid>
      <pubDate>Fri, 09 Jan 2026 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7.mp3" length="103702632" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 80: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  

Plus, did cyber make the lights go out in Venezuela? 

Cast: Hamid Kashfi, Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:13:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e3dcead7-7b2e-4924-bde5-18c9ea6bd8e7/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Iran, Israel, Charming Kitten, KittenBusters, Hamid Kashfi, Venezuela, hacktivism, cyberwar, kinetic, blackout, CIA</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11KT2hDzyOlv3WdxyVfw9pjW2xV56p9dyACgqZenlDBk/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/">Sponsor: Material Security</a></li><li><a title="About Hamid Kashfi" rel="nofollow" href="https://www.darkcell.se/about">About Hamid Kashfi</a></li><li><a title="Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://securityconversations.com/episode/israel-iran-cyberwar-predatory-sparrow-vanishing-crypto-bank-hacks/">Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Venezuela strike marks a turning point for US cyber warfare" rel="nofollow" href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li><li><a title="KittenBusters | CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">KittenBusters | CharmingKitten</a></li><li><a title="Comprehensive Threat Intelligence Report: Charming Kitten" rel="nofollow" href="https://gist.github.com/Hamid-K#comprehensive-threat-intelligence-report-charming-kitten">Comprehensive Threat Intelligence Report: Charming Kitten</a></li><li><a title="Between Three Nerds: The evolution of Iranian cyber espionage" rel="nofollow" href="https://risky.biz/BTN148/">Between Three Nerds: The evolution of Iranian cyber espionage</a></li><li><a title="Trump says U.S. will hit Iran &quot;very hard&quot; if violence continues at protests" rel="nofollow" href="https://www.cbsnews.com/video/trump-says-us-will-hit-iran-very-hard-if-violence-continues-at-protests/">Trump says U.S. will hit Iran "very hard" if violence continues at protests</a></li><li><a title="Venezuelan oil giant PVDSA hit by cyberattack" rel="nofollow" href="https://www.techradar.com/pro/security/venezuelan-oil-giant-pvdsa-hit-by-cyberattack-amid-us-conflict">Venezuelan oil giant PVDSA hit by cyberattack</a></li><li><a title="CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term" rel="nofollow" href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia">CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term</a></li><li><a title="Antiy Report on cyber operations in Venezuela" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/US_military_cyber_ops_in_Venezuela_spectrum_speculation-analysis.html">Antiy Report on cyber operations in Venezuela</a></li><li><a title="Nationwide internet blackout reported in Iran" rel="nofollow" href="https://www.reuters.com/world/middle-east/iran-warns-suppliers-against-overpricing-or-hoarding-goods-2026-01-08/">Nationwide internet blackout reported in Iran</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 80</strong>: Researcher Hamid Kashfi returns to unpack Iran’s latest unrest, separating economic reality from propaganda while examining how information control, cyber pressure, and state surveillance are shaping events on the ground.  </p>

<p>Plus, did cyber make the lights go out in Venezuela? </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11KT2hDzyOlv3WdxyVfw9pjW2xV56p9dyACgqZenlDBk/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsor: Material Security" rel="nofollow" href="https://material.security/">Sponsor: Material Security</a></li><li><a title="About Hamid Kashfi" rel="nofollow" href="https://www.darkcell.se/about">About Hamid Kashfi</a></li><li><a title="Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://securityconversations.com/episode/israel-iran-cyberwar-predatory-sparrow-vanishing-crypto-bank-hacks/">Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Venezuela strike marks a turning point for US cyber warfare" rel="nofollow" href="https://www.politico.com/news/2026/01/07/venezuela-us-cyber-warfare-00713507">Venezuela strike marks a turning point for US cyber warfare</a></li><li><a title="KittenBusters | CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">KittenBusters | CharmingKitten</a></li><li><a title="Comprehensive Threat Intelligence Report: Charming Kitten" rel="nofollow" href="https://gist.github.com/Hamid-K#comprehensive-threat-intelligence-report-charming-kitten">Comprehensive Threat Intelligence Report: Charming Kitten</a></li><li><a title="Between Three Nerds: The evolution of Iranian cyber espionage" rel="nofollow" href="https://risky.biz/BTN148/">Between Three Nerds: The evolution of Iranian cyber espionage</a></li><li><a title="Trump says U.S. will hit Iran &quot;very hard&quot; if violence continues at protests" rel="nofollow" href="https://www.cbsnews.com/video/trump-says-us-will-hit-iran-very-hard-if-violence-continues-at-protests/">Trump says U.S. will hit Iran "very hard" if violence continues at protests</a></li><li><a title="Venezuelan oil giant PVDSA hit by cyberattack" rel="nofollow" href="https://www.techradar.com/pro/security/venezuelan-oil-giant-pvdsa-hit-by-cyberattack-amid-us-conflict">Venezuelan oil giant PVDSA hit by cyberattack</a></li><li><a title="CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term" rel="nofollow" href="https://edition.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia">CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term</a></li><li><a title="Antiy Report on cyber operations in Venezuela" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/US_military_cyber_ops_in_Venezuela_spectrum_speculation-analysis.html">Antiy Report on cyber operations in Venezuela</a></li><li><a title="Nationwide internet blackout reported in Iran" rel="nofollow" href="https://www.reuters.com/world/middle-east/iran-warns-suppliers-against-overpricing-or-hoarding-goods-2026-01-08/">Nationwide internet blackout reported in Iran</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+OtaaVXuU</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+OtaaVXuU" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>A special mailbag episode with book recommendations</title>
      <link>http://securityconversations.fireside.fm/mongobleed-ai-misuse-books-to-read-mailbag</link>
      <guid isPermaLink="false">3e2f17a7-107f-4709-8697-d066d253fde2</guid>
      <pubDate>Fri, 02 Jan 2026 13:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3e2f17a7-107f-4709-8697-d066d253fde2.mp3" length="146032941" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 79: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.

In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>3:01:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3e2f17a7-107f-4709-8697-d066d253fde2/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 79</strong>: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.</p>

<p>In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>mongodb, mongobleed, mailbag, book recommendations, CVE‑2025‑14847, book club, sanctions, intellexa, predator spyware, bluetooth, ransomware</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 79</strong>: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.</p>

<p>In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18T3pUHEZlaSS8CnjRBfeTTpYL9XG4xJaacMu-Z-QTmQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsored by Material Security" rel="nofollow" href="https://material.security/">Sponsored by Material Security</a></li><li><a title="MongoDB Server Security Update (Dec 2025)" rel="nofollow" href="https://www.mongodb.com/company/blog/news/mongodb-server-security-update-december-2025">MongoDB Server Security Update (Dec 2025)</a></li><li><a title="CVE Record: CVE-2025-14847" rel="nofollow" href="https://www.cve.org/CVERecord?id=CVE-2025-14847">CVE Record: CVE-2025-14847</a></li><li><a title="Censys on MongoBleed" rel="nofollow" href="https://docs.censys.com/changelog/december-29-2025">Censys on MongoBleed</a></li><li><a title="European Space Agency hit by cyberattack" rel="nofollow" href="https://www.theregister.com/2025/12/31/european_space_agency_hacked/">European Space Agency hit by cyberattack</a></li><li><a title="Security pros plead guilty to ransomware " rel="nofollow" href="https://www.justice.gov/opa/pr/two-americans-plead-guilty-targeting-multiple-us-victims-using-alphv-blackcat-ransomware">Security pros plead guilty to ransomware </a></li><li><a title="US removes sanctions for three execs tied to spyware maker Intellexa" rel="nofollow" href="https://therecord.media/treasury-sanctions-intellexa-removed">US removes sanctions for three execs tied to spyware maker Intellexa</a></li><li><a title="Bluetooth Headphone Jacking: A Key to Your Phone " rel="nofollow" href="https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone">Bluetooth Headphone Jacking: A Key to Your Phone </a></li><li><a title="Dan Geer Black Hat 2015 keynote" rel="nofollow" href="http://geer.tinho.net/geer.blackhat.6viii14.txt">Dan Geer Black Hat 2015 keynote</a></li><li><a title="Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy" rel="nofollow" href="https://www.securityweek.com/book-review-infected-a-candid-look-at-virustotals-birth-and-legacy/">Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy</a></li><li><a title="Infected: From Side Project to Google: The Journey Behind VirusTotal " rel="nofollow" href="https://www.amazon.com/Infected-Project-Google-Journey-VirusTotal/dp/8409683660">Infected: From Side Project to Google: The Journey Behind VirusTotal </a></li><li><a title="The Human Factor (Inside the CIA&#39;s dysfunctional intelligence culture)" rel="nofollow" href="https://www.encounterbooks.com/books/the-human-factor-inside-the-cias-dysfunctional-intelligence-culture/?srsltid=AfmBOooKdoaZJkHxT2kjEpF8xemImXcVk9w-OtqZ-c4MJRxoyYHB_jve">The Human Factor (Inside the CIA's dysfunctional intelligence culture)</a></li><li><a title="A Killing Art: The Untold History of Tae Kwon Do" rel="nofollow" href="https://akillingart.com/read-the-book/">A Killing Art: The Untold History of Tae Kwon Do</a></li><li><a title="Thou Shall Prosper: Ten Commandments for Making Money" rel="nofollow" href="https://www.goodreads.com/book/show/944278.Thou_Shall_Prosper">Thou Shall Prosper: Ten Commandments for Making Money</a></li><li><a title="Cult of the Dead Cow (by Joseph Menn)" rel="nofollow" href="https://pageaday.com/products/cult-of-the-dead-cow-9781541706118?srsltid=AfmBOoo_14mI_IdJhn7tohBg_w05Y0o0IT0UzLNrekwl_b5kwK-j8mUQ">Cult of the Dead Cow (by Joseph Menn)</a></li><li><a title="The Nvidia Way: Jensen Huang and the Making of a Tech Giant" rel="nofollow" href="https://www.goodreads.com/book/show/218319936-the-nvidia-way">The Nvidia Way: Jensen Huang and the Making of a Tech Giant</a></li><li><a title="From Third World to First: The Singapore Story" rel="nofollow" href="https://www.goodreads.com/book/show/144409.From_Third_World_to_First">From Third World to First: The Singapore Story</a></li><li><a title="Thinking in Systems (PDF)" rel="nofollow" href="https://research.fit.edu/media/site-specific/researchfitedu/coast-climate-adaptation-library/climate-communications/psychology-amp-behavior/Meadows-2008.-Thinking-in-Systems.pdf">Thinking in Systems (PDF)</a></li><li><a title="AI Superpowers: China, Silicon Valley, and the New World Order" rel="nofollow" href="https://www.goodreads.com/book/show/38242135-ai-superpowers">AI Superpowers: China, Silicon Valley, and the New World Order</a></li><li><a title="The Denial of Death: Ernest Becker" rel="nofollow" href="https://www.amazon.com/Denial-Death-Ernest-Becker/dp/0684832402">The Denial of Death: Ernest Becker</a></li><li><a title="Energy and Civilization: A History by Vaclav Smil" rel="nofollow" href="https://www.goodreads.com/book/show/31850765-energy-and-civilization">Energy and Civilization: A History by Vaclav Smil</a></li><li><a title="DeepLearning.AI" rel="nofollow" href="https://www.deeplearning.ai/short-courses/claude-code-a-highly-agentic-coding-assistant/">DeepLearning.AI</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 79</strong>: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, everyday occurrence.  Plus, AI’s expanding role and misuse across products and workflows, proximity attacks against Bluetooth audio devices, spyware sanctions de-listings, and ransomware economics.</p>

<p>In a special mailbag segment, we give our book recommendations and respond to common questions from the listeners. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18T3pUHEZlaSS8CnjRBfeTTpYL9XG4xJaacMu-Z-QTmQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Sponsored by Material Security" rel="nofollow" href="https://material.security/">Sponsored by Material Security</a></li><li><a title="MongoDB Server Security Update (Dec 2025)" rel="nofollow" href="https://www.mongodb.com/company/blog/news/mongodb-server-security-update-december-2025">MongoDB Server Security Update (Dec 2025)</a></li><li><a title="CVE Record: CVE-2025-14847" rel="nofollow" href="https://www.cve.org/CVERecord?id=CVE-2025-14847">CVE Record: CVE-2025-14847</a></li><li><a title="Censys on MongoBleed" rel="nofollow" href="https://docs.censys.com/changelog/december-29-2025">Censys on MongoBleed</a></li><li><a title="European Space Agency hit by cyberattack" rel="nofollow" href="https://www.theregister.com/2025/12/31/european_space_agency_hacked/">European Space Agency hit by cyberattack</a></li><li><a title="Security pros plead guilty to ransomware " rel="nofollow" href="https://www.justice.gov/opa/pr/two-americans-plead-guilty-targeting-multiple-us-victims-using-alphv-blackcat-ransomware">Security pros plead guilty to ransomware </a></li><li><a title="US removes sanctions for three execs tied to spyware maker Intellexa" rel="nofollow" href="https://therecord.media/treasury-sanctions-intellexa-removed">US removes sanctions for three execs tied to spyware maker Intellexa</a></li><li><a title="Bluetooth Headphone Jacking: A Key to Your Phone " rel="nofollow" href="https://media.ccc.de/v/39c3-bluetooth-headphone-jacking-a-key-to-your-phone">Bluetooth Headphone Jacking: A Key to Your Phone </a></li><li><a title="Dan Geer Black Hat 2015 keynote" rel="nofollow" href="http://geer.tinho.net/geer.blackhat.6viii14.txt">Dan Geer Black Hat 2015 keynote</a></li><li><a title="Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy" rel="nofollow" href="https://www.securityweek.com/book-review-infected-a-candid-look-at-virustotals-birth-and-legacy/">Book Review: Infected - A Candid Look at VirusTotal’s Birth and Legacy</a></li><li><a title="Infected: From Side Project to Google: The Journey Behind VirusTotal " rel="nofollow" href="https://www.amazon.com/Infected-Project-Google-Journey-VirusTotal/dp/8409683660">Infected: From Side Project to Google: The Journey Behind VirusTotal </a></li><li><a title="The Human Factor (Inside the CIA&#39;s dysfunctional intelligence culture)" rel="nofollow" href="https://www.encounterbooks.com/books/the-human-factor-inside-the-cias-dysfunctional-intelligence-culture/?srsltid=AfmBOooKdoaZJkHxT2kjEpF8xemImXcVk9w-OtqZ-c4MJRxoyYHB_jve">The Human Factor (Inside the CIA's dysfunctional intelligence culture)</a></li><li><a title="A Killing Art: The Untold History of Tae Kwon Do" rel="nofollow" href="https://akillingart.com/read-the-book/">A Killing Art: The Untold History of Tae Kwon Do</a></li><li><a title="Thou Shall Prosper: Ten Commandments for Making Money" rel="nofollow" href="https://www.goodreads.com/book/show/944278.Thou_Shall_Prosper">Thou Shall Prosper: Ten Commandments for Making Money</a></li><li><a title="Cult of the Dead Cow (by Joseph Menn)" rel="nofollow" href="https://pageaday.com/products/cult-of-the-dead-cow-9781541706118?srsltid=AfmBOoo_14mI_IdJhn7tohBg_w05Y0o0IT0UzLNrekwl_b5kwK-j8mUQ">Cult of the Dead Cow (by Joseph Menn)</a></li><li><a title="The Nvidia Way: Jensen Huang and the Making of a Tech Giant" rel="nofollow" href="https://www.goodreads.com/book/show/218319936-the-nvidia-way">The Nvidia Way: Jensen Huang and the Making of a Tech Giant</a></li><li><a title="From Third World to First: The Singapore Story" rel="nofollow" href="https://www.goodreads.com/book/show/144409.From_Third_World_to_First">From Third World to First: The Singapore Story</a></li><li><a title="Thinking in Systems (PDF)" rel="nofollow" href="https://research.fit.edu/media/site-specific/researchfitedu/coast-climate-adaptation-library/climate-communications/psychology-amp-behavior/Meadows-2008.-Thinking-in-Systems.pdf">Thinking in Systems (PDF)</a></li><li><a title="AI Superpowers: China, Silicon Valley, and the New World Order" rel="nofollow" href="https://www.goodreads.com/book/show/38242135-ai-superpowers">AI Superpowers: China, Silicon Valley, and the New World Order</a></li><li><a title="The Denial of Death: Ernest Becker" rel="nofollow" href="https://www.amazon.com/Denial-Death-Ernest-Becker/dp/0684832402">The Denial of Death: Ernest Becker</a></li><li><a title="Energy and Civilization: A History by Vaclav Smil" rel="nofollow" href="https://www.goodreads.com/book/show/31850765-energy-and-civilization">Energy and Civilization: A History by Vaclav Smil</a></li><li><a title="DeepLearning.AI" rel="nofollow" href="https://www.deeplearning.ai/short-courses/claude-code-a-highly-agentic-coding-assistant/">DeepLearning.AI</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+GXw8r1fR</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+GXw8r1fR" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning</title>
      <link>http://securityconversations.fireside.fm/quiet-wins-loud-failures-yearend-awards</link>
      <guid isPermaLink="false">1137add6-e8ef-419f-9e3e-ddf5bd1ecefb</guid>
      <pubDate>Fri, 26 Dec 2025 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1137add6-e8ef-419f-9e3e-ddf5bd1ecefb.mp3" length="159884829" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 78: We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. 

Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>3:19:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1137add6-e8ef-419f-9e3e-ddf5bd1ecefb/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 78</strong>:  We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. </p>

<p>Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Iran, Israel, Bitcoin, Predatory Sparrow, Bitcoin, Novitex, nuclear, Stuxnet, drone swarms, autonomous warfare, China, Russia, Apple, Microsoft, Cloudflare, Romania</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 78</strong>:  We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. </p>

<p>Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uPUah0en4wBwUMpyQLWpSK26VZ4MeaQBtddaZQmwPec/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker Solutions" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions</a></li><li><a title="Acting CISA director failed a polygraph" rel="nofollow" href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">Acting CISA director failed a polygraph</a></li><li><a title="LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices</a></li><li><a title="Qianxin’s research on the CSDN watering hole attack" rel="nofollow" href="https://mp.weixin.qq.com/s/qQw1DXE25Gkz_P8pEPVaHg">Qianxin’s research on the CSDN watering hole attack</a></li><li><a title="ViciousTrap - Turning edge devices into honeypots en masse" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap - Turning edge devices into honeypots en masse</a></li><li><a title="AyySSHush: Tradecraft of an emergent ASUS botnet" rel="nofollow" href="https://www.labs.greynoise.io/grimoire/2025-03-28-ayysshush/?_ga=2.23890233.202841663.1766426904-1550568476.1766426904">AyySSHush: Tradecraft of an emergent ASUS botnet</a></li><li><a title="Intellexa’s Global Corporate Web (Recorded Future)" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Intellexa’s Global Corporate Web (Recorded Future)</a></li><li><a title="Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia</a></li><li><a title="GitHub - KittenBusters/CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">GitHub - KittenBusters/CharmingKitten</a></li><li><a title="Bunnie Huang Black Hat keynote (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=Nv92TuocnwA">Bunnie Huang Black Hat keynote (YouTube)</a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts" rel="nofollow" href="https://newsletter.semianalysis.com/p/deepseek-debates">DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts</a></li><li><a title="Behind the Dismantling of Hezbollah " rel="nofollow" href="https://archive.ph/xcBeL">Behind the Dismantling of Hezbollah </a></li><li><a title="Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within" rel="nofollow" href="https://www.propublica.org/article/israel-iran-war-mossad-iranian-recruits">Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within</a></li><li><a title="Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets</a></li><li><a title="Code Orange: Cloudflare resilience plan following recent incidents" rel="nofollow" href="https://blog.cloudflare.com/fail-small-resilience-plan/">Code Orange: Cloudflare resilience plan following recent incidents</a></li><li><a title="Apple SEAR: Memory Integrity Enforcement" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple SEAR: Memory Integrity Enforcement</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 78</strong>:  We close out the year with a no-budget, no-permission awards show, spotlighting the cybersecurity stories that actually mattered. </p>

<p>Plus, a bizarre polygraph scandal at CISA, Chinese APT research dumps, ransomware pre-notification hiccups, foreign drone bans, and the growing gap between cyber theater and real operational value.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uPUah0en4wBwUMpyQLWpSK26VZ4MeaQBtddaZQmwPec/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker Solutions" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions</a></li><li><a title="Acting CISA director failed a polygraph" rel="nofollow" href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996">Acting CISA director failed a polygraph</a></li><li><a title="LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices</a></li><li><a title="Qianxin’s research on the CSDN watering hole attack" rel="nofollow" href="https://mp.weixin.qq.com/s/qQw1DXE25Gkz_P8pEPVaHg">Qianxin’s research on the CSDN watering hole attack</a></li><li><a title="ViciousTrap - Turning edge devices into honeypots en masse" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap - Turning edge devices into honeypots en masse</a></li><li><a title="AyySSHush: Tradecraft of an emergent ASUS botnet" rel="nofollow" href="https://www.labs.greynoise.io/grimoire/2025-03-28-ayysshush/?_ga=2.23890233.202841663.1766426904-1550568476.1766426904">AyySSHush: Tradecraft of an emergent ASUS botnet</a></li><li><a title="Intellexa’s Global Corporate Web (Recorded Future)" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Intellexa’s Global Corporate Web (Recorded Future)</a></li><li><a title="Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM hits embassies in Russia</a></li><li><a title="GitHub - KittenBusters/CharmingKitten" rel="nofollow" href="https://github.com/KittenBusters/CharmingKitten">GitHub - KittenBusters/CharmingKitten</a></li><li><a title="Bunnie Huang Black Hat keynote (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=Nv92TuocnwA">Bunnie Huang Black Hat keynote (YouTube)</a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts" rel="nofollow" href="https://newsletter.semianalysis.com/p/deepseek-debates">DeepSeek Debates: Chinese Leadership On Cost, True Training Cost, Closed Model Margin Impacts</a></li><li><a title="Behind the Dismantling of Hezbollah " rel="nofollow" href="https://archive.ph/xcBeL">Behind the Dismantling of Hezbollah </a></li><li><a title="Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within" rel="nofollow" href="https://www.propublica.org/article/israel-iran-war-mossad-iranian-recruits">Israel Secretly Recruited Iranian Dissidents to Attack Iran From Within</a></li><li><a title="Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets</a></li><li><a title="Code Orange: Cloudflare resilience plan following recent incidents" rel="nofollow" href="https://blog.cloudflare.com/fail-small-resilience-plan/">Code Orange: Cloudflare resilience plan following recent incidents</a></li><li><a title="Apple SEAR: Memory Integrity Enforcement" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple SEAR: Memory Integrity Enforcement</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+5jkdtA4m</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+5jkdtA4m" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>What's behind US gov push to 'privatize' offensive cyber operations?</title>
      <link>http://securityconversations.fireside.fm/us-gov-privatization-of-cyber-operations</link>
      <guid isPermaLink="false">7c985910-acfc-4782-aa15-94055ff20afc</guid>
      <pubDate>Sat, 20 Dec 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7c985910-acfc-4782-aa15-94055ff20afc.mp3" length="98212017" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 77:  New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.

Plus, the US government's push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:01:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7c985910-acfc-4782-aa15-94055ff20afc/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 77</strong>: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.</p>

<p>Plus, the US government&#39;s push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>US government, letters of marque, offense, China, Amazon, GRU, iOS 26, Apple, zero-days, Cisco, AI, Russia, Belarus, spyware</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 77</strong>: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.</p>

<p>Plus, the US government&#39;s push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="ThreatLocker Solutions " rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DHHlaWwcW0CyTEEO6anEDavihfIqb7sxklsdXJzBNEQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Trump Admin Turning to Private Firms in Cyber Offensive" rel="nofollow" href="https://archive.ph/GIb8s">Trump Admin Turning to Private Firms in Cyber Offensive</a></li><li><a title="Microsoft on React2Shell" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/">Microsoft on React2Shell</a></li><li><a title="React2Shell and OpenAI (shoutout Andrew MacPherson)" rel="nofollow" href="https://openai.com/index/introducing-gpt-5-2-codex/">React2Shell and OpenAI (shoutout Andrew MacPherson)</a></li><li><a title="Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw" rel="nofollow" href="https://www.securityweek.com/apple-patches-two-zero-days-tied-to-mysterious-exploited-chrome-flaw/">Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw</a></li><li><a title="iOS 26.2 Security Patches" rel="nofollow" href="https://support.apple.com/en-us/125884">iOS 26.2 Security Patches</a></li><li><a title="Reporters Without Borders uncovers new spyware from Belarus" rel="nofollow" href="https://rsf.org/en/exclusive-rsf-uncovers-new-spyware-belarus">Reporters Without Borders uncovers new spyware from Belarus</a></li><li><a title="Cisco Talos on Cisco 0day attacks" rel="nofollow" href="https://blog.talosintelligence.com/uat-9686/">Cisco Talos on Cisco 0day attacks</a></li><li><a title="Hack of Chinese state time center hints at U.S. advanced missile defense" rel="nofollow" href="https://www.washingtontimes.com/news/2025/dec/17/hack-chinese-state-time-center-hints-us-advanced-missile-defense/">Hack of Chinese state time center hints at U.S. advanced missile defense</a></li><li><a title="Amazon on Russian APT targeting Western critical infrastructure" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">Amazon on Russian APT targeting Western critical infrastructure</a></li><li><a title="North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location" rel="nofollow" href="https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location">North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location</a></li><li><a title="Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs" rel="nofollow" href="https://intezer.com/blog/tracing-a-paper-werewolf-campaign-through-ai-generated-decoys-and-excel-xlls/">Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs</a></li><li><a title="Russian defense firms targeted by hackers using AI" rel="nofollow" href="https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/">Russian defense firms targeted by hackers using AI</a></li><li><a title="TLPBLACK looks back at 2025" rel="nofollow" href="https://tlpblack.net/blog/20251218-cybersecurity-year-in-review">TLPBLACK looks back at 2025</a></li><li><a title="Inside Google&#39;s basement in Malaga: ChatGPT of Cybersecurity" rel="nofollow" href="https://www.surinenglish.com/malaga/malaga-city/inside-googles-basement-malaga-bernardo-quintero-and-20250929151803-nt.html">Inside Google's basement in Malaga: ChatGPT of Cybersecurity</a></li><li><a title="GitHub - xdanx/open-klara: Open KLara Project" rel="nofollow" href="https://github.com/xdanx/open-klara">GitHub - xdanx/open-klara: Open KLara Project</a></li><li><a title="Gepetto Web" rel="nofollow" href="https://blog.kwiatkowski.fr/gepetto-web">Gepetto Web</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 77</strong>: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastructure disruption.</p>

<p>Plus, the US government&#39;s push to enlist private firms in offensive hacking, letters of marque for cartels, new discovery of spyware used against journalists in Belarus, and Amazon catching North Koreans via keystroke latency.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="ThreatLocker Solutions " rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker Solutions </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DHHlaWwcW0CyTEEO6anEDavihfIqb7sxklsdXJzBNEQ/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Trump Admin Turning to Private Firms in Cyber Offensive" rel="nofollow" href="https://archive.ph/GIb8s">Trump Admin Turning to Private Firms in Cyber Offensive</a></li><li><a title="Microsoft on React2Shell" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/12/15/defending-against-the-cve-2025-55182-react2shell-vulnerability-in-react-server-components/">Microsoft on React2Shell</a></li><li><a title="React2Shell and OpenAI (shoutout Andrew MacPherson)" rel="nofollow" href="https://openai.com/index/introducing-gpt-5-2-codex/">React2Shell and OpenAI (shoutout Andrew MacPherson)</a></li><li><a title="Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw" rel="nofollow" href="https://www.securityweek.com/apple-patches-two-zero-days-tied-to-mysterious-exploited-chrome-flaw/">Apple Patches Two Zero-Days Tied to Mysterious Exploited Chrome Flaw</a></li><li><a title="iOS 26.2 Security Patches" rel="nofollow" href="https://support.apple.com/en-us/125884">iOS 26.2 Security Patches</a></li><li><a title="Reporters Without Borders uncovers new spyware from Belarus" rel="nofollow" href="https://rsf.org/en/exclusive-rsf-uncovers-new-spyware-belarus">Reporters Without Borders uncovers new spyware from Belarus</a></li><li><a title="Cisco Talos on Cisco 0day attacks" rel="nofollow" href="https://blog.talosintelligence.com/uat-9686/">Cisco Talos on Cisco 0day attacks</a></li><li><a title="Hack of Chinese state time center hints at U.S. advanced missile defense" rel="nofollow" href="https://www.washingtontimes.com/news/2025/dec/17/hack-chinese-state-time-center-hints-us-advanced-missile-defense/">Hack of Chinese state time center hints at U.S. advanced missile defense</a></li><li><a title="Amazon on Russian APT targeting Western critical infrastructure" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-threat-intelligence-identifies-russian-cyber-threat-group-targeting-western-critical-infrastructure/">Amazon on Russian APT targeting Western critical infrastructure</a></li><li><a title="North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location" rel="nofollow" href="https://www.tomshardware.com/tech-industry/cyber-security/north-korean-infiltrator-caught-working-in-amazon-it-department-thanks-to-lag-110ms-keystroke-input-raises-red-flags-over-true-location">North Korean infiltrator caught in Amazon IT department thanks to lag — 110ms keystroke input raises red flags over true location</a></li><li><a title="Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs" rel="nofollow" href="https://intezer.com/blog/tracing-a-paper-werewolf-campaign-through-ai-generated-decoys-and-excel-xlls/">Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs</a></li><li><a title="Russian defense firms targeted by hackers using AI" rel="nofollow" href="https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/">Russian defense firms targeted by hackers using AI</a></li><li><a title="TLPBLACK looks back at 2025" rel="nofollow" href="https://tlpblack.net/blog/20251218-cybersecurity-year-in-review">TLPBLACK looks back at 2025</a></li><li><a title="Inside Google&#39;s basement in Malaga: ChatGPT of Cybersecurity" rel="nofollow" href="https://www.surinenglish.com/malaga/malaga-city/inside-googles-basement-malaga-bernardo-quintero-and-20250929151803-nt.html">Inside Google's basement in Malaga: ChatGPT of Cybersecurity</a></li><li><a title="GitHub - xdanx/open-klara: Open KLara Project" rel="nofollow" href="https://github.com/xdanx/open-klara">GitHub - xdanx/open-klara: Open KLara Project</a></li><li><a title="Gepetto Web" rel="nofollow" href="https://blog.kwiatkowski.fr/gepetto-web">Gepetto Web</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+n34uDfFW</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+n34uDfFW" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Legal corruption, React2Shell exploitation, dual-use AI risks</title>
      <link>http://securityconversations.fireside.fm/legal-corruption-react2shell-dual-use-ai</link>
      <guid isPermaLink="false">19aa0c04-e5f9-41d8-aaf1-ff63afa670c2</guid>
      <pubDate>Thu, 11 Dec 2025 00:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/19aa0c04-e5f9-41d8-aaf1-ff63afa670c2.mp3" length="109850621" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 76:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  

Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:12:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/19aa0c04-e5f9-41d8-aaf1-ff63afa670c2/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 76</strong>:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  </p>

<p>Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>React, zero-day, Patch Tuesday, Microsoft, Google, Russia, China, Chrome, OpenAI, ChatGPT, Ukraine</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 76</strong>:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  </p>

<p>Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1QvJifziSlBUyaXKXsXw3-hdK5nXZpyi8ucx1YSr60gE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker : A security platform that prevents ransomware" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker : A security platform that prevents ransomware</a></li><li><a title="The Anatomy of a React2Shell Compromise (TLPBLACK)" rel="nofollow" href="https://tlpblack.net/blog/20251209-the-anatomy-of-a-react2shell-compromise">The Anatomy of a React2Shell Compromise (TLPBLACK)</a></li><li><a title="CVE-2025-55182 Analysis Report (GreyNoise)" rel="nofollow" href="https://react2025cve-analysis.pages.dev/">CVE-2025-55182 Analysis Report (GreyNoise)</a></li><li><a title="Exploitation of Critical Vulnerability in React Server Components" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2025-55182-react-and-CVE-2025-66478-next/">Exploitation of Critical Vulnerability in React Server Components</a></li><li><a title="PeerBlight Linux Backdoor Exploits React2Shell (Huntress)" rel="nofollow" href="https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell">PeerBlight Linux Backdoor Exploits React2Shell (Huntress)</a></li><li><a title="Patch Tuesday round-up (ZDI)" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/12/9/the-december-2025-security-update-review">Patch Tuesday round-up (ZDI)</a></li><li><a title="How Two Hackers Went From Cisco Academy to Cisco CVEs" rel="nofollow" href="https://www.sentinelone.com/labs/malicious-apprentice-how-two-hackers-went-from-cisco-academy-to-cisco-cves/">How Two Hackers Went From Cisco Academy to Cisco CVEs</a></li><li><a title="Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ " rel="nofollow" href="https://archive.ph/bpdaU">Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ </a></li><li><a title="OpenAI on dual-use AI risks" rel="nofollow" href="https://openai.com/index/strengthening-cyber-resilience/">OpenAI on dual-use AI risks</a></li><li><a title="Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite" rel="nofollow" href="https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/">Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite</a></li><li><a title="DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal">DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups</a></li><li><a title="Microsoft paying bounties for vulns in third-party code" rel="nofollow" href="https://www.microsoft.com/en-us/msrc/blog/2025/12/in-scope-by-default">Microsoft paying bounties for vulns in third-party code</a></li><li><a title="Cybersecurity 2026 Predictions (SentinelLABS)" rel="nofollow" href="https://www.sentinelone.com/blog/cybersecurity-2026-the-year-ahead-in-ai-adversaries-and-global-change/">Cybersecurity 2026 Predictions (SentinelLABS)</a></li><li><a title="Dakota Cary is in the &quot;anti-China Chorus&quot;" rel="nofollow" href="https://www.linkedin.com/posts/dakotacary_thanks-for-the-love-china-happy-to-be-part-activity-7402094307261706240-Bjr6/">Dakota Cary is in the "anti-China Chorus"</a></li><li><a title="Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing" rel="nofollow" href="https://arxiv.org/abs/2512.09882">Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing</a></li><li><a title="Automated React2Shell vulnerability patching is now available - Vercel" rel="nofollow" href="https://vercel.com/changelog/automated-react2shell-vulnerability-patching-is-now-available">Automated React2Shell vulnerability patching is now available - Vercel</a></li><li><a title="Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research" rel="nofollow" href="https://www.itweb.co.za/article/computer-olympiad-enters-new-era-as-iitpsa-hands-over-to-thinkst-applied-research/j5alrMQALdWMpYQk">Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 76</strong>:  On the show this week, Costin walks through how a single Romanian documentary kick-started nationwide protests, exposing how corruption can be perfectly legal when the law itself is gamed, and why this moment feels different, darker, and more consequential than past flare-ups.  </p>

<p>Plus, news on the React-to-Shell exploitation wave overwhelming the internet, why patching is structurally hard, and how APTs and criminals are converging on the same fragile dependency chain. Along the way, they take aim at Microsoft’s shrinking transparency, the limits of vendor trust, and what it really means when defenders are told (again) to just patch and pray.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1QvJifziSlBUyaXKXsXw3-hdK5nXZpyi8ucx1YSr60gE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker : A security platform that prevents ransomware" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker : A security platform that prevents ransomware</a></li><li><a title="The Anatomy of a React2Shell Compromise (TLPBLACK)" rel="nofollow" href="https://tlpblack.net/blog/20251209-the-anatomy-of-a-react2shell-compromise">The Anatomy of a React2Shell Compromise (TLPBLACK)</a></li><li><a title="CVE-2025-55182 Analysis Report (GreyNoise)" rel="nofollow" href="https://react2025cve-analysis.pages.dev/">CVE-2025-55182 Analysis Report (GreyNoise)</a></li><li><a title="Exploitation of Critical Vulnerability in React Server Components" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2025-55182-react-and-CVE-2025-66478-next/">Exploitation of Critical Vulnerability in React Server Components</a></li><li><a title="PeerBlight Linux Backdoor Exploits React2Shell (Huntress)" rel="nofollow" href="https://www.huntress.com/blog/peerblight-linux-backdoor-exploits-react2shell">PeerBlight Linux Backdoor Exploits React2Shell (Huntress)</a></li><li><a title="Patch Tuesday round-up (ZDI)" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/12/9/the-december-2025-security-update-review">Patch Tuesday round-up (ZDI)</a></li><li><a title="How Two Hackers Went From Cisco Academy to Cisco CVEs" rel="nofollow" href="https://www.sentinelone.com/labs/malicious-apprentice-how-two-hackers-went-from-cisco-academy-to-cisco-cves/">How Two Hackers Went From Cisco Academy to Cisco CVEs</a></li><li><a title="Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ " rel="nofollow" href="https://archive.ph/bpdaU">Two Men Linked to China’s Salt Typhoon Hacker Group Likely Trained in a Cisco ‘Academy’ </a></li><li><a title="OpenAI on dual-use AI risks" rel="nofollow" href="https://openai.com/index/strengthening-cyber-resilience/">OpenAI on dual-use AI risks</a></li><li><a title="Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite" rel="nofollow" href="https://unit42.paloaltonetworks.com/hamas-affiliate-ashen-lepus-uses-new-malware-suite-ashtag/">Hamas-Affiliated Ashen Lepus Targets Middle Eastern Diplomatic Entities With New AshTag Malware Suite</a></li><li><a title="DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-actions-combat-two-russian-state-sponsored-cyber-criminal">DOJ Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups</a></li><li><a title="Microsoft paying bounties for vulns in third-party code" rel="nofollow" href="https://www.microsoft.com/en-us/msrc/blog/2025/12/in-scope-by-default">Microsoft paying bounties for vulns in third-party code</a></li><li><a title="Cybersecurity 2026 Predictions (SentinelLABS)" rel="nofollow" href="https://www.sentinelone.com/blog/cybersecurity-2026-the-year-ahead-in-ai-adversaries-and-global-change/">Cybersecurity 2026 Predictions (SentinelLABS)</a></li><li><a title="Dakota Cary is in the &quot;anti-China Chorus&quot;" rel="nofollow" href="https://www.linkedin.com/posts/dakotacary_thanks-for-the-love-china-happy-to-be-part-activity-7402094307261706240-Bjr6/">Dakota Cary is in the "anti-China Chorus"</a></li><li><a title="Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing" rel="nofollow" href="https://arxiv.org/abs/2512.09882">Comparing AI Agents to Cybersecurity Professionals in Real-World Penetration Testing</a></li><li><a title="Automated React2Shell vulnerability patching is now available - Vercel" rel="nofollow" href="https://vercel.com/changelog/automated-react2shell-vulnerability-patching-is-now-available">Automated React2Shell vulnerability patching is now available - Vercel</a></li><li><a title="Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research" rel="nofollow" href="https://www.itweb.co.za/article/computer-olympiad-enters-new-era-as-iitpsa-hands-over-to-thinkst-applied-research/j5alrMQALdWMpYQk">Computer Olympiad enters new era as IITPSA hands over to Thinkst Applied Research</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+oLT5UkkN</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+oLT5UkkN" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>APTs pounce on React2Shell; BRICKSTORM backdoors; .gov surveillance</title>
      <link>http://securityconversations.fireside.fm/react2shell-group78-brickstorm-ai-smart-contract</link>
      <guid isPermaLink="false">e6afdf9b-3a12-408d-a9c0-59ed0c3b899a</guid>
      <pubDate>Sat, 06 Dec 2025 10:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e6afdf9b-3a12-408d-a9c0-59ed0c3b899a.mp3" length="80166900" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code).

Three Buddy Problem - Episode 75:  We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.

Plus, commentary on Chrome’s telemetry collection, Microsoft and the "SFI success story," newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic's AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>1:41:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e6afdf9b-3a12-408d-a9c0-59ed0c3b899a/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 75</strong>: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.</p>

<p>Plus, commentary on Chrome’s telemetry collection, Microsoft and the &quot;SFI success story,&quot; newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic&#39;s AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>ThreatLocker, React2Shell, Jackpot Panda, China, CVE-2025-55182, RCE, Warp Panda, Brickstorm, FirstWap, GrapheneOS, Group 78,  Intellexa, spyware, Calisto, Google, Microsoft</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 75</strong>: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.</p>

<p>Plus, commentary on Chrome’s telemetry collection, Microsoft and the &quot;SFI success story,&quot; newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic&#39;s AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DZ0EOVM_wbkXbdlKkiSsf1PpbjYqBTAcJLAxnO2TeYU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker</a> &mdash; Meet the cybersecurity platform that prevents ransomware</li><li><a title="An essay by Vess" rel="nofollow" href="https://bontchev.nlcv.bas.bg/bye.html">An essay by Vess</a></li><li><a title="RIP Stealth" rel="nofollow" href="https://www.thc.org/404/stealth/eulogy.txt">RIP Stealth</a></li><li><a title="Google Goodbye to the Chrome Cleanup Tool" rel="nofollow" href="https://security.googleblog.com/2023/03/thank-you-and-goodbye-to-chrome-cleanup.html">Google Goodbye to the Chrome Cleanup Tool</a></li><li><a title="US National Security Strategy (PDF)" rel="nofollow" href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">US National Security Strategy (PDF)</a></li><li><a title="Critical Security Vulnerability in React Server Components (CVE-2025-55182) " rel="nofollow" href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components">Critical Security Vulnerability in React Server Components (CVE-2025-55182) </a></li><li><a title="Chinese threat groups rapidly exploit React2Shell vuln" rel="nofollow" href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/">Chinese threat groups rapidly exploit React2Shell vuln</a></li><li><a title="AWS MadPot" rel="nofollow" href="https://aws.amazon.com/blogs/security/how-aws-tracks-the-clouds-biggest-security-threats-and-helps-shut-them-down/">AWS MadPot</a></li><li><a title="BRICKSTORM Backdoor (PDF)" rel="nofollow" href="https://media.defense.gov/2025/Dec/04/2003834878/-1/-1/0/MALWARE-ANALYSIS-REPORT-BRICKSTORM-BACKDOOR.PDF">BRICKSTORM Backdoor (PDF)</a></li><li><a title="WARP PANDA: A New Sophisticated China-Nexus Adversary" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/">WARP PANDA: A New Sophisticated China-Nexus Adversary</a></li><li><a title="Meet Group 78, the secret US task force that fights cybercriminals" rel="nofollow" href="https://archive.vn/UKEmz">Meet Group 78, the secret US task force that fights cybercriminals</a></li><li><a title="Recorded Future: Intellexa’s Global Corporate Web" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Recorded Future: Intellexa’s Global Corporate Web</a></li><li><a title="Intellexa’s Prolific Zero-Day Exploits Continue" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/intellexa-zero-day-exploits-continue">Intellexa’s Prolific Zero-Day Exploits Continue</a></li><li><a title="To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware" rel="nofollow" href="https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/">To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware</a></li><li><a title="Apple, Google send new round of threat notifications to users around world" rel="nofollow" href="https://www.reuters.com/technology/apple-sent-new-round-cyber-threat-notifications-users-84-countries-2025-12-05/">Apple, Google send new round of threat notifications to users around world</a></li><li><a title="Calisto Targets Reporters Without Borders in Phishing Campaign" rel="nofollow" href="https://blog.sekoia.io/ngo-reporters-without-borders-targeted-by-calisto-in-recent-campaign/">Calisto Targets Reporters Without Borders in Phishing Campaign</a></li><li><a title="Anthropic AI agents find $4.6M in blockchain smart contract exploits" rel="nofollow" href="https://red.anthropic.com/2025/smart-contracts/">Anthropic AI agents find $4.6M in blockchain smart contract exploits</a></li><li><a title="Lazarus hack largest South Korean crypto exchange" rel="nofollow" href="https://upbit.com/service_center/notice?id=5800&amp;view=share">Lazarus hack largest South Korean crypto exchange</a></li><li><a title="EU countries reach breakthrough on chat-scanning law despite intense pushback" rel="nofollow" href="https://www.euractiv.com/news/eu-countries-reach-breakthrough-on-chat-scanning-law-despite-intense-pushback/">EU countries reach breakthrough on chat-scanning law despite intense pushback</a></li><li><a title="The Denial of Death - by Ernest Becker" rel="nofollow" href="https://www.goodreads.com/book/show/2761.The_Denial_of_Death">The Denial of Death - by Ernest Becker</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://threatlocker.com/threebuddyproblem" rel="nofollow">ThreatLocker</a>: Allow what you need. Block everything else by default, including ransomware and rogue code.</em>)</p>

<p><strong>Three Buddy Problem - Episode 75</strong>: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of malware intrusions to come.</p>

<p>Plus, commentary on Chrome’s telemetry collection, Microsoft and the &quot;SFI success story,&quot; newest BRICKSTORM backdoor intrusions, the US national security strategy, Anthropic&#39;s AI popping smart-contract bugs, a secret FBI ransomware-hunting unit getting weird, and a pair of sad stories in the security community.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1DZ0EOVM_wbkXbdlKkiSsf1PpbjYqBTAcJLAxnO2TeYU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="ThreatLocker" rel="nofollow" href="https://www.threatlocker.com/threebuddyproblem">ThreatLocker</a> &mdash; Meet the cybersecurity platform that prevents ransomware</li><li><a title="An essay by Vess" rel="nofollow" href="https://bontchev.nlcv.bas.bg/bye.html">An essay by Vess</a></li><li><a title="RIP Stealth" rel="nofollow" href="https://www.thc.org/404/stealth/eulogy.txt">RIP Stealth</a></li><li><a title="Google Goodbye to the Chrome Cleanup Tool" rel="nofollow" href="https://security.googleblog.com/2023/03/thank-you-and-goodbye-to-chrome-cleanup.html">Google Goodbye to the Chrome Cleanup Tool</a></li><li><a title="US National Security Strategy (PDF)" rel="nofollow" href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">US National Security Strategy (PDF)</a></li><li><a title="Critical Security Vulnerability in React Server Components (CVE-2025-55182) " rel="nofollow" href="https://react.dev/blog/2025/12/03/critical-security-vulnerability-in-react-server-components">Critical Security Vulnerability in React Server Components (CVE-2025-55182) </a></li><li><a title="Chinese threat groups rapidly exploit React2Shell vuln" rel="nofollow" href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/">Chinese threat groups rapidly exploit React2Shell vuln</a></li><li><a title="AWS MadPot" rel="nofollow" href="https://aws.amazon.com/blogs/security/how-aws-tracks-the-clouds-biggest-security-threats-and-helps-shut-them-down/">AWS MadPot</a></li><li><a title="BRICKSTORM Backdoor (PDF)" rel="nofollow" href="https://media.defense.gov/2025/Dec/04/2003834878/-1/-1/0/MALWARE-ANALYSIS-REPORT-BRICKSTORM-BACKDOOR.PDF">BRICKSTORM Backdoor (PDF)</a></li><li><a title="WARP PANDA: A New Sophisticated China-Nexus Adversary" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/warp-panda-cloud-threats/">WARP PANDA: A New Sophisticated China-Nexus Adversary</a></li><li><a title="Meet Group 78, the secret US task force that fights cybercriminals" rel="nofollow" href="https://archive.vn/UKEmz">Meet Group 78, the secret US task force that fights cybercriminals</a></li><li><a title="Recorded Future: Intellexa’s Global Corporate Web" rel="nofollow" href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Recorded Future: Intellexa’s Global Corporate Web</a></li><li><a title="Intellexa’s Prolific Zero-Day Exploits Continue" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/intellexa-zero-day-exploits-continue">Intellexa’s Prolific Zero-Day Exploits Continue</a></li><li><a title="To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware" rel="nofollow" href="https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/">To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware</a></li><li><a title="Apple, Google send new round of threat notifications to users around world" rel="nofollow" href="https://www.reuters.com/technology/apple-sent-new-round-cyber-threat-notifications-users-84-countries-2025-12-05/">Apple, Google send new round of threat notifications to users around world</a></li><li><a title="Calisto Targets Reporters Without Borders in Phishing Campaign" rel="nofollow" href="https://blog.sekoia.io/ngo-reporters-without-borders-targeted-by-calisto-in-recent-campaign/">Calisto Targets Reporters Without Borders in Phishing Campaign</a></li><li><a title="Anthropic AI agents find $4.6M in blockchain smart contract exploits" rel="nofollow" href="https://red.anthropic.com/2025/smart-contracts/">Anthropic AI agents find $4.6M in blockchain smart contract exploits</a></li><li><a title="Lazarus hack largest South Korean crypto exchange" rel="nofollow" href="https://upbit.com/service_center/notice?id=5800&amp;view=share">Lazarus hack largest South Korean crypto exchange</a></li><li><a title="EU countries reach breakthrough on chat-scanning law despite intense pushback" rel="nofollow" href="https://www.euractiv.com/news/eu-countries-reach-breakthrough-on-chat-scanning-law-despite-intense-pushback/">EU countries reach breakthrough on chat-scanning law despite intense pushback</a></li><li><a title="The Denial of Death - by Ernest Becker" rel="nofollow" href="https://www.goodreads.com/book/show/2761.The_Denial_of_Death">The Denial of Death - by Ernest Becker</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+d0aejyfk</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+d0aejyfk" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture</title>
      <link>http://securityconversations.fireside.fm/regulatory-retreats-russian-ai-fault-line</link>
      <guid isPermaLink="false">7c947947-5644-4334-baea-80d629cfb457</guid>
      <pubDate>Sat, 29 Nov 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7c947947-5644-4334-baea-80d629cfb457.mp3" length="97441193" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 74: We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.

We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>1:57:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7c947947-5644-4334-baea-80d629cfb457/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Microsoft, CISO, CYBERWARCON, Geneva Convention, Shai-Hulud, npm, supply chain, GitHub, CISA, Apple, iOS, Android, spyware, Arctic Wolf, Russia, Ukraine, FCC, Amazon, telcos, Material Security</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1t0o3sQmcv3EUJyMZCM25MH3SPB4cFAhVfB3qMvwvOQ4/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft CISO LinkedIn comments" rel="nofollow" href="https://www.linkedin.com/posts/igor-tsyganskiy-9385951_last-week-at-cyberwarcon-i-gave-a-short-activity-7398088148834086912-_Y1A/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAfLqABykGPZb2fgxnSm0cjGdhFUlQg658">Microsoft CISO LinkedIn comments</a></li><li><a title="Shai Hulud 2.0 Strikes Again" rel="nofollow" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Shai Hulud 2.0 Strikes Again</a></li><li><a title="Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed" rel="nofollow" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed</a></li><li><a title="CISA guidance on mobile spyware on iOS, Android" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-11/guidance-mobile-communications-best-practices-20251124_508c.pdf">CISA guidance on mobile spyware on iOS, Android</a></li><li><a title="NSO Group argues WhatsApp injunction threatens existence" rel="nofollow" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/">NSO Group argues WhatsApp injunction threatens existence</a></li><li><a title="Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine" rel="nofollow" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/">Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine</a></li><li><a title="FCC revokes telecom cybersecurity rules after Salt Typhoon hacks" rel="nofollow" href="https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-vote">FCC revokes telecom cybersecurity rules after Salt Typhoon hacks</a></li><li><a title="FCC Chairman statement on removing telco rules" rel="nofollow" href="https://www.fcc.gov/news-events/blog/2025/10/29/halloween-treats">FCC Chairman statement on removing telco rules</a></li><li><a title="Amazon Is Using Specialized AI Agents for Deep Bug Hunting" rel="nofollow" href="https://archive.ph/Vq28p">Amazon Is Using Specialized AI Agents for Deep Bug Hunting</a></li><li><a title="Anthropic CEO called to testify on AI cyber threats" rel="nofollow" href="https://www.axios.com/2025/11/26/anthropic-google-cloud-quantum-xchange-house-homeland-hearing">Anthropic CEO called to testify on AI cyber threats</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Material Security (Book a demo)" rel="nofollow" href="https://material.security/product">Material Security (Book a demo)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 74</strong>:  We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture on intel sharing, regulation, and its outsized grip on the security ecosystem.  Plus, coverage of the Shai-Hulud npm supply-chain mess, CISA’s mobile spyware guidance, NSO’s legal contortions, a sharp new GRU-linked intrusion from Arctic Wolf.</p>

<p>We also discuss the FCC retreating on telco security rules, and the emerging AI arms race shaping how cloud giants hunt threats and how Washington misunderstands all of it.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1t0o3sQmcv3EUJyMZCM25MH3SPB4cFAhVfB3qMvwvOQ4/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft CISO LinkedIn comments" rel="nofollow" href="https://www.linkedin.com/posts/igor-tsyganskiy-9385951_last-week-at-cyberwarcon-i-gave-a-short-activity-7398088148834086912-_Y1A/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAAfLqABykGPZb2fgxnSm0cjGdhFUlQg658">Microsoft CISO LinkedIn comments</a></li><li><a title="Shai Hulud 2.0 Strikes Again" rel="nofollow" href="https://www.aikido.dev/blog/shai-hulud-strikes-again-hitting-zapier-ensdomains">Shai Hulud 2.0 Strikes Again</a></li><li><a title="Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed" rel="nofollow" href="https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack">Wiz: Sha1-Hulud 2.0 Supply Chain Attack: 25K+ Repos Exposed</a></li><li><a title="CISA guidance on mobile spyware on iOS, Android" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-11/guidance-mobile-communications-best-practices-20251124_508c.pdf">CISA guidance on mobile spyware on iOS, Android</a></li><li><a title="NSO Group argues WhatsApp injunction threatens existence" rel="nofollow" href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/">NSO Group argues WhatsApp injunction threatens existence</a></li><li><a title="Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine" rel="nofollow" href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/">Arctic Wolf: Russian APT targets U.S. Companies Supporting Ukraine</a></li><li><a title="FCC revokes telecom cybersecurity rules after Salt Typhoon hacks" rel="nofollow" href="https://www.axios.com/2025/11/20/fcc-telecom-cybersecurity-rules-vote">FCC revokes telecom cybersecurity rules after Salt Typhoon hacks</a></li><li><a title="FCC Chairman statement on removing telco rules" rel="nofollow" href="https://www.fcc.gov/news-events/blog/2025/10/29/halloween-treats">FCC Chairman statement on removing telco rules</a></li><li><a title="Amazon Is Using Specialized AI Agents for Deep Bug Hunting" rel="nofollow" href="https://archive.ph/Vq28p">Amazon Is Using Specialized AI Agents for Deep Bug Hunting</a></li><li><a title="Anthropic CEO called to testify on AI cyber threats" rel="nofollow" href="https://www.axios.com/2025/11/26/anthropic-google-cloud-quantum-xchange-house-homeland-hearing">Anthropic CEO called to testify on AI cyber threats</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Material Security (Book a demo)" rel="nofollow" href="https://material.security/product">Material Security (Book a demo)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+olmqi_C1</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+olmqi_C1" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Gemini 3 reactions, Fortinet/Chrome zero-days, a Cloudflare monoculture and a billion-dollar crypto twist</title>
      <link>http://securityconversations.fireside.fm/cyberwarcon-fortinet-chrome-zeroday-gemini</link>
      <guid isPermaLink="false">31f838fc-0034-4c68-9a05-ee1c232837dc</guid>
      <pubDate>Fri, 21 Nov 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/31f838fc-0034-4c68-9a05-ee1c232837dc.mp3" length="115839478" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices).

Three Buddy Problem - Episode 73:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. 

Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China's CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:19:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/31f838fc-0034-4c68-9a05-ee1c232837dc/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 73</strong>:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. </p>

<p>Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China&#39;s CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Gemini, Google, Microsoft, CYBERWARCON, APT29, China, Russia, Volt Typhoon, Amazon, Venture Capital, Fortinet, Chrome, zero-day, Cloudflare, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 73</strong>:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. </p>

<p>Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China&#39;s CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security -- Stop Attacks, Secure Data " rel="nofollow" href="https://material.security/product">Material Security -- Stop Attacks, Secure Data </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1se0fiX0sXOEpp5I6NiQJYfcji4_6b0uowkHl2sv8vuU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Why Microsoft Needs to Split Windows in Two" rel="nofollow" href="https://medium.com/@costin.raiu/is-it-time-for-a-divorce-why-microsoft-needs-to-split-windows-in-two-29a46b0621b6?postPublishedType=initial">Why Microsoft Needs to Split Windows in Two</a></li><li><a title="CYBERWARCON agenda" rel="nofollow" href="https://www.cyberwarcon.com/agenda-25">CYBERWARCON agenda</a></li><li><a title="Amazon: Nation-state actors bridging cyber and kinetic warfare" rel="nofollow" href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/">Amazon: Nation-state actors bridging cyber and kinetic warfare</a></li><li><a title="Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools" rel="nofollow" href="https://archive.ph/YXh8Y">Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools</a></li><li><a title="Fortinet documents 0day attacks" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-513">Fortinet documents 0day attacks</a></li><li><a title="Fortinet CVE-2025-64446 Under Active Attack" rel="nofollow" href="https://decipher.sc/2025/11/17/fortinet-cve-2025-64446-under-active-attack/">Fortinet CVE-2025-64446 Under Active Attack</a></li><li><a title="Google Chrome zero-day exploited" rel="nofollow" href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html">Google Chrome zero-day exploited</a></li><li><a title="Cloudflare statement on outage on November 18, 2025" rel="nofollow" href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare statement on outage on November 18, 2025</a></li><li><a title="Cloudflare just got faster and more secure, powered by Rust" rel="nofollow" href="https://blog.cloudflare.com/20-percent-internet-upgrade/">Cloudflare just got faster and more secure, powered by Rust</a></li><li><a title="Russian alleged cyber-hacker faces extradition to US after arrest in Thailand" rel="nofollow" href="https://edition.cnn.com/2025/11/15/asia/denis-obrezko-russia-hacker-thailand-void-blizzard">Russian alleged cyber-hacker faces extradition to US after arrest in Thailand</a></li><li><a title="Russian detained over connection to Void Blizzard attacks" rel="nofollow" href="https://repoct.org/news/105205-ekc-sotrudnik_akademii_kriptografii_fsb_i_laboratorii_kasperskogo_zaderhan_v_tailande_po_delu_o_hakerskoj_gruppe_void_bl">Russian detained over connection to Void Blizzard attacks</a></li><li><a title="Positive Technologies: Attacks of the Striking Panda" rel="nofollow" href="https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today/">Positive Technologies: Attacks of the Striking Panda</a></li><li><a title="PlushDaemon compromises network devices for adversary-in-the-middle attacks" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/">PlushDaemon compromises network devices for adversary-in-the-middle attacks</a></li><li><a title="PlushDaemon compromises supply chain of Korean VPN service" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/">PlushDaemon compromises supply chain of Korean VPN service</a></li><li><a title="ASUS Routers Hijacked in Global &#39;WrtHug&#39; Operation" rel="nofollow" href="https://securityscorecard.com/wp-content/uploads/2025/11/STRIKE_Asus_WrtHug-Report_V6.pdf">ASUS Routers Hijacked in Global 'WrtHug' Operation</a></li><li><a title="Arkham on Bitcoin Chen Zhi seized funds" rel="nofollow" href="https://intel.arkm.com/explorer/tx/55de9e33c7fd10705d0f1e05f5899ae27c61a3f13dd3ff5156ce794b504094ae">Arkham on Bitcoin Chen Zhi seized funds</a></li><li><a title="US DOJ $15 Billion Bitcoin Indictment" rel="nofollow" href="https://www.justice.gov/usao-edny/pr/chairman-prince-group-indicted-operating-cambodian-forced-labor-scam-compounds-engaged">US DOJ $15 Billion Bitcoin Indictment</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="PIVOTcon 2026" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2026</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="The Age of Disclosure (Prime Video)" rel="nofollow" href="https://www.amazon.com/Age-Disclosure-Dan-Farah/dp/B0FMF29BBJ">The Age of Disclosure (Prime Video)</a></li><li><a title="Amazon.com: Bullshit Jobs" rel="nofollow" href="https://www.amazon.com/dp/B079YYRGSB/">Amazon.com: Bullshit Jobs</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>(<em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em>)</p>

<p><strong>Three Buddy Problem - Episode 73</strong>:  The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machines, and major highlights from CYBERWARCON. We revisit the long-running debate over APT naming conventions, examine Amazon’s latest threat-intel reporting on Iranian activity, and walk through the Cloudflare outage that briefly knocked chunks of the internet offline. </p>

<p>Plus, new APT reports from ESET, Positive Technologies, and SecurityScorecard, and China&#39;s CN-CERT (now validated claim) that the U.S. government seized billions in Bitcoin tied to the Lubian mining-pool hack.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security -- Stop Attacks, Secure Data " rel="nofollow" href="https://material.security/product">Material Security -- Stop Attacks, Secure Data </a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1se0fiX0sXOEpp5I6NiQJYfcji4_6b0uowkHl2sv8vuU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Why Microsoft Needs to Split Windows in Two" rel="nofollow" href="https://medium.com/@costin.raiu/is-it-time-for-a-divorce-why-microsoft-needs-to-split-windows-in-two-29a46b0621b6?postPublishedType=initial">Why Microsoft Needs to Split Windows in Two</a></li><li><a title="CYBERWARCON agenda" rel="nofollow" href="https://www.cyberwarcon.com/agenda-25">CYBERWARCON agenda</a></li><li><a title="Amazon: Nation-state actors bridging cyber and kinetic warfare" rel="nofollow" href="https://aws.amazon.com/blogs/security/new-amazon-threat-intelligence-findings-nation-state-actors-bridging-cyber-and-kinetic-warfare/">Amazon: Nation-state actors bridging cyber and kinetic warfare</a></li><li><a title="Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools" rel="nofollow" href="https://archive.ph/YXh8Y">Cyber Warfare Startup Nabs Contracts to Give US Military Hackers AI Tools</a></li><li><a title="Fortinet documents 0day attacks" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-25-513">Fortinet documents 0day attacks</a></li><li><a title="Fortinet CVE-2025-64446 Under Active Attack" rel="nofollow" href="https://decipher.sc/2025/11/17/fortinet-cve-2025-64446-under-active-attack/">Fortinet CVE-2025-64446 Under Active Attack</a></li><li><a title="Google Chrome zero-day exploited" rel="nofollow" href="https://chromereleases.googleblog.com/2025/11/stable-channel-update-for-desktop_17.html">Google Chrome zero-day exploited</a></li><li><a title="Cloudflare statement on outage on November 18, 2025" rel="nofollow" href="https://blog.cloudflare.com/18-november-2025-outage/">Cloudflare statement on outage on November 18, 2025</a></li><li><a title="Cloudflare just got faster and more secure, powered by Rust" rel="nofollow" href="https://blog.cloudflare.com/20-percent-internet-upgrade/">Cloudflare just got faster and more secure, powered by Rust</a></li><li><a title="Russian alleged cyber-hacker faces extradition to US after arrest in Thailand" rel="nofollow" href="https://edition.cnn.com/2025/11/15/asia/denis-obrezko-russia-hacker-thailand-void-blizzard">Russian alleged cyber-hacker faces extradition to US after arrest in Thailand</a></li><li><a title="Russian detained over connection to Void Blizzard attacks" rel="nofollow" href="https://repoct.org/news/105205-ekc-sotrudnik_akademii_kriptografii_fsb_i_laboratorii_kasperskogo_zaderhan_v_tailande_po_delu_o_hakerskoj_gruppe_void_bl">Russian detained over connection to Void Blizzard attacks</a></li><li><a title="Positive Technologies: Attacks of the Striking Panda" rel="nofollow" href="https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today/">Positive Technologies: Attacks of the Striking Panda</a></li><li><a title="PlushDaemon compromises network devices for adversary-in-the-middle attacks" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/">PlushDaemon compromises network devices for adversary-in-the-middle attacks</a></li><li><a title="PlushDaemon compromises supply chain of Korean VPN service" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-supply-chain-korean-vpn-service/">PlushDaemon compromises supply chain of Korean VPN service</a></li><li><a title="ASUS Routers Hijacked in Global &#39;WrtHug&#39; Operation" rel="nofollow" href="https://securityscorecard.com/wp-content/uploads/2025/11/STRIKE_Asus_WrtHug-Report_V6.pdf">ASUS Routers Hijacked in Global 'WrtHug' Operation</a></li><li><a title="Arkham on Bitcoin Chen Zhi seized funds" rel="nofollow" href="https://intel.arkm.com/explorer/tx/55de9e33c7fd10705d0f1e05f5899ae27c61a3f13dd3ff5156ce794b504094ae">Arkham on Bitcoin Chen Zhi seized funds</a></li><li><a title="US DOJ $15 Billion Bitcoin Indictment" rel="nofollow" href="https://www.justice.gov/usao-edny/pr/chairman-prince-group-indicted-operating-cambodian-forced-labor-scam-compounds-engaged">US DOJ $15 Billion Bitcoin Indictment</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="PIVOTcon 2026" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2026</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="The Age of Disclosure (Prime Video)" rel="nofollow" href="https://www.amazon.com/Age-Disclosure-Dan-Farah/dp/B0FMF29BBJ">The Age of Disclosure (Prime Video)</a></li><li><a title="Amazon.com: Bullshit Jobs" rel="nofollow" href="https://www.amazon.com/dp/B079YYRGSB/">Amazon.com: Bullshit Jobs</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+6aE5KWoj</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+6aE5KWoj" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Anthropic Claude Code automating APT hacks, KnownSec leak, Chinese buses with remote access</title>
      <link>http://securityconversations.fireside.fm/claude-code-china-apt-knownsec-breach-bitcoin-blame</link>
      <guid isPermaLink="false">421221b9-44be-468b-9621-d645805efd84</guid>
      <pubDate>Fri, 14 Nov 2025 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/421221b9-44be-468b-9621-d645805efd84.mp3" length="108418078" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.

Three Buddy Problem - Episode 72: We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. 

Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as "actively exploited."

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>2:12:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/421221b9-44be-468b-9621-d645805efd84/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 72</strong>:  We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. </p>

<p>Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as &quot;actively exploited.&quot;</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>AI, OpenAI, Anthropic, Claude Code, Apple, Google, China, APT, Bitcoin, CISA, Cisco, Ivanti, KnownSec, Microsoft, AI Private Compute, Yutong</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 72</strong>:  We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. </p>

<p>Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as &quot;actively exploited.&quot;</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NrlNDzKbVm8tGd7n_ojvGTCMI6btaXLHQt0oMy57bxA/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security case studies" rel="nofollow" href="https://material.security/customers">Material Security case studies</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign" rel="nofollow" href="https://www.anthropic.com/news/disrupting-AI-espionage">Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign</a></li><li><a title="Anthropic report on AI-orchestreated APT campaign ()DF)" rel="nofollow" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">Anthropic report on AI-orchestreated APT campaign ()DF)</a></li><li><a title="Data breach at Chinese infosec firm reveals weapons arsenal" rel="nofollow" href="https://www.theregister.com/2025/11/09/asia_tech_news_roundup/">Data breach at Chinese infosec firm reveals weapons arsenal</a></li><li><a title="Twitter thread on KnownSec breach details" rel="nofollow" href="https://x.com/intcyberdigest/status/1988355649269387488?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Twitter thread on KnownSec breach details</a></li><li><a title="China Accuses US of Orchestrating $13 Billion Bitcoin Hack" rel="nofollow" href="https://archive.ph/5Iyes">China Accuses US of Orchestrating $13 Billion Bitcoin Hack</a></li><li><a title="CISA finds federal agencies missing critical (exploited) vulns" rel="nofollow" href="https://www.cisa.gov/ed-25-03-guidance-device-updates-and-patching">CISA finds federal agencies missing critical (exploited) vulns</a></li><li><a title="Amazon discovers APT exploiting Cisco and Citrix zero-days" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/">Amazon discovers APT exploiting Cisco and Citrix zero-days</a></li><li><a title="Amazon launches private AI bug bounty program" rel="nofollow" href="https://www.amazon.science/news/amazon-launches-private-ai-bug-bounty-to-strengthen-nova-models">Amazon launches private AI bug bounty program</a></li><li><a title="Amazon Nova" rel="nofollow" href="https://nova.amazon.com/chat">Amazon Nova</a></li><li><a title="Microsoft Warns of Exploited Windows Kernel Zero-Day" rel="nofollow" href="https://decipher.sc/2025/11/11/microsoft-warns-of-exploited-windows-kernel-zero-day/">Microsoft Warns of Exploited Windows Kernel Zero-Day</a></li><li><a title="Google intros Private AI Compute tech" rel="nofollow" href="https://blog.google/technology/ai/google-private-ai-compute/">Google intros Private AI Compute tech</a></li><li><a title="Google paper on Private AI Computer (PDF)" rel="nofollow" href="https://services.google.com/fh/files/misc/private_ai_compute_technical_brief.pdf">Google paper on Private AI Computer (PDF)</a></li><li><a title="OpenAI CISO on NYTimes request for ChatGPT conversations" rel="nofollow" href="https://openai.com/index/fighting-nyt-user-privacy-invasion/">OpenAI CISO on NYTimes request for ChatGPT conversations</a></li><li><a title="UK transport and cyber-security chiefs investigate Chinese-made buses " rel="nofollow" href="https://www.theguardian.com/uk-news/2025/nov/10/uk-transport-cyber-security-chiefs-investigate-chinese-made-buses">UK transport and cyber-security chiefs investigate Chinese-made buses </a></li><li><a title="Ruter pen-tests Chinese electric buses" rel="nofollow" href="https://ruter.no/en/ruter-with-extensive-security-testing-of-electric-buses">Ruter pen-tests Chinese electric buses</a></li><li><a title="DistrictCon" rel="nofollow" href="https://www.districtcon.org/">DistrictCon</a></li><li><a title="CYBERWARCON" rel="nofollow" href="https://www.cyberwarcon.com/">CYBERWARCON</a></li><li><a title="DefCamp 2025" rel="nofollow" href="https://def.camp/">DefCamp 2025</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 72</strong>:  We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of automated APT attacks. </p>

<p>Plus, Chinese cyber vendor KnownSec falls victim to data breach, fresh accusations that the U.S. stole billions in Bitcoin, Amazon warning about Cisco/Citrix zero-days, Google’s new Private AI Compute and  Microsoft kernel zero-day marked as &quot;actively exploited.&quot;</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NrlNDzKbVm8tGd7n_ojvGTCMI6btaXLHQt0oMy57bxA/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Material Security case studies" rel="nofollow" href="https://material.security/customers">Material Security case studies</a></li><li><a title="TLPBLACK" rel="nofollow" href="https://tlpblack.net/">TLPBLACK</a></li><li><a title="Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign" rel="nofollow" href="https://www.anthropic.com/news/disrupting-AI-espionage">Anthropic: Disrupting the first reported AI-orchestrated cyber espionage campaign</a></li><li><a title="Anthropic report on AI-orchestreated APT campaign ()DF)" rel="nofollow" href="https://assets.anthropic.com/m/ec212e6566a0d47/original/Disrupting-the-first-reported-AI-orchestrated-cyber-espionage-campaign.pdf">Anthropic report on AI-orchestreated APT campaign ()DF)</a></li><li><a title="Data breach at Chinese infosec firm reveals weapons arsenal" rel="nofollow" href="https://www.theregister.com/2025/11/09/asia_tech_news_roundup/">Data breach at Chinese infosec firm reveals weapons arsenal</a></li><li><a title="Twitter thread on KnownSec breach details" rel="nofollow" href="https://x.com/intcyberdigest/status/1988355649269387488?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Twitter thread on KnownSec breach details</a></li><li><a title="China Accuses US of Orchestrating $13 Billion Bitcoin Hack" rel="nofollow" href="https://archive.ph/5Iyes">China Accuses US of Orchestrating $13 Billion Bitcoin Hack</a></li><li><a title="CISA finds federal agencies missing critical (exploited) vulns" rel="nofollow" href="https://www.cisa.gov/ed-25-03-guidance-device-updates-and-patching">CISA finds federal agencies missing critical (exploited) vulns</a></li><li><a title="Amazon discovers APT exploiting Cisco and Citrix zero-days" rel="nofollow" href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/">Amazon discovers APT exploiting Cisco and Citrix zero-days</a></li><li><a title="Amazon launches private AI bug bounty program" rel="nofollow" href="https://www.amazon.science/news/amazon-launches-private-ai-bug-bounty-to-strengthen-nova-models">Amazon launches private AI bug bounty program</a></li><li><a title="Amazon Nova" rel="nofollow" href="https://nova.amazon.com/chat">Amazon Nova</a></li><li><a title="Microsoft Warns of Exploited Windows Kernel Zero-Day" rel="nofollow" href="https://decipher.sc/2025/11/11/microsoft-warns-of-exploited-windows-kernel-zero-day/">Microsoft Warns of Exploited Windows Kernel Zero-Day</a></li><li><a title="Google intros Private AI Compute tech" rel="nofollow" href="https://blog.google/technology/ai/google-private-ai-compute/">Google intros Private AI Compute tech</a></li><li><a title="Google paper on Private AI Computer (PDF)" rel="nofollow" href="https://services.google.com/fh/files/misc/private_ai_compute_technical_brief.pdf">Google paper on Private AI Computer (PDF)</a></li><li><a title="OpenAI CISO on NYTimes request for ChatGPT conversations" rel="nofollow" href="https://openai.com/index/fighting-nyt-user-privacy-invasion/">OpenAI CISO on NYTimes request for ChatGPT conversations</a></li><li><a title="UK transport and cyber-security chiefs investigate Chinese-made buses " rel="nofollow" href="https://www.theguardian.com/uk-news/2025/nov/10/uk-transport-cyber-security-chiefs-investigate-chinese-made-buses">UK transport and cyber-security chiefs investigate Chinese-made buses </a></li><li><a title="Ruter pen-tests Chinese electric buses" rel="nofollow" href="https://ruter.no/en/ruter-with-extensive-security-testing-of-electric-buses">Ruter pen-tests Chinese electric buses</a></li><li><a title="DistrictCon" rel="nofollow" href="https://www.districtcon.org/">DistrictCon</a></li><li><a title="CYBERWARCON" rel="nofollow" href="https://www.cyberwarcon.com/">CYBERWARCON</a></li><li><a title="DefCamp 2025" rel="nofollow" href="https://def.camp/">DefCamp 2025</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+xmdFAplD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+xmdFAplD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>LIVE from Ring0 COUNTERMEASURE: Google v FFmpeg, Ransomware Turncoats, Samsung 0days </title>
      <link>http://securityconversations.fireside.fm/google-ffmpeg-ransomware-landfall</link>
      <guid isPermaLink="false">9d487a56-a0a1-4aeb-9568-dbb4b8ae98d4</guid>
      <pubDate>Mon, 10 Nov 2025 11:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9d487a56-a0a1-4aeb-9568-dbb4b8ae98d4.mp3" length="62516613" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.

Three Buddy Problem - Episode 71:  The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.  </itunes:subtitle>
      <itunes:duration>1:09:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9d487a56-a0a1-4aeb-9568-dbb4b8ae98d4/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 71</strong>: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Google, FFmpeg, ope-source, BigSleep, Aardvark, ransomware, TP-Link, Landfall, Samsung, 0day, zero-day</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 71</strong>: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security " rel="nofollow" href="https://material.security/">Material Security </a> &mdash; We protect your company’s most valuable materials — the emails, files, and accounts that live in your Google Workspace &amp; Microsoft 365 cloud offices.</li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qXNE6Y3Z1tib1ERSeg_W58B8tYmR2iG1vvcMQNoJGWQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="FFmpeg complains about Google BigSleep AI" rel="nofollow" href="https://x.com/ffmpeg/status/1984178359354483058?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">FFmpeg complains about Google BigSleep AI</a></li><li><a title="Google v FFmpeg brouhaha" rel="nofollow" href="https://x.com/seanhn/status/1984941644517417263?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Google v FFmpeg brouhaha</a></li><li><a title="Curl&#39;s Daniel Stenberg on a new breed of AI analyzers" rel="nofollow" href="https://daniel.haxx.se/blog/2025/10/10/a-new-breed-of-analyzers/">Curl's Daniel Stenberg on a new breed of AI analyzers</a></li><li><a title="unit42.paloaltonetworks.com" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">unit42.paloaltonetworks.com</a></li><li><a title=" iOS 26.1 security updates" rel="nofollow" href="https://support.apple.com/en-us/125632"> iOS 26.1 security updates</a></li><li><a title="U.S. agencies back banning TP-Link home routers on security grounds" rel="nofollow" href="https://archive.ph/Ldmde">U.S. agencies back banning TP-Link home routers on security grounds</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><em>Presented by <a href="https://material.security" rel="nofollow">Material Security</a>: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.</em></p>

<p><strong>Three Buddy Problem - Episode 71</strong>: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patching brouhana, ransomware negotiators charged and linked to ransomware attacks, the looming TP-Link ban in the U.S.,  and the discovery of LANDFALL, an APT attack caught using a Samsung mobile zero-day.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Material Security " rel="nofollow" href="https://material.security/">Material Security </a> &mdash; We protect your company’s most valuable materials — the emails, files, and accounts that live in your Google Workspace &amp; Microsoft 365 cloud offices.</li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qXNE6Y3Z1tib1ERSeg_W58B8tYmR2iG1vvcMQNoJGWQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="FFmpeg complains about Google BigSleep AI" rel="nofollow" href="https://x.com/ffmpeg/status/1984178359354483058?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">FFmpeg complains about Google BigSleep AI</a></li><li><a title="Google v FFmpeg brouhaha" rel="nofollow" href="https://x.com/seanhn/status/1984941644517417263?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Google v FFmpeg brouhaha</a></li><li><a title="Curl&#39;s Daniel Stenberg on a new breed of AI analyzers" rel="nofollow" href="https://daniel.haxx.se/blog/2025/10/10/a-new-breed-of-analyzers/">Curl's Daniel Stenberg on a new breed of AI analyzers</a></li><li><a title="unit42.paloaltonetworks.com" rel="nofollow" href="https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/">unit42.paloaltonetworks.com</a></li><li><a title=" iOS 26.1 security updates" rel="nofollow" href="https://support.apple.com/en-us/125632"> iOS 26.1 security updates</a></li><li><a title="U.S. agencies back banning TP-Link home routers on security grounds" rel="nofollow" href="https://archive.ph/Ldmde">U.S. agencies back banning TP-Link home routers on security grounds</a></li><li><a title="TLP BLACK" rel="nofollow" href="https://tlpblack.net/">TLP BLACK</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+vio3x5P5</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+vio3x5P5" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs </title>
      <link>http://securityconversations.fireside.fm/dave-aitel-openai-aardvark-bug-hunting</link>
      <guid isPermaLink="false">2a7863a7-7d3f-4891-b8d8-618b97a676dd</guid>
      <pubDate>Fri, 31 Oct 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2a7863a7-7d3f-4891-b8d8-618b97a676dd.mp3" length="106001179" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 70:  Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets, pen-test cadence, and the zero-day economy.

Plus, L3 Harris/Trenchant exec pleads guilty to selling exploits to Russian brokers, Kaspersky catches the return of HackingTeam using Chrome zero-day exploit chain, and news of a proposed law in Russia to force researchers to report vulnerabilities first to goverment agencies.

Cast: Dave Aitel (Technical Staff, OpenAI), Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:10:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2a7863a7-7d3f-4891-b8d8-618b97a676dd/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 70</strong>: Dave Aitel from OpenAI&#39;s technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets, pen-test cadence, and the zero-day economy.</p>

<p>Plus, L3 Harris/Trenchant exec pleads guilty to selling exploits to Russian brokers, Kaspersky catches the return of HackingTeam using Chrome zero-day exploit chain, and news of a proposed law in Russia to force researchers to report vulnerabilities first to goverment agencies.</p>

<p><strong>Cast:</strong> <a href="https://www.linkedin.com/in/daveaitel/" rel="nofollow">Dave Aitel</a> (Technical Staff, OpenAI), <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>OpenAI, Aardvark, BigSleep, Google, LLM, Russia, China, HackingTeam, Kaspersky, APT, mercenary spyware, Chrome, zero-day, Trenchant, L3 Harris, Operation Zero, Dave Aitel</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 70</strong>: Dave Aitel from OpenAI&#39;s technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets, pen-test cadence, and the zero-day economy.</p>

<p>Plus, L3 Harris/Trenchant exec pleads guilty to selling exploits to Russian brokers, Kaspersky catches the return of HackingTeam using Chrome zero-day exploit chain, and news of a proposed law in Russia to force researchers to report vulnerabilities first to goverment agencies.</p>

<p><strong>Cast:</strong> <a href="https://www.linkedin.com/in/daveaitel/" rel="nofollow">Dave Aitel</a> (Technical Staff, OpenAI), <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Pz8JWiwA-ZrLMHG8di264ioCO9CVtl3ac_-N9fUDrls/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Episode 70 Livestream - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=7IkmOXujJTY">Episode 70 Livestream - YouTube</a></li><li><a title="Aardvark: OpenAI’s agentic security researcher" rel="nofollow" href="https://openai.com/index/introducing-aardvark/">Aardvark: OpenAI’s agentic security researcher</a></li><li><a title="TBP episode on OpenAI’s Aardvark " rel="nofollow" href="https://www.youtube.com/watch?v=1hBRiU1PIIY">TBP episode on OpenAI’s Aardvark </a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="Ex-US cyber intel exec pleads guilty to selling spy tools to Russian broker" rel="nofollow" href="https://www.reuters.com/legal/government/ex-us-cyber-intel-exec-pleads-guilty-selling-spy-tools-russian-broker-2025-10-29/">Ex-US cyber intel exec pleads guilty to selling spy tools to Russian broker</a></li><li><a title="Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm" rel="nofollow" href="https://archive.ph/xuVuY">Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm</a></li><li><a title="Kim Zetter: Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being &quot;Utilized&quot; by Different Broker in South Korea" rel="nofollow" href="https://www.zetter-zeroday.com/former-trenchant-exec-sold-stolen-code-to-russian-buyer-even-after-learning-that-other-code-he-sold-was-being-utilized-by-different-broker-in-south-korea/">Kim Zetter: Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being "Utilized" by Different Broker in South Korea</a></li><li><a title="How we linked ForumTroll APT to Dante spyware by Memento Labs" rel="nofollow" href="https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/">How we linked ForumTroll APT to Dante spyware by Memento Labs</a></li><li><a title="CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware" rel="nofollow" href="https://techcrunch.com/2025/10/28/ceo-of-spyware-maker-memento-labs-confirms-one-of-its-government-customers-was-caught-using-its-malware/">CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware</a></li><li><a title="Russia&#39;s new vuln disclosure law proposal" rel="nofollow" href="https://www.rbc.ru/technology_and_media/23/10/2025/68f8d6c09a79473a09f38e93">Russia's new vuln disclosure law proposal</a></li><li><a title="TBP Live in Ottawa" rel="nofollow" href="https://ringzer0.training/countermeasure25/">TBP Live in Ottawa</a></li><li><a title="Binding Hook Live" rel="nofollow" href="https://bindinghooklive.com/about/">Binding Hook Live</a></li><li><a title="State of Statecraft" rel="nofollow" href="https://www.stateofstatecraft.com/">State of Statecraft</a></li><li><a title="Ekoparty Miami " rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 70</strong>: Dave Aitel from OpenAI&#39;s technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets, pen-test cadence, and the zero-day economy.</p>

<p>Plus, L3 Harris/Trenchant exec pleads guilty to selling exploits to Russian brokers, Kaspersky catches the return of HackingTeam using Chrome zero-day exploit chain, and news of a proposed law in Russia to force researchers to report vulnerabilities first to goverment agencies.</p>

<p><strong>Cast:</strong> <a href="https://www.linkedin.com/in/daveaitel/" rel="nofollow">Dave Aitel</a> (Technical Staff, OpenAI), <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Pz8JWiwA-ZrLMHG8di264ioCO9CVtl3ac_-N9fUDrls/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Episode 70 Livestream - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=7IkmOXujJTY">Episode 70 Livestream - YouTube</a></li><li><a title="Aardvark: OpenAI’s agentic security researcher" rel="nofollow" href="https://openai.com/index/introducing-aardvark/">Aardvark: OpenAI’s agentic security researcher</a></li><li><a title="TBP episode on OpenAI’s Aardvark " rel="nofollow" href="https://www.youtube.com/watch?v=1hBRiU1PIIY">TBP episode on OpenAI’s Aardvark </a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="Ex-US cyber intel exec pleads guilty to selling spy tools to Russian broker" rel="nofollow" href="https://www.reuters.com/legal/government/ex-us-cyber-intel-exec-pleads-guilty-selling-spy-tools-russian-broker-2025-10-29/">Ex-US cyber intel exec pleads guilty to selling spy tools to Russian broker</a></li><li><a title="Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm" rel="nofollow" href="https://archive.ph/xuVuY">Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm</a></li><li><a title="Kim Zetter: Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being &quot;Utilized&quot; by Different Broker in South Korea" rel="nofollow" href="https://www.zetter-zeroday.com/former-trenchant-exec-sold-stolen-code-to-russian-buyer-even-after-learning-that-other-code-he-sold-was-being-utilized-by-different-broker-in-south-korea/">Kim Zetter: Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being "Utilized" by Different Broker in South Korea</a></li><li><a title="How we linked ForumTroll APT to Dante spyware by Memento Labs" rel="nofollow" href="https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/">How we linked ForumTroll APT to Dante spyware by Memento Labs</a></li><li><a title="CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware" rel="nofollow" href="https://techcrunch.com/2025/10/28/ceo-of-spyware-maker-memento-labs-confirms-one-of-its-government-customers-was-caught-using-its-malware/">CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware</a></li><li><a title="Russia&#39;s new vuln disclosure law proposal" rel="nofollow" href="https://www.rbc.ru/technology_and_media/23/10/2025/68f8d6c09a79473a09f38e93">Russia's new vuln disclosure law proposal</a></li><li><a title="TBP Live in Ottawa" rel="nofollow" href="https://ringzer0.training/countermeasure25/">TBP Live in Ottawa</a></li><li><a title="Binding Hook Live" rel="nofollow" href="https://bindinghooklive.com/about/">Binding Hook Live</a></li><li><a title="State of Statecraft" rel="nofollow" href="https://www.stateofstatecraft.com/">State of Statecraft</a></li><li><a title="Ekoparty Miami " rel="nofollow" href="https://ekoparty.org/miami/">Ekoparty Miami </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+v1BUnaQ6</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+v1BUnaQ6" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA</title>
      <link>http://securityconversations.fireside.fm/ios26-shutdown-whatsapp-zero-click-china-nsa</link>
      <guid isPermaLink="false">4b406c2c-80d5-4def-b5ec-acf81eed0801</guid>
      <pubDate>Fri, 24 Oct 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4b406c2c-80d5-4def-b5ec-acf81eed0801.mp3" length="105748725" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 69: We dig into news that Apple's iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters.  Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit developer to Russian buyers, and Chinese threat intel reports pointing fingers at the NSA.

We also discuss calls for the US government to build a structured, lawful ecosystem for private-sector offensive operations to address existing chaos and market gaps. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:11:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4b406c2c-80d5-4def-b5ec-acf81eed0801/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 69</strong>: We dig into news that Apple&#39;s iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters.  Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit developer to Russian buyers, and Chinese threat intel reports pointing fingers at the NSA.</p>

<p>We also discuss calls for the US government to build a structured, lawful ecosystem for private-sector offensive operations to address existing chaos and market gaps. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Apple, iOS, iOS 26, iPhone, spyware, mercenary, Pegasus, Microsoft, WSUS, CVE-2025-59287, WhatApp, zero-click, Pwn2Own, China, Trenchant, Azimuth, L3Harris, NSA, Triangulation, CN-CERT, Sergey Bratus, Netherlands, AIVD, MIVD</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 69</strong>: We dig into news that Apple&#39;s iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters.  Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit developer to Russian buyers, and Chinese threat intel reports pointing fingers at the NSA.</p>

<p>We also discuss calls for the US government to build a structured, lawful ecosystem for private-sector offensive operations to address existing chaos and market gaps. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NVbbtz7e6xGLA4Er15yKN3M76nT9u9Yx2AkASmxZzUg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Key IOCs for iPhone Spyware Cleaned With iOS 26 Update" rel="nofollow" href="https://iverify.io/blog/key-iocs-for-pegasus-and-predator-spyware-cleaned-with-ios-26-update">Key IOCs for iPhone Spyware Cleaned With iOS 26 Update</a></li><li><a title="Exploitation of WSUS Remote Code Execution Vulnerability (CVE-2025-59287) " rel="nofollow" href="https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability">Exploitation of WSUS Remote Code Execution Vulnerability (CVE-2025-59287) </a></li><li><a title="Hamid Kashfi on CVE-2025-59287" rel="nofollow" href="https://x.com/hkashfi/status/1980197996441510375">Hamid Kashfi on CVE-2025-59287</a></li><li><a title="Pwn2Own Ireland results" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/10/23/pwn2own-ireland-2025-day-three-and-master-of-pwn">Pwn2Own Ireland results</a></li><li><a title="Hacking Lab Boss Charged with Seeking to Sell Secrets in Russia" rel="nofollow" href="https://archive.ph/YlVlm">Hacking Lab Boss Charged with Seeking to Sell Secrets in Russia</a></li><li><a title="Court doc (Peter Williams case)" rel="nofollow" href="https://storage.courtlistener.com/recap/gov.uscourts.dcd.285897/gov.uscourts.dcd.285897.1.0.pdf">Court doc (Peter Williams case)</a></li><li><a title="Cyber Insurer Sues Policyholder’s Cyber Pros" rel="nofollow" href="https://www.hunton.com/privacy-and-information-security-law/cyber-insurer-sues-policyholders-cyber-pros#page=1">Cyber Insurer Sues Policyholder’s Cyber Pros</a></li><li><a title="NSA Accused of Stealing Secrets from China&#39;s National Time Centre" rel="nofollow" href="https://moderndiplomacy.eu/2025/10/19/nsa-accused-of-stealing-secrets-from-chinas-national-time-centre/">NSA Accused of Stealing Secrets from China's National Time Centre</a></li><li><a title="China&#39;s CN-CERT on alleged NSA espionage operation" rel="nofollow" href="https://mp.weixin.qq.com/s/XPjT0BVOJPJxSmASW0tXTA">China's CN-CERT on alleged NSA espionage operation</a></li><li><a title="DanderSpritz documentation" rel="nofollow" href="https://danderspritz.com/">DanderSpritz documentation</a></li><li><a title="Building the US market for offensive cyber" rel="nofollow" href="https://sergeybratus.gitlab.io/papers/DartmouthCyberRoundtable2025.pdf">Building the US market for offensive cyber</a></li><li><a title="Netherlands Limits Intelligence-Sharing With US Amid Politicization, Russia Fears" rel="nofollow" href="https://www.kyivpost.com/post/62663">Netherlands Limits Intelligence-Sharing With US Amid Politicization, Russia Fears</a></li><li><a title="Agenda - Binding Hook Live" rel="nofollow" href="https://bindinghooklive.com/agenda/">Agenda - Binding Hook Live</a></li><li><a title="Agenda - State of Statecraft" rel="nofollow" href="https://www.stateofstatecraft.com/agenda">Agenda - State of Statecraft</a></li><li><a title="TBP Live at Countermeasures (Ottawa)" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">TBP Live at Countermeasures (Ottawa)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 69</strong>: We dig into news that Apple&#39;s iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters.  Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit developer to Russian buyers, and Chinese threat intel reports pointing fingers at the NSA.</p>

<p>We also discuss calls for the US government to build a structured, lawful ecosystem for private-sector offensive operations to address existing chaos and market gaps. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NVbbtz7e6xGLA4Er15yKN3M76nT9u9Yx2AkASmxZzUg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Key IOCs for iPhone Spyware Cleaned With iOS 26 Update" rel="nofollow" href="https://iverify.io/blog/key-iocs-for-pegasus-and-predator-spyware-cleaned-with-ios-26-update">Key IOCs for iPhone Spyware Cleaned With iOS 26 Update</a></li><li><a title="Exploitation of WSUS Remote Code Execution Vulnerability (CVE-2025-59287) " rel="nofollow" href="https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability">Exploitation of WSUS Remote Code Execution Vulnerability (CVE-2025-59287) </a></li><li><a title="Hamid Kashfi on CVE-2025-59287" rel="nofollow" href="https://x.com/hkashfi/status/1980197996441510375">Hamid Kashfi on CVE-2025-59287</a></li><li><a title="Pwn2Own Ireland results" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/10/23/pwn2own-ireland-2025-day-three-and-master-of-pwn">Pwn2Own Ireland results</a></li><li><a title="Hacking Lab Boss Charged with Seeking to Sell Secrets in Russia" rel="nofollow" href="https://archive.ph/YlVlm">Hacking Lab Boss Charged with Seeking to Sell Secrets in Russia</a></li><li><a title="Court doc (Peter Williams case)" rel="nofollow" href="https://storage.courtlistener.com/recap/gov.uscourts.dcd.285897/gov.uscourts.dcd.285897.1.0.pdf">Court doc (Peter Williams case)</a></li><li><a title="Cyber Insurer Sues Policyholder’s Cyber Pros" rel="nofollow" href="https://www.hunton.com/privacy-and-information-security-law/cyber-insurer-sues-policyholders-cyber-pros#page=1">Cyber Insurer Sues Policyholder’s Cyber Pros</a></li><li><a title="NSA Accused of Stealing Secrets from China&#39;s National Time Centre" rel="nofollow" href="https://moderndiplomacy.eu/2025/10/19/nsa-accused-of-stealing-secrets-from-chinas-national-time-centre/">NSA Accused of Stealing Secrets from China's National Time Centre</a></li><li><a title="China&#39;s CN-CERT on alleged NSA espionage operation" rel="nofollow" href="https://mp.weixin.qq.com/s/XPjT0BVOJPJxSmASW0tXTA">China's CN-CERT on alleged NSA espionage operation</a></li><li><a title="DanderSpritz documentation" rel="nofollow" href="https://danderspritz.com/">DanderSpritz documentation</a></li><li><a title="Building the US market for offensive cyber" rel="nofollow" href="https://sergeybratus.gitlab.io/papers/DartmouthCyberRoundtable2025.pdf">Building the US market for offensive cyber</a></li><li><a title="Netherlands Limits Intelligence-Sharing With US Amid Politicization, Russia Fears" rel="nofollow" href="https://www.kyivpost.com/post/62663">Netherlands Limits Intelligence-Sharing With US Amid Politicization, Russia Fears</a></li><li><a title="Agenda - Binding Hook Live" rel="nofollow" href="https://bindinghooklive.com/agenda/">Agenda - Binding Hook Live</a></li><li><a title="Agenda - State of Statecraft" rel="nofollow" href="https://www.stateofstatecraft.com/agenda">Agenda - State of Statecraft</a></li><li><a title="TBP Live at Countermeasures (Ottawa)" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">TBP Live at Countermeasures (Ottawa)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Nsd-vayI</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Nsd-vayI" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>JAGS LABScon 2025 keynote: Steps to an ecology of cyber</title>
      <link>http://securityconversations.fireside.fm/jags-labscon25-keynote-steps-ecology-cyber</link>
      <guid isPermaLink="false">67946d1b-d1a0-42f1-92b3-63c256a8288e</guid>
      <pubDate>Sat, 18 Oct 2025 06:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/67946d1b-d1a0-42f1-92b3-63c256a8288e.mp3" length="14882499" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem (Episode 68):   The buddies are trapped in timezone hell with cross-country travel this week. 

In this special episode, we present Juan Andres Guerrero-Saade's LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustainable, and deeply interconnected in its place.

Juanito traces the field’s evolution from chaos to consolidation, weaving in cybernetics, standardization, and the dawning coexistence of human and artificial evaluative power. The result is part philosophical sermon, part rallying cry, an invitation to reject the industry’s slave morality, rethink our tools, and steer the next era of defense with intention.
</itunes:subtitle>
      <itunes:duration>31:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/67946d1b-d1a0-42f1-92b3-63c256a8288e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Three Buddy Problem (Episode 68):  The buddies are trapped in timezone hell with cross-country travel this week.</p>

<p>In this special episode, we present Juan Andres Guerrero-Saade&#39;s LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustainable, and deeply interconnected in its place.</p>

<p>Juanito traces the field’s evolution from chaos to consolidation, weaving in cybernetics, standardization, and the dawning coexistence of human and artificial evaluative power. The result is part philosophical sermon, part rallying cry, an invitation to reject the industry’s slave morality, rethink our tools, and steer the next era of defense with intention.</p>]]>
      </description>
      <itunes:keywords>LABScon, keynote, cybernetics, AI, OpenAI, ChatGPT, standardization, EDR, JAGS</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Three Buddy Problem (Episode 68):  The buddies are trapped in timezone hell with cross-country travel this week.</p>

<p>In this special episode, we present Juan Andres Guerrero-Saade&#39;s LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustainable, and deeply interconnected in its place.</p>

<p>Juanito traces the field’s evolution from chaos to consolidation, weaving in cybernetics, standardization, and the dawning coexistence of human and artificial evaluative power. The result is part philosophical sermon, part rallying cry, an invitation to reject the industry’s slave morality, rethink our tools, and steer the next era of defense with intention.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/16WgWulN_0ICWJZVBVCNIb7pQkNYETAfNxGC5smAYgfA/edit?tab=t.0#heading=h.suqk765u8dr">Transcript (unedited, AI-generated)</a></li><li><a title="JAGS keynote: The intricacies of wartime cyber threat intelligence - Security Conversations" rel="nofollow" href="https://securityconversations.com/episode/jags-keynote-the-intricacies-of-wartime-cyber-threat-intelligence/">JAGS keynote: The intricacies of wartime cyber threat intelligence - Security Conversations</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="JAGS on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jags-is-fine/">JAGS on LinkedIn</a></li><li><a title="JAGS on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">JAGS on Twitter</a></li><li><a title="The Consolation of Threat Intel (JAGS LABScon 2024 keynote)" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">The Consolation of Threat Intel (JAGS LABScon 2024 keynote)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Three Buddy Problem (Episode 68):  The buddies are trapped in timezone hell with cross-country travel this week.</p>

<p>In this special episode, we present Juan Andres Guerrero-Saade&#39;s LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustainable, and deeply interconnected in its place.</p>

<p>Juanito traces the field’s evolution from chaos to consolidation, weaving in cybernetics, standardization, and the dawning coexistence of human and artificial evaluative power. The result is part philosophical sermon, part rallying cry, an invitation to reject the industry’s slave morality, rethink our tools, and steer the next era of defense with intention.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/16WgWulN_0ICWJZVBVCNIb7pQkNYETAfNxGC5smAYgfA/edit?tab=t.0#heading=h.suqk765u8dr">Transcript (unedited, AI-generated)</a></li><li><a title="JAGS keynote: The intricacies of wartime cyber threat intelligence - Security Conversations" rel="nofollow" href="https://securityconversations.com/episode/jags-keynote-the-intricacies-of-wartime-cyber-threat-intelligence/">JAGS keynote: The intricacies of wartime cyber threat intelligence - Security Conversations</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="JAGS on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jags-is-fine/">JAGS on LinkedIn</a></li><li><a title="JAGS on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">JAGS on Twitter</a></li><li><a title="The Consolation of Threat Intel (JAGS LABScon 2024 keynote)" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">The Consolation of Threat Intel (JAGS LABScon 2024 keynote)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+o8r_Q_YC</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+o8r_Q_YC" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Apple Exploit-Chain Bounties, Wireless Proximity Exploits and Tactical Suitcases</title>
      <link>http://securityconversations.fireside.fm/apple-spyware-bounty-oracle-ivanti-virus-total</link>
      <guid isPermaLink="false">69c83695-1bbc-4044-bf24-2168d12ad7d6</guid>
      <pubDate>Sat, 11 Oct 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/69c83695-1bbc-4044-bf24-2168d12ad7d6.mp3" length="112087103" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 67:  We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group’s supposed US investor buyout.

Plus, an update on Oracle’s zero-day ransomware fiasco, Ivanti’s endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe’s latest failed push for Chat Control, and VirusTotal’s new pricing tiers.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:23:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/69c83695-1bbc-4044-bf24-2168d12ad7d6/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 67</strong>:  We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker&#39;s focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group’s supposed US investor buyout.</p>

<p>Plus, an update on Oracle’s zero-day ransomware fiasco, Ivanti’s endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe’s latest failed push for Chat Control, and VirusTotal’s new pricing tiers.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Apple, Spyware, iOS, bug bounty, NSO Group, Paragon, zero-click, one-click, Ivanti, Oracle, VirusTotal, Tavis Ormandy</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 67</strong>:  We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker&#39;s focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group’s supposed US investor buyout.</p>

<p>Plus, an update on Oracle’s zero-day ransomware fiasco, Ivanti’s endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe’s latest failed push for Chat Control, and VirusTotal’s new pricing tiers.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/13DMqnlQr7mbLPWGQrVk6BT1xo2R23npj1txnkQl-ctI/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Apple&#39;s new exploit-chain bounties" rel="nofollow" href="https://security.apple.com/blog/apple-security-bounty-evolved/">Apple's new exploit-chain bounties</a></li><li><a title="Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits" rel="nofollow" href="https://archive.ph/4UioF">Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits</a></li><li><a title="Paragon Strikes Again: UniCredit CEO Among the Targets" rel="nofollow" href="https://irpimedia.irpi.eu/paragon-colpisce-ancora-anche-lad-di-unicredit-tra-i-bersagli/">Paragon Strikes Again: UniCredit CEO Among the Targets</a></li><li><a title="NSO to be acquired by U.S. investors" rel="nofollow" href="https://www.calcalistech.com/ctechnews/article/s1jgvmitgx">NSO to be acquired by U.S. investors</a></li><li><a title="Oracle confirms exploited 0day - CVE-2025-61882" rel="nofollow" href="https://www.oracle.com/security-alerts/alert-cve-2025-61882.html">Oracle confirms exploited 0day - CVE-2025-61882</a></li><li><a title="Oracle Security Officer comms" rel="nofollow" href="https://blogs.oracle.com/security/post/apply-july-2025-cpu">Oracle Security Officer comms</a></li><li><a title="Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks" rel="nofollow" href="https://www.vulncheck.com/blog/oracle-e-business-suite-cve-2025-61882-exploited-in-extortion-attacks">Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks</a></li><li><a title="ZDI documents Ivanti 0days waiting for patches" rel="nofollow" href="https://www.zerodayinitiative.com/advisories/published/">ZDI documents Ivanti 0days waiting for patches</a></li><li><a title="One-man spam campaign ravages EU ‘chat control’ bill" rel="nofollow" href="https://www.politico.eu/article/one-man-spam-campaign-ravages-eu-chat-control-bill-fight-chat-control/">One-man spam campaign ravages EU ‘chat control’ bill</a></li><li><a title="VirusTotal new pricing tiers" rel="nofollow" href="https://blog.virustotal.com/2025/10/simpler-access-for-stronger-virustotal.html">VirusTotal new pricing tiers</a></li><li><a title="Tavis Ormandy Kaspersky 0day find" rel="nofollow" href="https://x.com/taviso/status/639992212164513792">Tavis Ormandy Kaspersky 0day find</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 67</strong>:  We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker&#39;s focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group’s supposed US investor buyout.</p>

<p>Plus, an update on Oracle’s zero-day ransomware fiasco, Ivanti’s endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe’s latest failed push for Chat Control, and VirusTotal’s new pricing tiers.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/13DMqnlQr7mbLPWGQrVk6BT1xo2R23npj1txnkQl-ctI/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Apple&#39;s new exploit-chain bounties" rel="nofollow" href="https://security.apple.com/blog/apple-security-bounty-evolved/">Apple's new exploit-chain bounties</a></li><li><a title="Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits" rel="nofollow" href="https://archive.ph/4UioF">Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits</a></li><li><a title="Paragon Strikes Again: UniCredit CEO Among the Targets" rel="nofollow" href="https://irpimedia.irpi.eu/paragon-colpisce-ancora-anche-lad-di-unicredit-tra-i-bersagli/">Paragon Strikes Again: UniCredit CEO Among the Targets</a></li><li><a title="NSO to be acquired by U.S. investors" rel="nofollow" href="https://www.calcalistech.com/ctechnews/article/s1jgvmitgx">NSO to be acquired by U.S. investors</a></li><li><a title="Oracle confirms exploited 0day - CVE-2025-61882" rel="nofollow" href="https://www.oracle.com/security-alerts/alert-cve-2025-61882.html">Oracle confirms exploited 0day - CVE-2025-61882</a></li><li><a title="Oracle Security Officer comms" rel="nofollow" href="https://blogs.oracle.com/security/post/apply-july-2025-cpu">Oracle Security Officer comms</a></li><li><a title="Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks" rel="nofollow" href="https://www.vulncheck.com/blog/oracle-e-business-suite-cve-2025-61882-exploited-in-extortion-attacks">Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks</a></li><li><a title="ZDI documents Ivanti 0days waiting for patches" rel="nofollow" href="https://www.zerodayinitiative.com/advisories/published/">ZDI documents Ivanti 0days waiting for patches</a></li><li><a title="One-man spam campaign ravages EU ‘chat control’ bill" rel="nofollow" href="https://www.politico.eu/article/one-man-spam-campaign-ravages-eu-chat-control-bill-fight-chat-control/">One-man spam campaign ravages EU ‘chat control’ bill</a></li><li><a title="VirusTotal new pricing tiers" rel="nofollow" href="https://blog.virustotal.com/2025/10/simpler-access-for-stronger-virustotal.html">VirusTotal new pricing tiers</a></li><li><a title="Tavis Ormandy Kaspersky 0day find" rel="nofollow" href="https://x.com/taviso/status/639992212164513792">Tavis Ormandy Kaspersky 0day find</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+MZzCcVa3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+MZzCcVa3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity</title>
      <link>http://securityconversations.fireside.fm/chris-eng-software-security-code-quality</link>
      <guid isPermaLink="false">e7c2f699-e4d3-4236-a521-1c1934f52674</guid>
      <pubDate>Tue, 07 Oct 2025 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e7c2f699-e4d3-4236-a521-1c1934f52674.mp3" length="29886415" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. 

Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</itunes:subtitle>
      <itunes:duration>44:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e7c2f699-e4d3-4236-a521-1c1934f52674/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p>]]>
      </description>
      <itunes:keywords>Chris Eng, Veracode, Binarly, supply chain, NSA, @Stake, Dan Geer, Monoculture, Windows, Microsoft, IIS, binary, source code</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p><p>Links:</p><ul><li><a title="Chris Eng on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/realchriseng/">Chris Eng on LinkedIn</a></li><li><a title="Chris Eng on Twitter" rel="nofollow" href="https://x.com/chriseng?lang=en">Chris Eng on Twitter</a></li><li><a title="Monoculture Considered Harmful" rel="nofollow" href="https://www.foo.be/docs/diversity/geer.pdf">Monoculture Considered Harmful</a></li><li><a title="Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’" rel="nofollow" href="https://www.computerworld.com/article/1726646/fired-stake-cto-says-microsoft-critique-was-business-as-usual.html">Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’</a></li><li><a title="Microsoft Takes LSD to Test Vista Security " rel="nofollow" href="https://www.cioinsight.com/news-trends/microsoft-takes-lsd-to-test-vista-security/">Microsoft Takes LSD to Test Vista Security </a></li><li><a title="Code Red (computer worm) " rel="nofollow" href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red (computer worm) </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>This week on <em>Security Conversations</em>, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. </p>

<p>Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.</p><p>Links:</p><ul><li><a title="Chris Eng on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/realchriseng/">Chris Eng on LinkedIn</a></li><li><a title="Chris Eng on Twitter" rel="nofollow" href="https://x.com/chriseng?lang=en">Chris Eng on Twitter</a></li><li><a title="Monoculture Considered Harmful" rel="nofollow" href="https://www.foo.be/docs/diversity/geer.pdf">Monoculture Considered Harmful</a></li><li><a title="Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’" rel="nofollow" href="https://www.computerworld.com/article/1726646/fired-stake-cto-says-microsoft-critique-was-business-as-usual.html">Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’</a></li><li><a title="Microsoft Takes LSD to Test Vista Security " rel="nofollow" href="https://www.cioinsight.com/news-trends/microsoft-takes-lsd-to-test-vista-security/">Microsoft Takes LSD to Test Vista Security </a></li><li><a title="Code Red (computer worm) " rel="nofollow" href="https://en.wikipedia.org/wiki/Code_Red_(computer_worm)">Code Red (computer worm) </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ZMAePBN7</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ZMAePBN7" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout</title>
      <link>http://securityconversations.fireside.fm/oracle-ransomware-extortion-drones-cisco-bootkit</link>
      <guid isPermaLink="false">218ae2a2-77f7-4d79-b2f7-4e8eeec2a852</guid>
      <pubDate>Fri, 03 Oct 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/218ae2a2-77f7-4d79-b2f7-4e8eeec2a852.mp3" length="105237292" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 66:  We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. 

Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI’s Sora 2 launch and its implications for social media and human expression; Palo Alto’s “Phantom Taurus” APT report, a follow-up on Cisco’s ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:03:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/218ae2a2-77f7-4d79-b2f7-4e8eeec2a852/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 66</strong>:  We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. </p>

<p>Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI’s Sora 2 launch and its implications for social media and human expression; Palo Alto’s “Phantom Taurus” APT report, a follow-up on Cisco’s ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Europe, ransomware, airport disruptions, Oracle, Google, Mandiant, Cisco, TikTok, Sora 2, OpenAI, Palo Alto, Phantom Taurus, China, CISA, gov shutdown, GreyNoise</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 66</strong>:  We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. </p>

<p>Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI’s Sora 2 launch and its implications for social media and human expression; Palo Alto’s “Phantom Taurus” APT report, a follow-up on Cisco’s ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NKMz33dMs9mwRUiIVi7c0EDDTavZ8ImIAWiFS-3yq-Y/edit?tab=t.0#heading=h.c4jonnkp64kg">Transcript (unedited, AI-generated)</a></li><li><a title="Drone sightings prompt call for German police to gain shoot-down powers " rel="nofollow" href="https://www.reuters.com/world/europe/drone-sightings-disrupt-munich-airport-halt-flights-impact-thousands-2025-10-03/">Drone sightings prompt call for German police to gain shoot-down powers </a></li><li><a title="UK arrest following aerospace cyber incident" rel="nofollow" href="https://www.nationalcrimeagency.gov.uk/news/uk-arrest-following-aerospace-cyber-incident">UK arrest following aerospace cyber incident</a></li><li><a title="Oracle Probes Hacks of Customers’ E-Business Suite After Extortion Campaign" rel="nofollow" href="https://www.bloomberg.com/news/articles/2025-10-02/oracle-investigating-hacks-of-its-customers-e-business-suite?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1OTQzOTAzOCwiZXhwIjoxNzYwMDQzODM4LCJhcnRpY2xlSWQiOiJUM0lSMzhHT1lNVEgwMCIsImJjb25uZWN0SWQiOiI0OEFDOEE5MkEwNTM0MkQ4OEIyRjkwQjhDMTgzMTdDMyJ9.QuSgdjT8F9224F4JvefS8gPfyOactHpsJ5b6DDpWozA&amp;leadSource=uverify%20wall">Oracle Probes Hacks of Customers’ E-Business Suite After Extortion Campaign</a></li><li><a title="Oracle Critical Patch Update Advisory - July 2025" rel="nofollow" href="https://www.oracle.com/security-alerts/cpujul2025.html#AppendixEBS">Oracle Critical Patch Update Advisory - July 2025</a></li><li><a title="Here is the email Clop attackers sent to Oracle customers" rel="nofollow" href="https://cyberscoop.com/extortion-email-clop-oracle-customers/">Here is the email Clop attackers sent to Oracle customers</a></li><li><a title="Oracle statement from Chief Security Officer" rel="nofollow" href="https://blogs.oracle.com/security/post/apply-july-2025-cpu">Oracle statement from Chief Security Officer</a></li><li><a title="TikTok’s Algorithm to Be Secured by Oracle in Trump-Backed Deal" rel="nofollow" href="https://archive.ph/ybbmk">TikTok’s Algorithm to Be Secured by Oracle in Trump-Backed Deal</a></li><li><a title="Phantom Taurus: A New Chinese Nexus APT" rel="nofollow" href="https://unit42.paloaltonetworks.com/phantom-taurus/">Phantom Taurus: A New Chinese Nexus APT</a></li><li><a title="China Hackers Breached Foreign Ministers’ Emails" rel="nofollow" href="https://archive.ph/Vpot0">China Hackers Breached Foreign Ministers’ Emails</a></li><li><a title="Cisco Statement on Attacks Against Cisco Firewalls" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks">Cisco Statement on Attacks Against Cisco Firewalls</a></li><li><a title="GreyNoise: 25,000 IPs Scanned Cisco ASA Devices in Early Sept" rel="nofollow" href="https://www.greynoise.io/blog/scanning-surge-cisco-asa-devices">GreyNoise: 25,000 IPs Scanned Cisco ASA Devices in Early Sept</a></li><li><a title="KeyDrop.io" rel="nofollow" href="https://keydrop.io/">KeyDrop.io</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 66</strong>:  We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. </p>

<p>Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI’s Sora 2 launch and its implications for social media and human expression; Palo Alto’s “Phantom Taurus” APT report, a follow-up on Cisco’s ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NKMz33dMs9mwRUiIVi7c0EDDTavZ8ImIAWiFS-3yq-Y/edit?tab=t.0#heading=h.c4jonnkp64kg">Transcript (unedited, AI-generated)</a></li><li><a title="Drone sightings prompt call for German police to gain shoot-down powers " rel="nofollow" href="https://www.reuters.com/world/europe/drone-sightings-disrupt-munich-airport-halt-flights-impact-thousands-2025-10-03/">Drone sightings prompt call for German police to gain shoot-down powers </a></li><li><a title="UK arrest following aerospace cyber incident" rel="nofollow" href="https://www.nationalcrimeagency.gov.uk/news/uk-arrest-following-aerospace-cyber-incident">UK arrest following aerospace cyber incident</a></li><li><a title="Oracle Probes Hacks of Customers’ E-Business Suite After Extortion Campaign" rel="nofollow" href="https://www.bloomberg.com/news/articles/2025-10-02/oracle-investigating-hacks-of-its-customers-e-business-suite?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1OTQzOTAzOCwiZXhwIjoxNzYwMDQzODM4LCJhcnRpY2xlSWQiOiJUM0lSMzhHT1lNVEgwMCIsImJjb25uZWN0SWQiOiI0OEFDOEE5MkEwNTM0MkQ4OEIyRjkwQjhDMTgzMTdDMyJ9.QuSgdjT8F9224F4JvefS8gPfyOactHpsJ5b6DDpWozA&amp;leadSource=uverify%20wall">Oracle Probes Hacks of Customers’ E-Business Suite After Extortion Campaign</a></li><li><a title="Oracle Critical Patch Update Advisory - July 2025" rel="nofollow" href="https://www.oracle.com/security-alerts/cpujul2025.html#AppendixEBS">Oracle Critical Patch Update Advisory - July 2025</a></li><li><a title="Here is the email Clop attackers sent to Oracle customers" rel="nofollow" href="https://cyberscoop.com/extortion-email-clop-oracle-customers/">Here is the email Clop attackers sent to Oracle customers</a></li><li><a title="Oracle statement from Chief Security Officer" rel="nofollow" href="https://blogs.oracle.com/security/post/apply-july-2025-cpu">Oracle statement from Chief Security Officer</a></li><li><a title="TikTok’s Algorithm to Be Secured by Oracle in Trump-Backed Deal" rel="nofollow" href="https://archive.ph/ybbmk">TikTok’s Algorithm to Be Secured by Oracle in Trump-Backed Deal</a></li><li><a title="Phantom Taurus: A New Chinese Nexus APT" rel="nofollow" href="https://unit42.paloaltonetworks.com/phantom-taurus/">Phantom Taurus: A New Chinese Nexus APT</a></li><li><a title="China Hackers Breached Foreign Ministers’ Emails" rel="nofollow" href="https://archive.ph/Vpot0">China Hackers Breached Foreign Ministers’ Emails</a></li><li><a title="Cisco Statement on Attacks Against Cisco Firewalls" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks">Cisco Statement on Attacks Against Cisco Firewalls</a></li><li><a title="GreyNoise: 25,000 IPs Scanned Cisco ASA Devices in Early Sept" rel="nofollow" href="https://www.greynoise.io/blog/scanning-surge-cisco-asa-devices">GreyNoise: 25,000 IPs Scanned Cisco ASA Devices in Early Sept</a></li><li><a title="KeyDrop.io" rel="nofollow" href="https://keydrop.io/">KeyDrop.io</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+LjZ4XoeU</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+LjZ4XoeU" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Cisco firewall zero-days and bootkits in the wild</title>
      <link>http://securityconversations.fireside.fm/cisco-bootkit-brickstorm-china-sophisticated-attacks</link>
      <guid isPermaLink="false">25f09048-d490-4caa-800d-d4548e74ad12</guid>
      <pubDate>Sat, 27 Sep 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25f09048-d490-4caa-800d-d4548e74ad12.mp3" length="96122969" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.

Plus, Cisco’s controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning.  Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:54:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25f09048-d490-4caa-800d-d4548e74ad12/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 65</strong>: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.</p>

<p>Plus, Cisco’s controversial handling of these disclosures, CISA&#39;s emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning.  Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Google, GTIG, Brickstorm, China, EDR, cyberespionage, trade negotiations, Cisco, ASA, firewall, bootkit, network appliance, Russia, Ukraine, ransomware, Europe</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 65</strong>: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.</p>

<p>Plus, Cisco’s controversial handling of these disclosures, CISA&#39;s emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning.  Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1cShztjZIHPCcCo5W0VY881-RSs37pXY_usC93b32R-E/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign">Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors</a></li><li><a title="Mandiant Brickstorm Scanner" rel="nofollow" href="https://github.com/mandiant/brickstorm-scanner">Mandiant Brickstorm Scanner</a></li><li><a title="Cisco advisory: Continued Attacks Against Cisco Firewalls" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks">Cisco advisory: Continued Attacks Against Cisco Firewalls</a></li><li><a title="NCSC report on Cisco ASA bootkit in the wild" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/RayInitiator-LINE-VIPER/ncsc-mar-rayinitiator-line-viper.pdf">NCSC report on Cisco ASA bootkit in the wild</a></li><li><a title="U.S. government scrambles to stop new hacking campaign blamed on China" rel="nofollow" href="https://archive.ph/95lK1">U.S. government scrambles to stop new hacking campaign blamed on China</a></li><li><a title="US Secret Service Statement on SIM Farm Discovery" rel="nofollow" href="https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york">US Secret Service Statement on SIM Farm Discovery</a></li><li><a title="NYTimes: Cache of Devices Capable of Crashing Cell Network Is Found Near U.N." rel="nofollow" href="https://archive.ph/FpmSy">NYTimes: Cache of Devices Capable of Crashing Cell Network Is Found Near U.N.</a></li><li><a title="Airport chaos: Ransomware hits airport check-in systems" rel="nofollow" href="https://www.airport-technology.com/analyst-comment/chaos-in-the-air-ransomware-cripples-airport-check-in-systems/">Airport chaos: Ransomware hits airport check-in systems</a></li><li><a title="NCSC statement: Incident impacting Collins Aerospace" rel="nofollow" href="https://www.ncsc.gov.uk/news/collins-aerospace-incident">NCSC statement: Incident impacting Collins Aerospace</a></li><li><a title="Gamaredon X Turla collab" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/">Gamaredon X Turla collab</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 65</strong>: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.</p>

<p>Plus, Cisco’s controversial handling of these disclosures, CISA&#39;s emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning.  Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1cShztjZIHPCcCo5W0VY881-RSs37pXY_usC93b32R-E/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign">Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors</a></li><li><a title="Mandiant Brickstorm Scanner" rel="nofollow" href="https://github.com/mandiant/brickstorm-scanner">Mandiant Brickstorm Scanner</a></li><li><a title="Cisco advisory: Continued Attacks Against Cisco Firewalls" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks">Cisco advisory: Continued Attacks Against Cisco Firewalls</a></li><li><a title="NCSC report on Cisco ASA bootkit in the wild" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/RayInitiator-LINE-VIPER/ncsc-mar-rayinitiator-line-viper.pdf">NCSC report on Cisco ASA bootkit in the wild</a></li><li><a title="U.S. government scrambles to stop new hacking campaign blamed on China" rel="nofollow" href="https://archive.ph/95lK1">U.S. government scrambles to stop new hacking campaign blamed on China</a></li><li><a title="US Secret Service Statement on SIM Farm Discovery" rel="nofollow" href="https://www.secretservice.gov/newsroom/releases/2025/09/us-secret-service-dismantles-imminent-telecommunications-threat-new-york">US Secret Service Statement on SIM Farm Discovery</a></li><li><a title="NYTimes: Cache of Devices Capable of Crashing Cell Network Is Found Near U.N." rel="nofollow" href="https://archive.ph/FpmSy">NYTimes: Cache of Devices Capable of Crashing Cell Network Is Found Near U.N.</a></li><li><a title="Airport chaos: Ransomware hits airport check-in systems" rel="nofollow" href="https://www.airport-technology.com/analyst-comment/chaos-in-the-air-ransomware-cripples-airport-check-in-systems/">Airport chaos: Ransomware hits airport check-in systems</a></li><li><a title="NCSC statement: Incident impacting Collins Aerospace" rel="nofollow" href="https://www.ncsc.gov.uk/news/collins-aerospace-incident">NCSC statement: Incident impacting Collins Aerospace</a></li><li><a title="Gamaredon X Turla collab" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/gamaredon-x-turla-collab/">Gamaredon X Turla collab</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+E_Ax22IS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+E_Ax22IS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Live at LABScon: Aurora Johnson and Trevor Hilligoss on China's 'internet toilets'</title>
      <link>http://securityconversations.fireside.fm/aurora-johnson-trevor-hilligoss-china-internet-toilets</link>
      <guid isPermaLink="false">f1783ca4-97ce-4db0-b3aa-144e6aba3db1</guid>
      <pubDate>Wed, 24 Sep 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f1783ca4-97ce-4db0-b3aa-144e6aba3db1.mp3" length="22164014" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 64: SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets," the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).

Cast: Aurora Johnson, Trevor Hilligoss Ryan Naraine and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>22:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f1783ca4-97ce-4db0-b3aa-144e6aba3db1/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 64:</strong> SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets,&quot; the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).</p>

<p><strong>Cast:</strong> <a href="https://www.labscon.io/speakers/aurora-johnson" rel="nofollow">Aurora Johnson</a>, <a href="https://www.labscon.io/speakers/trevor-hilligoss/" rel="nofollow">Trevor Hilligoss</a>, <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://www.linkedin.com/in/jags-is-fine/" rel="nofollow">Juan Andres Guerrero-Saade</a>.</p>]]>
      </description>
      <itunes:keywords>China, Internet Toilets, SpyCloud, doxxing, stalking, sextortion, the_com, LABScon</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 64:</strong> SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets,&quot; the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).</p>

<p><strong>Cast:</strong> <a href="https://www.labscon.io/speakers/aurora-johnson" rel="nofollow">Aurora Johnson</a>, <a href="https://www.labscon.io/speakers/trevor-hilligoss/" rel="nofollow">Trevor Hilligoss</a>, <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://www.linkedin.com/in/jags-is-fine/" rel="nofollow">Juan Andres Guerrero-Saade</a>.</p><p>Links:</p><ul><li><a title="Plunging China&#39;s internet toilets (LABScon)" rel="nofollow" href="https://www.labscon.io/speakers/aurora-johnson/">Plunging China's internet toilets (LABScon)</a></li><li><a title="SpyCloud Labs" rel="nofollow" href="https://spycloud.com/resources/spycloud-labs/">SpyCloud Labs</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 64:</strong> SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets,&quot; the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).</p>

<p><strong>Cast:</strong> <a href="https://www.labscon.io/speakers/aurora-johnson" rel="nofollow">Aurora Johnson</a>, <a href="https://www.labscon.io/speakers/trevor-hilligoss/" rel="nofollow">Trevor Hilligoss</a>, <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://www.linkedin.com/in/jags-is-fine/" rel="nofollow">Juan Andres Guerrero-Saade</a>.</p><p>Links:</p><ul><li><a title="Plunging China&#39;s internet toilets (LABScon)" rel="nofollow" href="https://www.labscon.io/speakers/aurora-johnson/">Plunging China's internet toilets (LABScon)</a></li><li><a title="SpyCloud Labs" rel="nofollow" href="https://spycloud.com/resources/spycloud-labs/">SpyCloud Labs</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+TbTtg3nf</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+TbTtg3nf" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Live at LABScon: Visi Stark shares memories of creating the APT1 report</title>
      <link>http://securityconversations.fireside.fm/visi-stark-vertex-project-apt1-report-recap</link>
      <guid isPermaLink="false">6a3b7094-57b6-438f-afe4-89b945eaf4cf</guid>
      <pubDate>Wed, 24 Sep 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6a3b7094-57b6-438f-afe4-89b945eaf4cf.mp3" length="29489381" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 63:  Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant's famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025).

Cast: Visi Stark, Ryan Naraine and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>28:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6a3b7094-57b6-438f-afe4-89b945eaf4cf/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 63</strong>: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant&#39;s famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025)</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://x.com/Invisig0th" rel="nofollow">Visi Stark</a>.</p>]]>
      </description>
      <itunes:keywords>Visi Stark, Mandiant, APT1, China, Obama, Xi, threat-intel, Vertex, Synapse, APT-naming</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 63</strong>: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant&#39;s famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025)</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://x.com/Invisig0th" rel="nofollow">Visi Stark</a>.</p><p>Links:</p><ul><li><a title="How the Infamous APT-1 Report Exposing China’s PLA Hackers Came to Be" rel="nofollow" href="https://www.zetter-zeroday.com/how-the-infamous-apt-1-report-exposing-chinas-pla-hackers-came-to-be/">How the Infamous APT-1 Report Exposing China’s PLA Hackers Came to Be</a></li><li><a title="Mandiant APT1 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/mandiant-apt1-report.pdf?ref=zetter-zeroday.com">Mandiant APT1 Report</a></li><li><a title="A guide to U.S. allegations of China cyberspying" rel="nofollow" href="https://www.pbs.org/newshour/world/guide-u-s-allegations-china-cyberspying?ref=zetter-zeroday.com">A guide to U.S. allegations of China cyberspying</a></li><li><a title="The Vertex Project" rel="nofollow" href="https://vertex.link/">The Vertex Project</a></li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li><li><a title="Visi Stark on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/visi-stark-5bb092186/">Visi Stark on LinkedIn</a></li><li><a title="LABScon 2025: Plunging the Internet Toilets in China" rel="nofollow" href="https://www.labscon.io/speakers/aurora-johnson/">LABScon 2025: Plunging the Internet Toilets in China</a></li><li><a title="Aurora Johnson on Twitter" rel="nofollow" href="https://x.com/princessauroraj">Aurora Johnson on Twitter</a></li><li><a title="Trevor Hilligoss" rel="nofollow" href="https://www.labscon.io/speakers/trevor-hilligoss/">Trevor Hilligoss</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 63</strong>: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant&#39;s famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025)</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://x.com/Invisig0th" rel="nofollow">Visi Stark</a>.</p><p>Links:</p><ul><li><a title="How the Infamous APT-1 Report Exposing China’s PLA Hackers Came to Be" rel="nofollow" href="https://www.zetter-zeroday.com/how-the-infamous-apt-1-report-exposing-chinas-pla-hackers-came-to-be/">How the Infamous APT-1 Report Exposing China’s PLA Hackers Came to Be</a></li><li><a title="Mandiant APT1 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/mandiant-apt1-report.pdf?ref=zetter-zeroday.com">Mandiant APT1 Report</a></li><li><a title="A guide to U.S. allegations of China cyberspying" rel="nofollow" href="https://www.pbs.org/newshour/world/guide-u-s-allegations-china-cyberspying?ref=zetter-zeroday.com">A guide to U.S. allegations of China cyberspying</a></li><li><a title="The Vertex Project" rel="nofollow" href="https://vertex.link/">The Vertex Project</a></li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li><li><a title="Visi Stark on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/visi-stark-5bb092186/">Visi Stark on LinkedIn</a></li><li><a title="LABScon 2025: Plunging the Internet Toilets in China" rel="nofollow" href="https://www.labscon.io/speakers/aurora-johnson/">LABScon 2025: Plunging the Internet Toilets in China</a></li><li><a title="Aurora Johnson on Twitter" rel="nofollow" href="https://x.com/princessauroraj">Aurora Johnson on Twitter</a></li><li><a title="Trevor Hilligoss" rel="nofollow" href="https://www.labscon.io/speakers/trevor-hilligoss/">Trevor Hilligoss</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+dnpR4uOG</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+dnpR4uOG" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Live at LABScon: Lindsay Freeman on tracking Wagner Group war crimes </title>
      <link>http://securityconversations.fireside.fm/labscon-live-lindsay-freeman-tracking-war-crimes</link>
      <guid isPermaLink="false">2e770758-3cba-44bf-8c35-e468ad8cda65</guid>
      <pubDate>Wed, 24 Sep 2025 10:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2e770758-3cba-44bf-8c35-e468ad8cda65.mp3" length="29899880" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 62:  Lindsay Freeman, Director of the Technology, Law &amp; Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)

Cast: Lindsay Freeman, Ryan Naraine and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>31:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2e770758-3cba-44bf-8c35-e468ad8cda65/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 62</strong>: Lindsay Freeman, Director of the Technology, Law &amp; Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team&#39;s meticulous work to document the Wagner Group&#39;s chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://x.com/lindsaysfreeman" rel="nofollow">Lindsay Freeman</a>.</p>]]>
      </description>
      <itunes:keywords>Wagner, Russia, Mali, Sahel, Africa, mercenaries, war crimes, ICC, Telegram, International Criminal Court, OSINT, AI tools, drone, satellite</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 62</strong>: Lindsay Freeman, Director of the Technology, Law &amp; Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team&#39;s meticulous work to document the Wagner Group&#39;s chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://x.com/lindsaysfreeman" rel="nofollow">Lindsay Freeman</a>.</p><p>Links:</p><ul><li><a title="LABScon Speaker 2025: Lindsay Freeman" rel="nofollow" href="https://www.labscon.io/speakers/lindsay-freeman/">LABScon Speaker 2025: Lindsay Freeman</a></li><li><a title="War Crimes for Fun and Profit (Lawfare)" rel="nofollow" href="https://www.lawfaremedia.org/article/war-crimes-for-fun-and-profit">War Crimes for Fun and Profit (Lawfare)</a></li><li><a title="Mali: Army, Wagner Group Atrocities Against Civilians" rel="nofollow" href="https://www.hrw.org/news/2024/03/28/mali-army-wagner-group-atrocities-against-civilians">Mali: Army, Wagner Group Atrocities Against Civilians</a></li><li><a title="The Wagner Group’s Atrocities in Africa: Lies and Truth " rel="nofollow" href="https://2021-2025.state.gov/the-wagner-groups-atrocities-in-africa-lies-and-truth/">The Wagner Group’s Atrocities in Africa: Lies and Truth </a></li><li><a title="Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost in Mali" rel="nofollow" href="https://www.csis.org/analysis/massacres-executions-and-falsified-graves-wagner-groups-mounting-humanitarian-cost-mali">Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost in Mali</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 62</strong>: Lindsay Freeman, Director of the Technology, Law &amp; Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team&#39;s meticulous work to document the Wagner Group&#39;s chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and <a href="https://x.com/lindsaysfreeman" rel="nofollow">Lindsay Freeman</a>.</p><p>Links:</p><ul><li><a title="LABScon Speaker 2025: Lindsay Freeman" rel="nofollow" href="https://www.labscon.io/speakers/lindsay-freeman/">LABScon Speaker 2025: Lindsay Freeman</a></li><li><a title="War Crimes for Fun and Profit (Lawfare)" rel="nofollow" href="https://www.lawfaremedia.org/article/war-crimes-for-fun-and-profit">War Crimes for Fun and Profit (Lawfare)</a></li><li><a title="Mali: Army, Wagner Group Atrocities Against Civilians" rel="nofollow" href="https://www.hrw.org/news/2024/03/28/mali-army-wagner-group-atrocities-against-civilians">Mali: Army, Wagner Group Atrocities Against Civilians</a></li><li><a title="The Wagner Group’s Atrocities in Africa: Lies and Truth " rel="nofollow" href="https://2021-2025.state.gov/the-wagner-groups-atrocities-in-africa-lies-and-truth/">The Wagner Group’s Atrocities in Africa: Lies and Truth </a></li><li><a title="Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost in Mali" rel="nofollow" href="https://www.csis.org/analysis/massacres-executions-and-falsified-graves-wagner-groups-mounting-humanitarian-cost-mali">Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost in Mali</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Ohk9MC0r</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Ohk9MC0r" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?</title>
      <link>http://securityconversations.fireside.fm/apple-new-memory-safety-anti-exploit-iphone-spyware</link>
      <guid isPermaLink="false">25a25e4d-d101-4a90-af30-ae85214f326e</guid>
      <pubDate>Tue, 09 Sep 2025 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25a25e4d-d101-4a90-af30-ae85214f326e.mp3" length="133531462" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. 

Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:45:46</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25a25e4d-d101-4a90-af30-ae85214f326e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>supply chain, Salesforce, Apple, China, Russia, Israel, Iran, Google, Microsoft, CISA, NPM, GitHub, Signal, Android, zero-day, WhatsApp, Meta, Apple, MIE, Memory Safety</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1TFCmWNzyYKL35z_3jmiaXs6xpR7egZOjyY4WhScJTzg/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Salesforce advisory on Salesloft Drift hack" rel="nofollow" href="https://status.salesforce.com/generalmessages/20000217">Salesforce advisory on Salesloft Drift hack</a></li><li><a title="Salesloft Drift Breach Tracker" rel="nofollow" href="https://www.driftbreach.com/">Salesloft Drift Breach Tracker</a></li><li><a title="Mandiant Drift and Salesloft Application Investigations" rel="nofollow" href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations">Mandiant Drift and Salesloft Application Investigations</a></li><li><a title="Widespread Data Theft Targets Salesforce Instances via Salesloft Drift" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift">Widespread Data Theft Targets Salesforce Instances via Salesloft Drift</a></li><li><a title="Large-Scale NPM Attack" rel="nofollow" href="https://cointelegraph.com/news/large-scale-npm-attack-compromised-less-50-dollars">Large-Scale NPM Attack</a></li><li><a title="NPM attack failed, with almost no victims" rel="nofollow" href="https://x.com/P3b7_/status/1965336272550899932">NPM attack failed, with almost no victims</a></li><li><a title="Chinese Hackers Pretended to Be a Top U.S. Lawmaker" rel="nofollow" href="https://archive.ph/KlhAo">Chinese Hackers Pretended to Be a Top U.S. Lawmaker</a></li><li><a title="Czech cyber agency warns against using services and products that send data to China" rel="nofollow" href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china">Czech cyber agency warns against using services and products that send data to China</a></li><li><a title="Apple Debuts Memory Integrity Enforcement (MIE)" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple Debuts Memory Integrity Enforcement (MIE)</a></li><li><a title="Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations" rel="nofollow" href="https://www.huntress.com/blog/rare-look-inside-attacker-operation">Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations</a></li><li><a title="LABScon 2025 Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2025/agenda">LABScon 2025 Agenda</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 61</strong>: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. </p>

<p>Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1TFCmWNzyYKL35z_3jmiaXs6xpR7egZOjyY4WhScJTzg/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Salesforce advisory on Salesloft Drift hack" rel="nofollow" href="https://status.salesforce.com/generalmessages/20000217">Salesforce advisory on Salesloft Drift hack</a></li><li><a title="Salesloft Drift Breach Tracker" rel="nofollow" href="https://www.driftbreach.com/">Salesloft Drift Breach Tracker</a></li><li><a title="Mandiant Drift and Salesloft Application Investigations" rel="nofollow" href="https://trust.salesloft.com/?uid=Update+on+Mandiant+Drift+and+Salesloft+Application+Investigations">Mandiant Drift and Salesloft Application Investigations</a></li><li><a title="Widespread Data Theft Targets Salesforce Instances via Salesloft Drift" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift">Widespread Data Theft Targets Salesforce Instances via Salesloft Drift</a></li><li><a title="Large-Scale NPM Attack" rel="nofollow" href="https://cointelegraph.com/news/large-scale-npm-attack-compromised-less-50-dollars">Large-Scale NPM Attack</a></li><li><a title="NPM attack failed, with almost no victims" rel="nofollow" href="https://x.com/P3b7_/status/1965336272550899932">NPM attack failed, with almost no victims</a></li><li><a title="Chinese Hackers Pretended to Be a Top U.S. Lawmaker" rel="nofollow" href="https://archive.ph/KlhAo">Chinese Hackers Pretended to Be a Top U.S. Lawmaker</a></li><li><a title="Czech cyber agency warns against using services and products that send data to China" rel="nofollow" href="https://therecord.media/czech-nukib-warns-against-products-sending-data-china">Czech cyber agency warns against using services and products that send data to China</a></li><li><a title="Apple Debuts Memory Integrity Enforcement (MIE)" rel="nofollow" href="https://security.apple.com/blog/memory-integrity-enforcement/">Apple Debuts Memory Integrity Enforcement (MIE)</a></li><li><a title="Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations" rel="nofollow" href="https://www.huntress.com/blog/rare-look-inside-attacker-operation">Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations</a></li><li><a title="LABScon 2025 Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2025/agenda">LABScon 2025 Agenda</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+sD7634rg</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+sD7634rg" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click </title>
      <link>http://securityconversations.fireside.fm/salt-typhoon-iocs-google-disruption-unit-whatsapp-zero-click</link>
      <guid isPermaLink="false">1ec2ef88-a1b1-4df7-b737-24542f8462c8</guid>
      <pubDate>Fri, 29 Aug 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1ec2ef88-a1b1-4df7-b737-24542f8462c8.mp3" length="101225542" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.

Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. 

We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:24:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1ec2ef88-a1b1-4df7-b737-24542f8462c8/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Salt Typhoon, Cisco, Ivanti, YARA, Ghost Emperor, UNC5807, Dutch MIVD AIVD, Mirai, LIghtBasin, Google, active-defense, hacking back, WhatsApp, Apple, iOS</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 60</strong>: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.</p>

<p>Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. </p>

<p>We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="NSA, Allies Report on Salt Typhoon" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/">NSA, Allies Report on Salt Typhoon</a></li><li><a title="UK and allies expose China tech companies" rel="nofollow" href="https://www.ncsc.gov.uk/news/uk-allies-expose-china-tech-companies-enabling-cyber-campaign">UK and allies expose China tech companies</a></li><li><a title="Joint Advisory on Salt Typhoon (IOCs)" rel="nofollow" href="https://media.defense.gov/2025/Aug/22/2003786665/-1/-1/0/CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF">Joint Advisory on Salt Typhoon (IOCs)</a></li><li><a title="Dutch providers targeted by Salt Typhoon" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/08/28/nederlandse-providers-doelwit-van-salt-typhoon">Dutch providers targeted by Salt Typhoon</a></li><li><a title="Silent Control: The Hidden Penetration of MystRodX" rel="nofollow" href="https://blog.xlab.qianxin.com/mystrodx_covert_dual-mode_backdoor/">Silent Control: The Hidden Penetration of MystRodX</a></li><li><a title="Google previews cyber ‘disruption unit&#39;" rel="nofollow" href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/">Google previews cyber ‘disruption unit'</a></li><li><a title="Anthropic report on misuse of Claude AI" rel="nofollow" href="https://www.anthropic.com/news/detecting-countering-misuse-aug-2025">Anthropic report on misuse of Claude AI</a></li><li><a title="WhatsApp 0day exploited (iOS attack chain)" rel="nofollow" href="https://www.whatsapp.com/security/advisories/2025/">WhatsApp 0day exploited (iOS attack chain)</a></li><li><a title="RationalEdge - Intelligence Meets Accuracy" rel="nofollow" href="https://rationaledge.io/">RationalEdge - Intelligence Meets Accuracy</a></li><li><a title="LABScon Speakers 2025" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers 2025</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+3tLsSajS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+3tLsSajS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Zero-day reality check: iOS exploits, MAPP in China and the hack-back temptation</title>
      <link>http://securityconversations.fireside.fm/zero-day-ios-mapp-china-letters-of-marque</link>
      <guid isPermaLink="false">3a700ea9-ec69-4472-bade-414c4c7a53b2</guid>
      <pubDate>Fri, 22 Aug 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3a700ea9-ec69-4472-bade-414c4c7a53b2.mp3" length="118144375" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 59: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who’s likely using these exploits, why Apple’s guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works.

Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora’s box?), and dissect two case studies that blur APT and crimeware: PipeMagic’s CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:32:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3a700ea9-ec69-4472-bade-414c4c7a53b2/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 59</strong>: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who’s likely using these exploits, why Apple’s guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works.</p>

<p>Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora’s box?), and dissect two case studies that blur APT and crimeware: PipeMagic’s CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Apple, iOS, iOS 18.6.2, Lockdown Mode, Citizen Lab, iPhone, ImageIO, Microsoft, MAPP, China, Letters of Marque, PipeMagic, Static Tundra, Russia</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 59</strong>: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who’s likely using these exploits, why Apple’s guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works.</p>

<p>Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora’s box?), and dissect two case studies that blur APT and crimeware: PipeMagic’s CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Apple bulletin: iOS 18.6.2" rel="nofollow" href="https://support.apple.com/en-us/124925">Apple bulletin: iOS 18.6.2</a></li><li><a title="Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS" rel="nofollow" href="https://cyberscoop.com/apple-zero-day-ios-macos-ipados-august-2025/">Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS</a></li><li><a title="UK drops demand for backdoor into Apple encryption" rel="nofollow" href="https://www.theverge.com/news/761240/uk-apple-us-encryption-back-door-demands-dropped">UK drops demand for backdoor into Apple encryption</a></li><li><a title="Tulsi Gabbard on UK dropping Apple backdoor mandate" rel="nofollow" href="https://x.com/DNIGabbard/status/1957623737232007638">Tulsi Gabbard on UK dropping Apple backdoor mandate</a></li><li><a title="Microsoft Curbs Early Notifications for Chinese Firms on Security Flaws" rel="nofollow" href="https://archive.ph/S1Qxw">Microsoft Curbs Early Notifications for Chinese Firms on Security Flaws</a></li><li><a title="Kaspersky report on PipeMagic" rel="nofollow" href="https://securelist.com/pipemagic/117270/">Kaspersky report on PipeMagic</a></li><li><a title="Microsoft: Dissecting PipeMagic Backdoor Framework" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/08/18/dissecting-pipemagic-inside-the-architecture-of-a-modular-backdoor-framework/">Microsoft: Dissecting PipeMagic Backdoor Framework</a></li><li><a title="Cisco Talos on Static Tundra " rel="nofollow" href="https://blog.talosintelligence.com/static-tundra/">Cisco Talos on Static Tundra </a></li><li><a title="FBI advisory on end-of-life network devices" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250820">FBI advisory on end-of-life network devices</a></li><li><a title="SIM-Swapper, Scattered Spider Hacker Gets 10 Years" rel="nofollow" href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/">SIM-Swapper, Scattered Spider Hacker Gets 10 Years</a></li><li><a title="Qubic Claims Majority Control of Monero Hashrate, Raising 51% Attack Fears" rel="nofollow" href="https://www.coindesk.com/business/2025/08/12/qubic-claims-majority-control-of-monero-hashrate-raising-51-attack-fears">Qubic Claims Majority Control of Monero Hashrate, Raising 51% Attack Fears</a></li><li><a title="State of Statecraft Call for Papers" rel="nofollow" href="https://www.stateofstatecraft.com/cfp">State of Statecraft Call for Papers</a></li><li><a title="LABScon 2025 Speaker Roster" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2025 Speaker Roster</a></li><li><a title="Offensive AI Con" rel="nofollow" href="https://events.humanitix.com/offensive-ai-con?utm_term=&amp;utm_campaign=&amp;utm_source=adwords&amp;utm_medium=ppc&amp;hsa_acc=7180819758&amp;hsa_cam=20991033514&amp;hsa_grp=161185120489&amp;hsa_ad=689601156905&amp;hsa_src=g&amp;hsa_tgt=dsa-19959388920&amp;hsa_kw=&amp;hsa_mt=&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gad_campaignid=20991033514&amp;gbraid=0AAAAABav_m8gbgDxsU7DmjBLke8XU8eai&amp;gclid=Cj0KCQjwwZDFBhCpARIsAB95qO0xhRhywMTqp0V9unCeS1_eXiTN5xZ6F78DxunKdzZZ2VCLYm3GZqMaAuuLEALw_wcB">Offensive AI Con</a></li><li><a title="Three Buddy Problem: LIVE in Canada " rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem: LIVE in Canada </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 59</strong>: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who’s likely using these exploits, why Apple’s guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works.</p>

<p>Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora’s box?), and dissect two case studies that blur APT and crimeware: PipeMagic’s CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1s08A637odGBsqPX2lWWqtG5IM2hj6dWGtTzaxKbfWt4/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Apple bulletin: iOS 18.6.2" rel="nofollow" href="https://support.apple.com/en-us/124925">Apple bulletin: iOS 18.6.2</a></li><li><a title="Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS" rel="nofollow" href="https://cyberscoop.com/apple-zero-day-ios-macos-ipados-august-2025/">Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS</a></li><li><a title="UK drops demand for backdoor into Apple encryption" rel="nofollow" href="https://www.theverge.com/news/761240/uk-apple-us-encryption-back-door-demands-dropped">UK drops demand for backdoor into Apple encryption</a></li><li><a title="Tulsi Gabbard on UK dropping Apple backdoor mandate" rel="nofollow" href="https://x.com/DNIGabbard/status/1957623737232007638">Tulsi Gabbard on UK dropping Apple backdoor mandate</a></li><li><a title="Microsoft Curbs Early Notifications for Chinese Firms on Security Flaws" rel="nofollow" href="https://archive.ph/S1Qxw">Microsoft Curbs Early Notifications for Chinese Firms on Security Flaws</a></li><li><a title="Kaspersky report on PipeMagic" rel="nofollow" href="https://securelist.com/pipemagic/117270/">Kaspersky report on PipeMagic</a></li><li><a title="Microsoft: Dissecting PipeMagic Backdoor Framework" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/08/18/dissecting-pipemagic-inside-the-architecture-of-a-modular-backdoor-framework/">Microsoft: Dissecting PipeMagic Backdoor Framework</a></li><li><a title="Cisco Talos on Static Tundra " rel="nofollow" href="https://blog.talosintelligence.com/static-tundra/">Cisco Talos on Static Tundra </a></li><li><a title="FBI advisory on end-of-life network devices" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250820">FBI advisory on end-of-life network devices</a></li><li><a title="SIM-Swapper, Scattered Spider Hacker Gets 10 Years" rel="nofollow" href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/">SIM-Swapper, Scattered Spider Hacker Gets 10 Years</a></li><li><a title="Qubic Claims Majority Control of Monero Hashrate, Raising 51% Attack Fears" rel="nofollow" href="https://www.coindesk.com/business/2025/08/12/qubic-claims-majority-control-of-monero-hashrate-raising-51-attack-fears">Qubic Claims Majority Control of Monero Hashrate, Raising 51% Attack Fears</a></li><li><a title="State of Statecraft Call for Papers" rel="nofollow" href="https://www.stateofstatecraft.com/cfp">State of Statecraft Call for Papers</a></li><li><a title="LABScon 2025 Speaker Roster" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2025 Speaker Roster</a></li><li><a title="Offensive AI Con" rel="nofollow" href="https://events.humanitix.com/offensive-ai-con?utm_term=&amp;utm_campaign=&amp;utm_source=adwords&amp;utm_medium=ppc&amp;hsa_acc=7180819758&amp;hsa_cam=20991033514&amp;hsa_grp=161185120489&amp;hsa_ad=689601156905&amp;hsa_src=g&amp;hsa_tgt=dsa-19959388920&amp;hsa_kw=&amp;hsa_mt=&amp;hsa_net=adwords&amp;hsa_ver=3&amp;gad_source=1&amp;gad_campaignid=20991033514&amp;gbraid=0AAAAABav_m8gbgDxsU7DmjBLke8XU8eai&amp;gclid=Cj0KCQjwwZDFBhCpARIsAB95qO0xhRhywMTqp0V9unCeS1_eXiTN5xZ6F78DxunKdzZZ2VCLYm3GZqMaAuuLEALw_wcB">Offensive AI Con</a></li><li><a title="Three Buddy Problem: LIVE in Canada " rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem: LIVE in Canada </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+1KSS9vZJ</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+1KSS9vZJ" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>On AI’s future, security’s failures, and what comes next...</title>
      <link>http://securityconversations.fireside.fm/ai-futire-security-failures-whats-next</link>
      <guid isPermaLink="false">a144cfba-560a-41b9-a9db-8138273862b2</guid>
      <pubDate>Fri, 15 Aug 2025 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a144cfba-560a-41b9-a9db-8138273862b2.mp3" length="56518966" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 58:  Indepth reaction to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold-rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. 

We revisit the Chinese "cyber militia" discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:57:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a144cfba-560a-41b9-a9db-8138273862b2/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 58</strong>:  The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. </p>

<p>We revisit the Chinese &quot;cyber militia&quot; discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>OpenAI, ChatGPT5, Claude, Mistral, Apple, Russia, China, zero-day, Microsoft, AI, NVIDIA</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 58</strong>:  The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. </p>

<p>We revisit the Chinese &quot;cyber militia&quot; discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VZcPDkqbuB4MZihxH8wKDEnpcFo7Kq70Kl-JV9i_p5s/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Live from Black Hat: Brandon Dixon" rel="nofollow" href="https://podcasts.apple.com/us/podcast/live-from-black-hat-brandon-dixon-parses-the-ai/id1414525622?i=1000721209590">Live from Black Hat: Brandon Dixon</a></li><li><a title="PSIRT | FortiGuard Labs" rel="nofollow" href="https://www.fortiguard.com/psirt/FG-IR-25-152">PSIRT | FortiGuard Labs</a></li><li><a title="SonicWall Firewalls – SSLVPN Recent Threat Activity" rel="nofollow" href="https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430">SonicWall Firewalls – SSLVPN Recent Threat Activity</a></li><li><a title="Cisco CVSS 1.0 RCE" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79">Cisco CVSS 1.0 RCE</a></li><li><a title="Margin Research: Cyber Militias Redux" rel="nofollow" href="https://margin.re/2025/08/cyber-militias-redux-or-why-your-boss-might-also-be-your-platoon-leader-in-china-2/">Margin Research: Cyber Militias Redux</a></li><li><a title="Russia Is Suspected to Be Behind Breach of Federal Court Filing System" rel="nofollow" href="https://archive.ph/iVhTS">Russia Is Suspected to Be Behind Breach of Federal Court Filing System</a></li><li><a title="Russian hackers seized control of Norwegian dam" rel="nofollow" href="https://www.theguardian.com/world/2025/aug/14/russian-hackers-control-norwegian-dam-norway">Russian hackers seized control of Norwegian dam</a></li><li><a title="Poland foiled cyberattack on big city&#39;s water supply" rel="nofollow" href="https://www.reuters.com/en/poland-foiled-cyberattack-big-citys-water-supply-deputy-pm-says-2025-08-14/">Poland foiled cyberattack on big city's water supply</a></li><li><a title="EU Parliament pressing for agreement on chat scanning bill" rel="nofollow" href="https://www.techradar.com/computing/cyber-security/a-political-blackmail-the-eu-parliament-is-pressing-for-new-mandatory-scanning-of-your-private-chats?utm_source=chatgpt.com">EU Parliament pressing for agreement on chat scanning bill</a></li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 58</strong>:  The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. </p>

<p>We revisit the Chinese &quot;cyber militia&quot; discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1VZcPDkqbuB4MZihxH8wKDEnpcFo7Kq70Kl-JV9i_p5s/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Live from Black Hat: Brandon Dixon" rel="nofollow" href="https://podcasts.apple.com/us/podcast/live-from-black-hat-brandon-dixon-parses-the-ai/id1414525622?i=1000721209590">Live from Black Hat: Brandon Dixon</a></li><li><a title="PSIRT | FortiGuard Labs" rel="nofollow" href="https://www.fortiguard.com/psirt/FG-IR-25-152">PSIRT | FortiGuard Labs</a></li><li><a title="SonicWall Firewalls – SSLVPN Recent Threat Activity" rel="nofollow" href="https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430">SonicWall Firewalls – SSLVPN Recent Threat Activity</a></li><li><a title="Cisco CVSS 1.0 RCE" rel="nofollow" href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79">Cisco CVSS 1.0 RCE</a></li><li><a title="Margin Research: Cyber Militias Redux" rel="nofollow" href="https://margin.re/2025/08/cyber-militias-redux-or-why-your-boss-might-also-be-your-platoon-leader-in-china-2/">Margin Research: Cyber Militias Redux</a></li><li><a title="Russia Is Suspected to Be Behind Breach of Federal Court Filing System" rel="nofollow" href="https://archive.ph/iVhTS">Russia Is Suspected to Be Behind Breach of Federal Court Filing System</a></li><li><a title="Russian hackers seized control of Norwegian dam" rel="nofollow" href="https://www.theguardian.com/world/2025/aug/14/russian-hackers-control-norwegian-dam-norway">Russian hackers seized control of Norwegian dam</a></li><li><a title="Poland foiled cyberattack on big city&#39;s water supply" rel="nofollow" href="https://www.reuters.com/en/poland-foiled-cyberattack-big-citys-water-supply-deputy-pm-says-2025-08-14/">Poland foiled cyberattack on big city's water supply</a></li><li><a title="EU Parliament pressing for agreement on chat scanning bill" rel="nofollow" href="https://www.techradar.com/computing/cyber-security/a-political-blackmail-the-eu-parliament-is-pressing-for-new-mandatory-scanning-of-your-private-chats?utm_source=chatgpt.com">EU Parliament pressing for agreement on chat scanning bill</a></li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+vbVGLYzq</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+vbVGLYzq" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Live from Black Hat: Brandon Dixon parses the AI security hype</title>
      <link>http://securityconversations.fireside.fm/live-black-hat-brandon-dixon-ai-security-hype</link>
      <guid isPermaLink="false">e0829cc5-9719-41bd-92d8-865d133d21cf</guid>
      <pubDate>Thu, 07 Aug 2025 09:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e0829cc5-9719-41bd-92d8-865d133d21cf.mp3" length="43316889" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 57:  Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.

Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. 

Cast: Brandon Dixon, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:30:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e0829cc5-9719-41bd-92d8-865d133d21cf/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 57</strong>: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.</p>

<p>Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. </p>

<p><strong>Cast:</strong>  <a href="https://www.linkedin.com/in/brandonsdixon/" rel="nofollow">Brandon Dixon</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>OpenAI, Aardvark, Microsoft, Google, Big Sleep, gen-AI, agentic AI, Black Hat, NVIDIA, XBOW, PassiveTotal, RiskIQ, VirusTotal, China</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 57</strong>: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.</p>

<p>Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. </p>

<p><strong>Cast:</strong>  <a href="https://www.linkedin.com/in/brandonsdixon/" rel="nofollow">Brandon Dixon</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qK9qf59EbwAZvr_zjR3FvmEN_nlpFPGAaTKNZYCVQFY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Brandon Dixon | LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/brandonsdixon/">Brandon Dixon | LinkedIn</a></li><li><a title="Google &#39;Big Sleep&#39; AI Issue Tracker" rel="nofollow" href="https://issuetracker.google.com/issues?q=componentid:1836411&amp;s=type:desc&amp;s=issue_id:desc">Google 'Big Sleep' AI Issue Tracker</a></li><li><a title="XBOW - The road to Top 1: How XBOW did it" rel="nofollow" href="https://xbow.com/blog/top-1-how-xbow-did-it?utm_source=chatgpt.com">XBOW - The road to Top 1: How XBOW did it</a></li><li><a title="Does “XBOW AI Hacker” Deserve the Hype?" rel="nofollow" href="https://utkusen.substack.com/p/does-xbow-ai-hacker-deserve-the-hype">Does “XBOW AI Hacker” Deserve the Hype?</a></li><li><a title="XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B" rel="nofollow" href="https://xbow.com/blog/series-b">XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B</a></li><li><a title="NVIDIA: No Backdoors. No Kill Switches. No Spyware " rel="nofollow" href="https://blogs.nvidia.com/blog/no-backdoors-no-kill-switches-no-spyware/">NVIDIA: No Backdoors. No Kill Switches. No Spyware </a></li><li><a title="Nvidia reiterates its chips have no backdoors, urges US against location verification" rel="nofollow" href="https://www.reuters.com/world/china/nvidia-reiterates-its-chips-have-no-backdoors-urges-us-against-location-2025-08-06/?utm_source=chatgpt.com">Nvidia reiterates its chips have no backdoors, urges US against location verification</a></li><li><a title="Google: Our Big Sleep agent makes a big leap" rel="nofollow" href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap">Google: Our Big Sleep agent makes a big leap</a></li><li><a title="Microsoft announces acquisition of RiskIQ " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/">Microsoft announces acquisition of RiskIQ </a></li><li><a title="RiskIQ attack surface management" rel="nofollow" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/riskiq1592493552392.riskiq-saas?tab=overview">RiskIQ attack surface management</a></li><li><a title="Brandon Dixon (SecurityConversations podcast)" rel="nofollow" href="https://securityconversations.com/episode/brandon-dixon-vice-president-riskiq/">Brandon Dixon (SecurityConversations podcast)</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 57</strong>: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.</p>

<p>Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development. </p>

<p><strong>Cast:</strong>  <a href="https://www.linkedin.com/in/brandonsdixon/" rel="nofollow">Brandon Dixon</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qK9qf59EbwAZvr_zjR3FvmEN_nlpFPGAaTKNZYCVQFY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Brandon Dixon | LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/brandonsdixon/">Brandon Dixon | LinkedIn</a></li><li><a title="Google &#39;Big Sleep&#39; AI Issue Tracker" rel="nofollow" href="https://issuetracker.google.com/issues?q=componentid:1836411&amp;s=type:desc&amp;s=issue_id:desc">Google 'Big Sleep' AI Issue Tracker</a></li><li><a title="XBOW - The road to Top 1: How XBOW did it" rel="nofollow" href="https://xbow.com/blog/top-1-how-xbow-did-it?utm_source=chatgpt.com">XBOW - The road to Top 1: How XBOW did it</a></li><li><a title="Does “XBOW AI Hacker” Deserve the Hype?" rel="nofollow" href="https://utkusen.substack.com/p/does-xbow-ai-hacker-deserve-the-hype">Does “XBOW AI Hacker” Deserve the Hype?</a></li><li><a title="XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B" rel="nofollow" href="https://xbow.com/blog/series-b">XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B</a></li><li><a title="NVIDIA: No Backdoors. No Kill Switches. No Spyware " rel="nofollow" href="https://blogs.nvidia.com/blog/no-backdoors-no-kill-switches-no-spyware/">NVIDIA: No Backdoors. No Kill Switches. No Spyware </a></li><li><a title="Nvidia reiterates its chips have no backdoors, urges US against location verification" rel="nofollow" href="https://www.reuters.com/world/china/nvidia-reiterates-its-chips-have-no-backdoors-urges-us-against-location-2025-08-06/?utm_source=chatgpt.com">Nvidia reiterates its chips have no backdoors, urges US against location verification</a></li><li><a title="Google: Our Big Sleep agent makes a big leap" rel="nofollow" href="https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap">Google: Our Big Sleep agent makes a big leap</a></li><li><a title="Microsoft announces acquisition of RiskIQ " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/07/12/microsoft-to-acquire-riskiq-to-strengthen-cybersecurity-of-digital-transformation-and-hybrid-work/">Microsoft announces acquisition of RiskIQ </a></li><li><a title="RiskIQ attack surface management" rel="nofollow" href="https://azuremarketplace.microsoft.com/en-us/marketplace/apps/riskiq1592493552392.riskiq-saas?tab=overview">RiskIQ attack surface management</a></li><li><a title="Brandon Dixon (SecurityConversations podcast)" rel="nofollow" href="https://securityconversations.com/episode/brandon-dixon-vice-president-riskiq/">Brandon Dixon (SecurityConversations podcast)</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+UcX2oemR</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+UcX2oemR" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service</title>
      <link>http://securityconversations.fireside.fm/china-microsoft-mapp-zero-days-singapore-warning</link>
      <guid isPermaLink="false">7d8831a2-e2e9-4a1f-aef7-a7c2ae778589</guid>
      <pubDate>Fri, 01 Aug 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7d8831a2-e2e9-4a1f-aef7-a7c2ae778589.mp3" length="53618956" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire. 

Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.

Cast: Dakota Cary, Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:51:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7d8831a2-e2e9-4a1f-aef7-a7c2ae778589/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 56</strong>: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire. </p>

<p>Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.</p>

<p><strong>Cast:</strong> <a href="https://www.linkedin.com/in/dakotacary/" rel="nofollow">Dakota Cary</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>China, Microsoft, MAPP, zero-day, Sharepoint, ISoon leaks, HAFNIUM, MSS, ransomware, Singapore, Fire ANT, geopolitics</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 56</strong>: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire. </p>

<p>Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.</p>

<p><strong>Cast:</strong> <a href="https://www.linkedin.com/in/dakotacary/" rel="nofollow">Dakota Cary</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1gBEQbXUnmY-LmQ8f8SsaW9IgDIn8b4Sis6vHl8xoaJU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Dakota Cary on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/dakotacary/">Dakota Cary on LinkedIn</a></li><li><a title="China’s Covert Capabilities -- Silk Spun From Hafnium" rel="nofollow" href="https://www.sentinelone.com/labs/chinas-covert-capabilities-silk-spun-from-hafnium/">China’s Covert Capabilities -- Silk Spun From Hafnium</a></li><li><a title="HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem" rel="nofollow" href="https://nattothoughts.substack.com/p/hafnium-linked-hacker-xu-zewei-riding">HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem</a></li><li><a title="Microsoft Probing Whether Chinese Hackers Found Flaw Via MAPP " rel="nofollow" href="https://archive.ph/txvJ5">Microsoft Probing Whether Chinese Hackers Found Flaw Via MAPP </a></li><li><a title="Cybersecurity Law of the People’s Republic of China" rel="nofollow" href="https://digichina.stanford.edu/work/translation-cybersecurity-law-of-the-peoples-republic-of-china-effective-june-1-2017/">Cybersecurity Law of the People’s Republic of China</a></li><li><a title="Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats</a></li><li><a title="Fire Ant: Hypervisor-Level Espionage Targeting VMware ESXi &amp; vCenter" rel="nofollow" href="https://www.sygnia.co/blog/fire-ant-a-deep-dive-into-hypervisor-level-espionage/">Fire Ant: Hypervisor-Level Espionage Targeting VMware ESXi &amp; vCenter</a></li><li><a title="Singapore actively dealing with ongoing China cyberattack" rel="nofollow" href="https://www.channelnewsasia.com/singapore/unc3886-cyber-security-threat-actor-attack-singapore-5245791">Singapore actively dealing with ongoing China cyberattack</a></li><li><a title="Iranians Targeted With Spyware in Lead-Up to War With Israel" rel="nofollow" href="https://archive.ph/GDKIo#selection-1523.32-1523.125">Iranians Targeted With Spyware in Lead-Up to War With Israel</a> &mdash;  all inside Iran and working either in the country’s technology sector or for the government.</li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li><li><a title="Apple in China (book)" rel="nofollow" href="https://www.simonandschuster.com/books/Apple-in-China/Patrick-McGee/9781668053379">Apple in China (book)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 56</strong>: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire. </p>

<p>Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.</p>

<p><strong>Cast:</strong> <a href="https://www.linkedin.com/in/dakotacary/" rel="nofollow">Dakota Cary</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1gBEQbXUnmY-LmQ8f8SsaW9IgDIn8b4Sis6vHl8xoaJU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Dakota Cary on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/dakotacary/">Dakota Cary on LinkedIn</a></li><li><a title="China’s Covert Capabilities -- Silk Spun From Hafnium" rel="nofollow" href="https://www.sentinelone.com/labs/chinas-covert-capabilities-silk-spun-from-hafnium/">China’s Covert Capabilities -- Silk Spun From Hafnium</a></li><li><a title="HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem" rel="nofollow" href="https://nattothoughts.substack.com/p/hafnium-linked-hacker-xu-zewei-riding">HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem</a></li><li><a title="Microsoft Probing Whether Chinese Hackers Found Flaw Via MAPP " rel="nofollow" href="https://archive.ph/txvJ5">Microsoft Probing Whether Chinese Hackers Found Flaw Via MAPP </a></li><li><a title="Cybersecurity Law of the People’s Republic of China" rel="nofollow" href="https://digichina.stanford.edu/work/translation-cybersecurity-law-of-the-peoples-republic-of-china-effective-june-1-2017/">Cybersecurity Law of the People’s Republic of China</a></li><li><a title="Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/31/frozen-in-transit-secret-blizzards-aitm-campaign-against-diplomats/">Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats</a></li><li><a title="Fire Ant: Hypervisor-Level Espionage Targeting VMware ESXi &amp; vCenter" rel="nofollow" href="https://www.sygnia.co/blog/fire-ant-a-deep-dive-into-hypervisor-level-espionage/">Fire Ant: Hypervisor-Level Espionage Targeting VMware ESXi &amp; vCenter</a></li><li><a title="Singapore actively dealing with ongoing China cyberattack" rel="nofollow" href="https://www.channelnewsasia.com/singapore/unc3886-cyber-security-threat-actor-attack-singapore-5245791">Singapore actively dealing with ongoing China cyberattack</a></li><li><a title="Iranians Targeted With Spyware in Lead-Up to War With Israel" rel="nofollow" href="https://archive.ph/GDKIo#selection-1523.32-1523.125">Iranians Targeted With Spyware in Lead-Up to War With Israel</a> &mdash;  all inside Iran and working either in the country’s technology sector or for the government.</li><li><a title="LABScon 2025" rel="nofollow" href="https://www.labscon.io/">LABScon 2025</a></li><li><a title="Apple in China (book)" rel="nofollow" href="https://www.simonandschuster.com/books/Apple-in-China/Patrick-McGee/9781668053379">Apple in China (book)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+RIxVEvm8</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+RIxVEvm8" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days</title>
      <link>http://securityconversations.fireside.fm/msft-sharepoint-zero-day-faulty-patches-</link>
      <guid isPermaLink="false">fe4d62a3-cad0-4b3d-b729-d0e94654c458</guid>
      <pubDate>Fri, 25 Jul 2025 02:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fe4d62a3-cad0-4b3d-b729-d0e94654c458.mp3" length="93250682" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 55:  We dig into Microsoft's latest security nightmare: a SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis, with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.

We also revisit the ProPublica bombshell about Microsoft's "digital escorts" and U.S. government data exposure to Chinese adversaries and the company's "oops, we will stop" response. Plus, trusting Google's Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:55:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fe4d62a3-cad0-4b3d-b729-d0e94654c458/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 55</strong>: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.</p>

<p>We also revisit the ProPublica bombshell about Microsoft&#39;s &quot;digital escorts&quot; and U.S. government data exposure to Chinese adversaries and the company&#39;s &quot;oops, we will stop&quot; response. Plus, trusting Google&#39;s Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>microsoft, sharepoint, zero-day, china, luckymouse, apt31, digital escorts, Hegseth, Big Sleep, ProPublica, Replit, artificial intelligence, AI, vibe coding</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 55</strong>: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.</p>

<p>We also revisit the ProPublica bombshell about Microsoft&#39;s &quot;digital escorts&quot; and U.S. government data exposure to Chinese adversaries and the company&#39;s &quot;oops, we will stop&quot; response. Plus, trusting Google&#39;s Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1G_OoBEvmZiGCO-FUMr9dr87X5g80K7fHPda6QY_avQQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="TBP at Countermeasures 2025" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">TBP at Countermeasures 2025</a></li><li><a title="CODE WHITE GmbH ToolShell exploit" rel="nofollow" href="https://infosec.exchange/@codewhitesec/114851715379861407">CODE WHITE GmbH ToolShell exploit</a></li><li><a title="Microsoft guidance for SharePoint vulnerability CVE-2025-53770" rel="nofollow" href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/">Microsoft guidance for SharePoint vulnerability CVE-2025-53770</a></li><li><a title="Kaspersky on ToolShell: A story of five Sharepoint vulns" rel="nofollow" href="https://securelist.com/toolshell-explained/117045/">Kaspersky on ToolShell: A story of five Sharepoint vulns</a></li><li><a title="Ryan&#39;s EkoParty keynote on Microsoft culture" rel="nofollow" href="https://x.com/juanandres_gs/status/1587794147448016896">Ryan's EkoParty keynote on Microsoft culture</a></li><li><a title="Microsoft Disrupting active exploitation of on-prem SharePoint flaws" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/">Microsoft Disrupting active exploitation of on-prem SharePoint flaws</a></li><li><a title="SentinelLabs on Sharepoint zero-day in-the-wild" rel="nofollow" href="https://www.sentinelone.com/blog/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/">SentinelLabs on Sharepoint zero-day in-the-wild</a></li><li><a title="ESET on ToolShell: An all-you-can-eat buffet for threat actors" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/">ESET on ToolShell: An all-you-can-eat buffet for threat actors</a></li><li><a title="Microsoft Stops Using China-Based Engineers for DoD Computer Systems" rel="nofollow" href="https://www.propublica.org/article/defense-department-pentagon-microsoft-digital-escort-china">Microsoft Stops Using China-Based Engineers for DoD Computer Systems</a></li><li><a title="AI coding platform goes rogue during code freeze and deletes entire company database" rel="nofollow" href="https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data">AI coding platform goes rogue during code freeze and deletes entire company database</a></li><li><a title="Jason Lemkin: Replit goes rogue" rel="nofollow" href="https://x.com/jasonlk/status/1946069562723897802">Jason Lemkin: Replit goes rogue</a></li><li><a title="John Hultquist on Big Dream AI" rel="nofollow" href="https://x.com/JohnHultquist/status/1947309146581119369">John Hultquist on Big Dream AI</a></li><li><a title="LABScon 2025 " rel="nofollow" href="https://www.labscon.io/">LABScon 2025 </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 55</strong>: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.</p>

<p>We also revisit the ProPublica bombshell about Microsoft&#39;s &quot;digital escorts&quot; and U.S. government data exposure to Chinese adversaries and the company&#39;s &quot;oops, we will stop&quot; response. Plus, trusting Google&#39;s Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1G_OoBEvmZiGCO-FUMr9dr87X5g80K7fHPda6QY_avQQ/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="TBP at Countermeasures 2025" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">TBP at Countermeasures 2025</a></li><li><a title="CODE WHITE GmbH ToolShell exploit" rel="nofollow" href="https://infosec.exchange/@codewhitesec/114851715379861407">CODE WHITE GmbH ToolShell exploit</a></li><li><a title="Microsoft guidance for SharePoint vulnerability CVE-2025-53770" rel="nofollow" href="https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/">Microsoft guidance for SharePoint vulnerability CVE-2025-53770</a></li><li><a title="Kaspersky on ToolShell: A story of five Sharepoint vulns" rel="nofollow" href="https://securelist.com/toolshell-explained/117045/">Kaspersky on ToolShell: A story of five Sharepoint vulns</a></li><li><a title="Ryan&#39;s EkoParty keynote on Microsoft culture" rel="nofollow" href="https://x.com/juanandres_gs/status/1587794147448016896">Ryan's EkoParty keynote on Microsoft culture</a></li><li><a title="Microsoft Disrupting active exploitation of on-prem SharePoint flaws" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/">Microsoft Disrupting active exploitation of on-prem SharePoint flaws</a></li><li><a title="SentinelLabs on Sharepoint zero-day in-the-wild" rel="nofollow" href="https://www.sentinelone.com/blog/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/">SentinelLabs on Sharepoint zero-day in-the-wild</a></li><li><a title="ESET on ToolShell: An all-you-can-eat buffet for threat actors" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/toolshell-an-all-you-can-eat-buffet-for-threat-actors/">ESET on ToolShell: An all-you-can-eat buffet for threat actors</a></li><li><a title="Microsoft Stops Using China-Based Engineers for DoD Computer Systems" rel="nofollow" href="https://www.propublica.org/article/defense-department-pentagon-microsoft-digital-escort-china">Microsoft Stops Using China-Based Engineers for DoD Computer Systems</a></li><li><a title="AI coding platform goes rogue during code freeze and deletes entire company database" rel="nofollow" href="https://www.tomshardware.com/tech-industry/artificial-intelligence/ai-coding-platform-goes-rogue-during-code-freeze-and-deletes-entire-company-database-replit-ceo-apologizes-after-ai-engine-says-it-made-a-catastrophic-error-in-judgment-and-destroyed-all-production-data">AI coding platform goes rogue during code freeze and deletes entire company database</a></li><li><a title="Jason Lemkin: Replit goes rogue" rel="nofollow" href="https://x.com/jasonlk/status/1946069562723897802">Jason Lemkin: Replit goes rogue</a></li><li><a title="John Hultquist on Big Dream AI" rel="nofollow" href="https://x.com/JohnHultquist/status/1947309146581119369">John Hultquist on Big Dream AI</a></li><li><a title="LABScon 2025 " rel="nofollow" href="https://www.labscon.io/">LABScon 2025 </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+4cjHXs4i</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+4cjHXs4i" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’</title>
      <link>http://securityconversations.fireside.fm/train-brakes-gru-sanctions-wagner-telegram-digital-escorts</link>
      <guid isPermaLink="false">c52fc482-8ee7-498e-adeb-8e3584f74824</guid>
      <pubDate>Fri, 18 Jul 2025 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c52fc482-8ee7-498e-adeb-8e3584f74824.mp3" length="86833367" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.

Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:48:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c52fc482-8ee7-498e-adeb-8e3584f74824/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 54</strong>:  Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.</p>

<p>Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Russia, NoName057(16), LABScon, UK sanctions, GRU, Wagner, ICC, railroad, trains, ICS, AI, OpenAI, Microsoft, China</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 54</strong>:  Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.</p>

<p>Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1GBR7FpP8x6DamPjUA_YKRT1QJ3PeH5K_lFwib1XmeA0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Europol targets NoName057(16) pro-Russian cybercrime network" rel="nofollow" href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network">Europol targets NoName057(16) pro-Russian cybercrime network</a></li><li><a title="Europe&#39;s most wanted list" rel="nofollow" href="https://eumostwanted.eu/">Europe's most wanted list</a></li><li><a title="UK sanctions Russian spies linked to Mariupol strikes" rel="nofollow" href="https://www.politico.eu/article/uk-sanctions-russian-spies-mariupol-strikes/">UK sanctions Russian spies linked to Mariupol strikes</a></li><li><a title="Profile: GRU cyber and hybrid threat operations" rel="nofollow" href="https://www.gov.uk/government/publications/profile-gru-cyber-and-hybrid-threat-operations">Profile: GRU cyber and hybrid threat operations</a></li><li><a title="Lindsay Freeman: War Crimes for Fun and Profit" rel="nofollow" href="https://www.lawfaremedia.org/article/war-crimes-for-fun-and-profit">Lindsay Freeman: War Crimes for Fun and Profit</a></li><li><a title="Lindsay Freeman bio" rel="nofollow" href="https://www.lawfaremedia.org/contributors/lfreeman">Lindsay Freeman bio</a></li><li><a title="CISA: End-of-Train and Head-of-Train Remote Linking Protocol" rel="nofollow" href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10">CISA: End-of-Train and Head-of-Train Remote Linking Protocol</a></li><li><a title="Background of train vulnerability (CVE-2025-1727)" rel="nofollow" href="https://x.com/midwestneil/status/1943708133421101446">Background of train vulnerability (CVE-2025-1727)</a></li><li><a title="ProPublica on Microsoft “Digital Escorts”" rel="nofollow" href="https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers">ProPublica on Microsoft “Digital Escorts”</a></li><li><a title="Google’s Big Sleep AI bug-finding claims" rel="nofollow" href="https://blog.google/technology/safety-security/cybersecurity-updates-summer-2025/">Google’s Big Sleep AI bug-finding claims</a></li><li><a title="EchoLeak (CVE-2025-32711)" rel="nofollow" href="https://www.trendmicro.com/en_us/research/25/g/preventing-zero-click-ai-threats-insights-from-echoleak.html">EchoLeak (CVE-2025-32711)</a></li><li><a title="Russian vodka producer reports disruptions after ransomware attack" rel="nofollow" href="https://therecord.media/novabev-russia-vodka-maker-ransomware-attack">Russian vodka producer reports disruptions after ransomware attack</a></li><li><a title="Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer" rel="nofollow" href="https://prm.ua/en/ukrainian-hackers-destroyed-the-it-infrastructure-of-a-russian-drone-manufacturer-what-is-known/">Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer</a></li><li><a title="Another exploited Google Chrome zero-day" rel="nofollow" href="https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html">Another exploited Google Chrome zero-day</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 54</strong>:  Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on  Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.</p>

<p>Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1GBR7FpP8x6DamPjUA_YKRT1QJ3PeH5K_lFwib1XmeA0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Europol targets NoName057(16) pro-Russian cybercrime network" rel="nofollow" href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network">Europol targets NoName057(16) pro-Russian cybercrime network</a></li><li><a title="Europe&#39;s most wanted list" rel="nofollow" href="https://eumostwanted.eu/">Europe's most wanted list</a></li><li><a title="UK sanctions Russian spies linked to Mariupol strikes" rel="nofollow" href="https://www.politico.eu/article/uk-sanctions-russian-spies-mariupol-strikes/">UK sanctions Russian spies linked to Mariupol strikes</a></li><li><a title="Profile: GRU cyber and hybrid threat operations" rel="nofollow" href="https://www.gov.uk/government/publications/profile-gru-cyber-and-hybrid-threat-operations">Profile: GRU cyber and hybrid threat operations</a></li><li><a title="Lindsay Freeman: War Crimes for Fun and Profit" rel="nofollow" href="https://www.lawfaremedia.org/article/war-crimes-for-fun-and-profit">Lindsay Freeman: War Crimes for Fun and Profit</a></li><li><a title="Lindsay Freeman bio" rel="nofollow" href="https://www.lawfaremedia.org/contributors/lfreeman">Lindsay Freeman bio</a></li><li><a title="CISA: End-of-Train and Head-of-Train Remote Linking Protocol" rel="nofollow" href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10">CISA: End-of-Train and Head-of-Train Remote Linking Protocol</a></li><li><a title="Background of train vulnerability (CVE-2025-1727)" rel="nofollow" href="https://x.com/midwestneil/status/1943708133421101446">Background of train vulnerability (CVE-2025-1727)</a></li><li><a title="ProPublica on Microsoft “Digital Escorts”" rel="nofollow" href="https://www.propublica.org/article/microsoft-digital-escorts-pentagon-defense-department-china-hackers">ProPublica on Microsoft “Digital Escorts”</a></li><li><a title="Google’s Big Sleep AI bug-finding claims" rel="nofollow" href="https://blog.google/technology/safety-security/cybersecurity-updates-summer-2025/">Google’s Big Sleep AI bug-finding claims</a></li><li><a title="EchoLeak (CVE-2025-32711)" rel="nofollow" href="https://www.trendmicro.com/en_us/research/25/g/preventing-zero-click-ai-threats-insights-from-echoleak.html">EchoLeak (CVE-2025-32711)</a></li><li><a title="Russian vodka producer reports disruptions after ransomware attack" rel="nofollow" href="https://therecord.media/novabev-russia-vodka-maker-ransomware-attack">Russian vodka producer reports disruptions after ransomware attack</a></li><li><a title="Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer" rel="nofollow" href="https://prm.ua/en/ukrainian-hackers-destroyed-the-it-infrastructure-of-a-russian-drone-manufacturer-what-is-known/">Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer</a></li><li><a title="Another exploited Google Chrome zero-day" rel="nofollow" href="https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html">Another exploited Google Chrome zero-day</a></li><li><a title="Three Buddy Problem LIVE at Black Hat" rel="nofollow" href="https://lu.ma/e2ys3k72">Three Buddy Problem LIVE at Black Hat</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+N_lYyu2r</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+N_lYyu2r" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>How did China get Microsoft's zero-day exploits?</title>
      <link>http://securityconversations.fireside.fm/hafnium-hacker-arrested-china-microsoft-zerodays</link>
      <guid isPermaLink="false">05ea91d2-dd79-43f9-a534-4b641cacfe9b</guid>
      <pubDate>Thu, 10 Jul 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/05ea91d2-dd79-43f9-a534-4b641cacfe9b.mp3" length="88964480" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 53:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister? 

Plus, China's massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:49:05</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/05ea91d2-dd79-43f9-a534-4b641cacfe9b/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 53</strong>:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?</p>

<p>Plus, China&#39;s massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Russia, China, Ukraine, HAFNIUM, Microsoft, Zero-day, Orange Tsai, drones, thecom, ransomware, Exchange</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 53</strong>:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?</p>

<p>Plus, China&#39;s massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1XBzJY0yzS-1jzb7u4TIq0SKkGFCYalbYS15LdYX7a3o/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title=" US Gov: Prolific Chinese state-sponsored contract hacker arrested" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-arrest-prolific-chinese-state-sponsored-contract-hacker"> US Gov: Prolific Chinese state-sponsored contract hacker arrested</a></li><li><a title="Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits</a></li><li><a title="Microsoft Exchange Server Attack Timeline" rel="nofollow" href="https://unit42.paloaltonetworks.com/microsoft-exchange-server-attack-timeline/">Microsoft Exchange Server Attack Timeline</a></li><li><a title="YouTube: Orange Tsai on ProxyLogon" rel="nofollow" href="https://www.youtube.com/watch?v=5mqid-7zp8k&amp;ab_channel=DEFCONConference">YouTube: Orange Tsai on ProxyLogon</a></li><li><a title="Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/">Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace</a></li><li><a title="The Growing Role of Cyber Militias in China’s Network Warfare Force Structure" rel="nofollow" href="https://margin.re/mobilizing-cyber-power-the-growing-role-of-cyber-militias-in-chinas-network-warfare-force-structure-2/">The Growing Role of Cyber Militias in China’s Network Warfare Force Structure</a></li><li><a title="NCA arrest four for attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://www.nationalcrimeagency.gov.uk/news/retail-cyber-attacks-nca-arrest-four-for-attacks-on-m-s-co-op-and-harrods">NCA arrest four for attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op">Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Batavia spyware targeting Russian organizations" rel="nofollow" href="https://securelist.com/batavia-spyware-steals-data-from-russian-organizations/116866/">Batavia spyware targeting Russian organizations</a></li><li><a title="Chainalysis: First-ever crypto seizure in Greece" rel="nofollow" href="https://www.chainalysis.com/blog/greece-first-ever-crypto-seizure-bybit-hack-2025/">Chainalysis: First-ever crypto seizure in Greece</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a> &mdash; Three Buddy Problem discount code for training: CM25-3BUDDY</li><li><a title="LABScon 2025" rel="nofollow" href="https://labscon.io">LABScon 2025</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 53</strong>:  We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?</p>

<p>Plus, China&#39;s massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1XBzJY0yzS-1jzb7u4TIq0SKkGFCYalbYS15LdYX7a3o/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title=" US Gov: Prolific Chinese state-sponsored contract hacker arrested" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-announces-arrest-prolific-chinese-state-sponsored-contract-hacker"> US Gov: Prolific Chinese state-sponsored contract hacker arrested</a></li><li><a title="Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits</a></li><li><a title="Microsoft Exchange Server Attack Timeline" rel="nofollow" href="https://unit42.paloaltonetworks.com/microsoft-exchange-server-attack-timeline/">Microsoft Exchange Server Attack Timeline</a></li><li><a title="YouTube: Orange Tsai on ProxyLogon" rel="nofollow" href="https://www.youtube.com/watch?v=5mqid-7zp8k&amp;ab_channel=DEFCONConference">YouTube: Orange Tsai on ProxyLogon</a></li><li><a title="Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/">Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace</a></li><li><a title="The Growing Role of Cyber Militias in China’s Network Warfare Force Structure" rel="nofollow" href="https://margin.re/mobilizing-cyber-power-the-growing-role-of-cyber-militias-in-chinas-network-warfare-force-structure-2/">The Growing Role of Cyber Militias in China’s Network Warfare Force Structure</a></li><li><a title="NCA arrest four for attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://www.nationalcrimeagency.gov.uk/news/retail-cyber-attacks-nca-arrest-four-for-attacks-on-m-s-co-op-and-harrods">NCA arrest four for attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods" rel="nofollow" href="https://therecord.media/uk-arrests-four-ransomware-ms-harrods-co-op">Four arrested by UK police over ransomware attacks on M&amp;S, Co-op and Harrods</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war" rel="nofollow" href="https://therecord.media/cyberattack-russia-firmware-blow-hackers">Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war</a></li><li><a title="Batavia spyware targeting Russian organizations" rel="nofollow" href="https://securelist.com/batavia-spyware-steals-data-from-russian-organizations/116866/">Batavia spyware targeting Russian organizations</a></li><li><a title="Chainalysis: First-ever crypto seizure in Greece" rel="nofollow" href="https://www.chainalysis.com/blog/greece-first-ever-crypto-seizure-bybit-hack-2025/">Chainalysis: First-ever crypto seizure in Greece</a></li><li><a title="Ringzer0 COUNTERMEASURE" rel="nofollow" href="https://ringzer0.training/countermeasure25/">Ringzer0 COUNTERMEASURE</a> &mdash; Three Buddy Problem discount code for training: CM25-3BUDDY</li><li><a title="LABScon 2025" rel="nofollow" href="https://labscon.io">LABScon 2025</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Te1vURM2</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Te1vURM2" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT</title>
      <link>http://securityconversations.fireside.fm/whos-hacking-who-ivanti-0days-france-night-eagle</link>
      <guid isPermaLink="false">b604bf91-d5a1-45a7-bd2e-223ecfeee15b</guid>
      <pubDate>Thu, 03 Jul 2025 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b604bf91-d5a1-45a7-bd2e-223ecfeee15b.mp3" length="77845642" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 52:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.

Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:34:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b604bf91-d5a1-45a7-bd2e-223ecfeee15b/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>France, ANSSI, Houken, Ivanti, zero-day, North Korea, fake IT workers, Scattered Spider, Chrome, Google, Salt Typhoon, Nobitex, Israel, Iran</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19xE1kF3peywdmaH9j5xEdCvLmspni0s6p68KY1laYhg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Houken: Seeking a path by living on the edge with zero-days" rel="nofollow" href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf">Houken: Seeking a path by living on the edge with zero-days</a></li><li><a title="China-nexus APTs recon on top-tier targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus APTs recon on top-tier targets</a></li><li><a title="French cybersecurity agency confirms government affected by Ivanti hacks" rel="nofollow" href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited">French cybersecurity agency confirms government affected by Ivanti hacks</a></li><li><a title="Top FBI cyber official: Salt Typhoon ‘largely contained’" rel="nofollow" href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/">Top FBI cyber official: Salt Typhoon ‘largely contained’</a></li><li><a title="Operation Blockbuster (Novetta)" rel="nofollow" href="https://www.usna.edu/CyberCenter/_files/documents/Operation-Blockbuster-Report.pdf">Operation Blockbuster (Novetta)</a></li><li><a title=" Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://www.youtube.com/watch?v=MKKzHseTUUQ&amp;t=5007s&amp;ab_channel=ThreeBuddyProblem"> Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure" rel="nofollow" href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure</a></li><li><a title="cisagov/thorium" rel="nofollow" href="https://github.com/cisagov/thorium">cisagov/thorium</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 52</strong>:  Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days (&#39;Houken&#39;), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American &#39;Night Eagle&#39; threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.</p>

<p>Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19xE1kF3peywdmaH9j5xEdCvLmspni0s6p68KY1laYhg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Houken: Seeking a path by living on the edge with zero-days" rel="nofollow" href="https://www.cert.ssi.gouv.fr/uploads/CERTFR-2025-CTI-009.pdf">Houken: Seeking a path by living on the edge with zero-days</a></li><li><a title="China-nexus APTs recon on top-tier targets" rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus APTs recon on top-tier targets</a></li><li><a title="French cybersecurity agency confirms government affected by Ivanti hacks" rel="nofollow" href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited">French cybersecurity agency confirms government affected by Ivanti hacks</a></li><li><a title="Top FBI cyber official: Salt Typhoon ‘largely contained’" rel="nofollow" href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/">Top FBI cyber official: Salt Typhoon ‘largely contained’</a></li><li><a title="Operation Blockbuster (Novetta)" rel="nofollow" href="https://www.usna.edu/CyberCenter/_files/documents/Operation-Blockbuster-Report.pdf">Operation Blockbuster (Novetta)</a></li><li><a title=" Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks" rel="nofollow" href="https://www.youtube.com/watch?v=MKKzHseTUUQ&amp;t=5007s&amp;ab_channel=ThreeBuddyProblem"> Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks</a></li><li><a title="Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure" rel="nofollow" href="https://www.trmlabs.com/resources/blog/inside-the-nobitex-breach-what-the-leaked-source-code-reveals-about-irans-crypto-infrastructure">Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure</a></li><li><a title="cisagov/thorium" rel="nofollow" href="https://github.com/cisagov/thorium">cisagov/thorium</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+qvM9C2xC</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+qvM9C2xC" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks</title>
      <link>http://securityconversations.fireside.fm/cyberwar-and-vanishing-bitcoins</link>
      <guid isPermaLink="false">01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68</guid>
      <pubDate>Fri, 20 Jun 2025 02:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68.mp3" length="144334262" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.

Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.

Cast: Hamid Kashfi, Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine. </itunes:subtitle>
      <itunes:duration>3:07:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/01c3eb2d-69d5-4ea4-bc65-8a356a4f2b68/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Iran, Israel, Bitcoin, Predatory Sparrow, Bitcoin, Novitex, nuclear, Stuxnet, drone swarms, autonomous warfare</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1yKeeXGR_b7gfGWwIVv_dV5RmIFCrYAZQs5BUMClyFtU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Pro-Israel hackers take credit for cyberattack on Iran&#39;s Bank Sepah" rel="nofollow" href="https://www.axios.com/2025/06/17/iran-bank-sepah-cyberattack-israel">Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah</a></li><li><a title="Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War" rel="nofollow" href="https://www.securityweek.com/predatory-sparrow-burns-90-million-on-iranian-crypto-exchange-in-cyber-shadow-war/">Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War</a></li><li><a title="Codebreakers and Predatory Sparrow" rel="nofollow" href="https://x.com/hkashfi/status/1934898014658654226?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Codebreakers and Predatory Sparrow</a></li><li><a title="Iranian Exchange Nobitex: The $90M Exploit" rel="nofollow" href="https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/">Iranian Exchange Nobitex: The $90M Exploit</a></li><li><a title="Iranian newspaper: Defense system was hacked" rel="nofollow" href="https://www.iranintl.com/fa/202506150578">Iranian newspaper: Defense system was hacked</a></li><li><a title="Iranian state TV shows footage of Israeli drone" rel="nofollow" href="https://www.cnn.com/2025/06/18/world/video/iran-state-tv-israel-drone-ldn-digvid">Iranian state TV shows footage of Israeli drone</a></li><li><a title="Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks</a></li><li><a title="Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy" rel="nofollow" href="https://archive.ph/cCMt9">Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Three Buddy Problem LIVE" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem LIVE</a></li><li><a title="Hamid Kashfi: The curious case of Predatory Sparrow" rel="nofollow" href="https://www.darkcell.se/sparrows">Hamid Kashfi: The curious case of Predatory Sparrow</a></li><li><a title="Glasshouse episode with Hamid Kashfi" rel="nofollow" href="https://www.youtube.com/watch?v=z05lKD0R5jo&amp;ab_channel=TheGlasshouseCenter">Glasshouse episode with Hamid Kashfi</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 51</strong>: Former Immunity/Trail of Bits researcher Hamid Kashfi  joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who &#39;Predatory Sparrow&#39; is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.</p>

<p>Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/hkashfi" rel="nofollow">Hamid Kashfi</a>,  <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1yKeeXGR_b7gfGWwIVv_dV5RmIFCrYAZQs5BUMClyFtU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Pro-Israel hackers take credit for cyberattack on Iran&#39;s Bank Sepah" rel="nofollow" href="https://www.axios.com/2025/06/17/iran-bank-sepah-cyberattack-israel">Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah</a></li><li><a title="Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War" rel="nofollow" href="https://www.securityweek.com/predatory-sparrow-burns-90-million-on-iranian-crypto-exchange-in-cyber-shadow-war/">Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War</a></li><li><a title="Codebreakers and Predatory Sparrow" rel="nofollow" href="https://x.com/hkashfi/status/1934898014658654226?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Codebreakers and Predatory Sparrow</a></li><li><a title="Iranian Exchange Nobitex: The $90M Exploit" rel="nofollow" href="https://www.chainalysis.com/blog/nobitex-iranian-exchange-exploit-june-2025/">Iranian Exchange Nobitex: The $90M Exploit</a></li><li><a title="Iranian newspaper: Defense system was hacked" rel="nofollow" href="https://www.iranintl.com/fa/202506150578">Iranian newspaper: Defense system was hacked</a></li><li><a title="Iranian state TV shows footage of Israeli drone" rel="nofollow" href="https://www.cnn.com/2025/06/18/world/video/iran-state-tv-israel-drone-ldn-digvid">Iranian state TV shows footage of Israeli drone</a></li><li><a title="Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/unc1860-iran-middle-eastern-networks">Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks</a></li><li><a title="Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy" rel="nofollow" href="https://archive.ph/cCMt9">Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Three Buddy Problem LIVE" rel="nofollow" href="https://ringzer0.training/countermeasure25-three-buddy-problem-live/">Three Buddy Problem LIVE</a></li><li><a title="Hamid Kashfi: The curious case of Predatory Sparrow" rel="nofollow" href="https://www.darkcell.se/sparrows">Hamid Kashfi: The curious case of Predatory Sparrow</a></li><li><a title="Glasshouse episode with Hamid Kashfi" rel="nofollow" href="https://www.youtube.com/watch?v=z05lKD0R5jo&amp;ab_channel=TheGlasshouseCenter">Glasshouse episode with Hamid Kashfi</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+FiEaTApw</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+FiEaTApw" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms</title>
      <link>http://securityconversations.fireside.fm/israel-iran-war-magnet-of-threats-drone-swarms</link>
      <guid isPermaLink="false">f5778cef-4751-4110-b0ec-6d82e3b4b504</guid>
      <pubDate>Fri, 13 Jun 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f5778cef-4751-4110-b0ec-6d82e3b4b504.mp3" length="81069877" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.

Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:51:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f5778cef-4751-4110-b0ec-6d82e3b4b504/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 50</strong>: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel&#39;s Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.</p>

<p>Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Iran, Israel, Russia, Ukraine, nuclear, Stuxnet, drone swarms, autonomous warfare, magnet of threats, zero-day, SentinelOne</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 50</strong>: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel&#39;s Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.</p>

<p>Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1tbYrbhOmz1LKRzB1TBkoRds50jCwZRGHMsMBnwTl3nc/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Israel-Iran war breaks out" rel="nofollow" href="https://www.bbc.com/news/live/c93ydeqyq71t">Israel-Iran war breaks out</a></li><li><a title="&#39;The magnet of threats&#39;" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/spy-wars-how-nation-state-backed-threat-actors-steal-from-and-copy-each-other">'The magnet of threats'</a></li><li><a title="Mossad set up drone swarm base in Iran " rel="nofollow" href="https://www.timesofisrael.com/liveblog_entry/mossad-set-up-a-drone-base-in-iran-uavs-were-activated-overnight-to-strike-surface-to-surface-missile-launchers-aimed-at-israel/">Mossad set up drone swarm base in Iran </a></li><li><a title="Stealth Falcon&#39;s Exploit of Microsoft Zero Day " rel="nofollow" href="https://research.checkpoint.com/2025/stealth-falcon-zero-day/">Stealth Falcon's Exploit of Microsoft Zero Day </a></li><li><a title="CVE-2025-33053 - WebDAV remote code execution" rel="nofollow" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053">CVE-2025-33053 - WebDAV remote code execution</a></li><li><a title="CISA, Microsoft warn of Windows zero-day " rel="nofollow" href="https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org">CISA, Microsoft warn of Windows zero-day </a></li><li><a title="China-nexus Threat actors target SentinelOne  " rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus Threat actors target SentinelOne  </a></li><li><a title="Chinese Espionage Crews Circle SentinelOne" rel="nofollow" href="https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/">Chinese Espionage Crews Circle SentinelOne</a></li><li><a title="Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab" rel="nofollow" href="https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/">Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab</a></li><li><a title="Meta and Yandex are de-anonymizing Android users’ web browsing identifiers" rel="nofollow" href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/">Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</a></li><li><a title="Dreadnode Offensive AI Conference" rel="nofollow" href="https://www.offensiveaicon.com/">Dreadnode Offensive AI Conference</a></li><li><a title="LABScon Call for Papers" rel="nofollow" href="https://www.labscon.io/cfp/">LABScon Call for Papers</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 50</strong>: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel&#39;s Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.</p>

<p>Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1tbYrbhOmz1LKRzB1TBkoRds50jCwZRGHMsMBnwTl3nc/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Israel-Iran war breaks out" rel="nofollow" href="https://www.bbc.com/news/live/c93ydeqyq71t">Israel-Iran war breaks out</a></li><li><a title="&#39;The magnet of threats&#39;" rel="nofollow" href="https://www.kaspersky.com/about/press-releases/spy-wars-how-nation-state-backed-threat-actors-steal-from-and-copy-each-other">'The magnet of threats'</a></li><li><a title="Mossad set up drone swarm base in Iran " rel="nofollow" href="https://www.timesofisrael.com/liveblog_entry/mossad-set-up-a-drone-base-in-iran-uavs-were-activated-overnight-to-strike-surface-to-surface-missile-launchers-aimed-at-israel/">Mossad set up drone swarm base in Iran </a></li><li><a title="Stealth Falcon&#39;s Exploit of Microsoft Zero Day " rel="nofollow" href="https://research.checkpoint.com/2025/stealth-falcon-zero-day/">Stealth Falcon's Exploit of Microsoft Zero Day </a></li><li><a title="CVE-2025-33053 - WebDAV remote code execution" rel="nofollow" href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053">CVE-2025-33053 - WebDAV remote code execution</a></li><li><a title="CISA, Microsoft warn of Windows zero-day " rel="nofollow" href="https://therecord.media/microsoft-cisa-zero-day-turkish-defense-org">CISA, Microsoft warn of Windows zero-day </a></li><li><a title="China-nexus Threat actors target SentinelOne  " rel="nofollow" href="https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/">China-nexus Threat actors target SentinelOne  </a></li><li><a title="Chinese Espionage Crews Circle SentinelOne" rel="nofollow" href="https://www.securityweek.com/chinese-espionage-crews-circle-sentinelone-in-year-long-reconnaissance-campaign/">Chinese Espionage Crews Circle SentinelOne</a></li><li><a title="Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab" rel="nofollow" href="https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/">Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab</a></li><li><a title="Meta and Yandex are de-anonymizing Android users’ web browsing identifiers" rel="nofollow" href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/">Meta and Yandex are de-anonymizing Android users’ web browsing identifiers</a></li><li><a title="Dreadnode Offensive AI Conference" rel="nofollow" href="https://www.offensiveaicon.com/">Dreadnode Offensive AI Conference</a></li><li><a title="LABScon Call for Papers" rel="nofollow" href="https://www.labscon.io/cfp/">LABScon Call for Papers</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+_2t8OTJ6</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+_2t8OTJ6" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Mikko Hypponen talks drone warfare, APT naming schemes</title>
      <link>http://securityconversations.fireside.fm/mikko-hypponen-talks-drone-warfare-apt-naming</link>
      <guid isPermaLink="false">bb8df579-ce5b-4644-9e58-c03a46a5b736</guid>
      <pubDate>Fri, 06 Jun 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/bb8df579-ce5b-4644-9e58-c03a46a5b736.mp3" length="72656095" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 49: Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”.

Plus, news on Ukraine’s hack of bomber-maker Tupolev, the industry’s never-ending APT naming mess, iVerify’s newly disclosed iMessage zero-click bug, fresh Qualcomm GPU exploits still unpatched on Android devices, and Cellebrite’s purchase of Corellium.  

Cast: Costin Raiu, Ryan Naraine and Mikko Hypponen.

* Juan Andres Guerrero-Saade is out this week at Sleuthcon.</itunes:subtitle>
      <itunes:duration>1:29:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/bb8df579-ce5b-4644-9e58-c03a46a5b736/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 49</strong>:  Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”.</p>

<p>Plus, news on Ukraine’s hack of bomber-maker Tupolev, the industry’s never-ending APT naming mess, iVerify’s newly disclosed iMessage zero-click bug, fresh Qualcomm GPU exploits still unpatched on Android devices, and Cellebrite’s purchase of Corellium.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://x.com/mikko" rel="nofollow">Mikko Hypponen</a></p>

<ul>
<li>Juan Andres Guerrero-Saade is out this week at Sleuthcon.</li>
</ul>]]>
      </description>
      <itunes:keywords>Russia, Ukraine, drones, autonomous warfare, Microsoft, CrowdStrike, Google, Mikko Hypponen,  Sensofusion, malware names</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 49</strong>:  Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”.</p>

<p>Plus, news on Ukraine’s hack of bomber-maker Tupolev, the industry’s never-ending APT naming mess, iVerify’s newly disclosed iMessage zero-click bug, fresh Qualcomm GPU exploits still unpatched on Android devices, and Cellebrite’s purchase of Corellium.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://x.com/mikko" rel="nofollow">Mikko Hypponen</a></p>

<ul>
<li>Juan Andres Guerrero-Saade is out this week at Sleuthcon.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/12-laS3yVtXJhfnR4V-qtjbhUpYdZcTZM5PQ5fdWMPsM/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Mikko Hyppönen pivots from infosec to drones inspired by war" rel="nofollow" href="https://www.theregister.com/2025/06/04/mikko_hypponen_drone/">Mikko Hyppönen pivots from infosec to drones inspired by war</a></li><li><a title="Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones" rel="nofollow" href="https://www.securityweek.com/mikko-hypponen-joins-anti-drone-company-sensofusion/">Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones</a></li><li><a title="Anti-drone system | Sensofusion" rel="nofollow" href="https://sensofusion.com/">Anti-drone system | Sensofusion</a></li><li><a title="Ukraine&#39;s military intelligence claims cyberattack on Russian strategic bomber maker" rel="nofollow" href="https://therecord.media/ukraine-military-russia-strategic-bomber">Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker</a></li><li><a title="How Microsoft names threat actors" rel="nofollow" href="https://learn.microsoft.com/en-us/unified-secops-platform/microsoft-threat-actor-naming">How Microsoft names threat actors</a></li><li><a title="CrowdStrike and Microsoft Unite to Deconflict Cyber Threat Attribution" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/crowdstrike-and-microsoft-unite-to-deconflict-cyber-threat-attribution/">CrowdStrike and Microsoft Unite to Deconflict Cyber Threat Attribution</a></li><li><a title="Qualcomm GPU driver 0days (exploitation detected)" rel="nofollow" href="https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html">Qualcomm GPU driver 0days (exploitation detected)</a></li><li><a title="Chrome 0day exploited in the wild" rel="nofollow" href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html">Chrome 0day exploited in the wild</a></li><li><a title="iVerify documents &#39;Nickname&#39; iMessage exploitation" rel="nofollow" href="https://welcome.iverify.io/hubfs/iVerify-Nickname-Vulnerability-Report.pdf">iVerify documents 'Nickname' iMessage exploitation</a></li><li><a title="Cellebrite to acquire mobile testing firm Corellium" rel="nofollow" href="https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/">Cellebrite to acquire mobile testing firm Corellium</a></li><li><a title="Hacker Chris Wade reveals the story of his presidential pardon, US government collaboration" rel="nofollow" href="https://www.semafor.com/article/01/10/2025/citizen-wade-the-life-of-a-legendary-hacker-to-receive-a-rare-presidential-pardon">Hacker Chris Wade reveals the story of his presidential pardon, US government collaboration</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 49</strong>:  Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”.</p>

<p>Plus, news on Ukraine’s hack of bomber-maker Tupolev, the industry’s never-ending APT naming mess, iVerify’s newly disclosed iMessage zero-click bug, fresh Qualcomm GPU exploits still unpatched on Android devices, and Cellebrite’s purchase of Corellium.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://x.com/mikko" rel="nofollow">Mikko Hypponen</a></p>

<ul>
<li>Juan Andres Guerrero-Saade is out this week at Sleuthcon.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/12-laS3yVtXJhfnR4V-qtjbhUpYdZcTZM5PQ5fdWMPsM/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Mikko Hyppönen pivots from infosec to drones inspired by war" rel="nofollow" href="https://www.theregister.com/2025/06/04/mikko_hypponen_drone/">Mikko Hyppönen pivots from infosec to drones inspired by war</a></li><li><a title="Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones" rel="nofollow" href="https://www.securityweek.com/mikko-hypponen-joins-anti-drone-company-sensofusion/">Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones</a></li><li><a title="Anti-drone system | Sensofusion" rel="nofollow" href="https://sensofusion.com/">Anti-drone system | Sensofusion</a></li><li><a title="Ukraine&#39;s military intelligence claims cyberattack on Russian strategic bomber maker" rel="nofollow" href="https://therecord.media/ukraine-military-russia-strategic-bomber">Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker</a></li><li><a title="How Microsoft names threat actors" rel="nofollow" href="https://learn.microsoft.com/en-us/unified-secops-platform/microsoft-threat-actor-naming">How Microsoft names threat actors</a></li><li><a title="CrowdStrike and Microsoft Unite to Deconflict Cyber Threat Attribution" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/crowdstrike-and-microsoft-unite-to-deconflict-cyber-threat-attribution/">CrowdStrike and Microsoft Unite to Deconflict Cyber Threat Attribution</a></li><li><a title="Qualcomm GPU driver 0days (exploitation detected)" rel="nofollow" href="https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2025-bulletin.html">Qualcomm GPU driver 0days (exploitation detected)</a></li><li><a title="Chrome 0day exploited in the wild" rel="nofollow" href="https://chromereleases.googleblog.com/2025/06/stable-channel-update-for-desktop.html">Chrome 0day exploited in the wild</a></li><li><a title="iVerify documents &#39;Nickname&#39; iMessage exploitation" rel="nofollow" href="https://welcome.iverify.io/hubfs/iVerify-Nickname-Vulnerability-Report.pdf">iVerify documents 'Nickname' iMessage exploitation</a></li><li><a title="Cellebrite to acquire mobile testing firm Corellium" rel="nofollow" href="https://cyberscoop.com/cellebrite-correllium-acquisition-ios-android/">Cellebrite to acquire mobile testing firm Corellium</a></li><li><a title="Hacker Chris Wade reveals the story of his presidential pardon, US government collaboration" rel="nofollow" href="https://www.semafor.com/article/01/10/2025/citizen-wade-the-life-of-a-legendary-hacker-to-receive-a-rare-presidential-pardon">Hacker Chris Wade reveals the story of his presidential pardon, US government collaboration</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+O3n04Zme</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+O3n04Zme" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>The dark hole of 'friendlies' and Western APTs</title>
      <link>http://securityconversations.fireside.fm/western-on-western-apt-research-dark-hole</link>
      <guid isPermaLink="false">f98d445d-0600-4a4d-b800-332b7653b71e</guid>
      <pubDate>Fri, 30 May 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f98d445d-0600-4a4d-b800-332b7653b71e.mp3" length="103003832" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 48:  We unpack a Dutch intelligence agencies report on ‘Laundry Bear’ and Microsoft’s parallel ‘Void Blizzard’  write-up, finding major gaps and bemoaning the absence of IOCs. Plus, discussion on why threat-intel naming is so messy, how initial-access brokers are powering even nation-state break-ins, and whether customers (or vendors) are to blame for the confusion.

Plus, thoughts on an academic paper on the vanishing art of Western companies exposing Western (friendly) APT operations, debate whether stealth or self-censorship is to blame, and the long-tail effects on cyber paleontology.

We also dig into Sean Heelan’s proof that OpenAI’s new reasoning model can spot a Linux kernel 0-day and the implications for humans in the bug-hunting chain. 

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>2:11:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f98d445d-0600-4a4d-b800-332b7653b71e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 48</strong>: We unpack a Dutch intelligence agencies report on ‘Laundry Bear’ and Microsoft’s parallel ‘Void Blizzard’  write-up, finding major gaps and bemoaning the absence of IOCs. Plus, discussion on why threat-intel naming is so messy, how initial-access brokers are powering even nation-state break-ins, and whether customers (or vendors) are to blame for the confusion.</p>

<p>Plus, thoughts on an academic paper on the vanishing art of Western companies exposing Western (friendly) APT operations, debate whether stealth or self-censorship is to blame, and the long-tail effects on cyber paleontology.</p>

<p>We also dig into Sean Heelan’s proof that OpenAI’s new reasoning model can spot a Linux kernel 0-day and the implications for humans in the bug-hunting chain. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Netherlands, China, Russia, Laundry Bear, Void Blizzard, Microsoft, Triangulation, Equation, Stuxnet, Symantec, Duqu, Sean Heelan</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 48</strong>: We unpack a Dutch intelligence agencies report on ‘Laundry Bear’ and Microsoft’s parallel ‘Void Blizzard’  write-up, finding major gaps and bemoaning the absence of IOCs. Plus, discussion on why threat-intel naming is so messy, how initial-access brokers are powering even nation-state break-ins, and whether customers (or vendors) are to blame for the confusion.</p>

<p>Plus, thoughts on an academic paper on the vanishing art of Western companies exposing Western (friendly) APT operations, debate whether stealth or self-censorship is to blame, and the long-tail effects on cyber paleontology.</p>

<p>We also dig into Sean Heelan’s proof that OpenAI’s new reasoning model can spot a Linux kernel 0-day and the implications for humans in the bug-hunting chain. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1dw-7Zl4toiXBQ8nEWseDz82pk2Ss3NEXAUPsJ7CnDcU/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Dutch intelligence agency outs &#39;Laundry Bear&#39; Russian APT" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/05/27/onbekende-russische-groep-achter-hacks-nederlandse-doelen">Dutch intelligence agency outs 'Laundry Bear' Russian APT</a></li><li><a title="Russian gov hackers buying passwords from cybercriminals" rel="nofollow" href="https://www.securityweek.com/russian-government-hackers-caught-buying-passwords-from-cybercriminals/">Russian gov hackers buying passwords from cybercriminals</a></li><li><a title="Microsoft: Russian actor Void Blizzard targets critical sectors for espionage" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/05/27/new-russia-affiliated-actor-void-blizzard-targets-critical-sectors-for-espionage/">Microsoft: Russian actor Void Blizzard targets critical sectors for espionage</a></li><li><a title="Censys data on AyySSHush ASUS router botnet" rel="nofollow" href="https://censys.com/blog/tracking-ayysshush-a-newly-discovered-asus-router-botnet-campaign">Censys data on AyySSHush ASUS router botnet</a></li><li><a title="Czech Republic statement on Chinese hack" rel="nofollow" href="https://mzv.gov.cz/jnp/en/issues_and_press/press_releases/statement_by_the_government_of_the_czech.html">Czech Republic statement on Chinese hack</a></li><li><a title="Czech gov condemns Chinese hack on critical infrastructure" rel="nofollow" href="https://www.securityweek.com/czech-government-condemns-chinese-hack-on-critical-infrastructure/">Czech gov condemns Chinese hack on critical infrastructure</a></li><li><a title="NATO floats cybersecurity included in new spending target" rel="nofollow" href="https://archive.ph/M9EaX">NATO floats cybersecurity included in new spending target</a></li><li><a title="Mark your Google Calendar: APT41 innovative tactics" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics">Mark your Google Calendar: APT41 innovative tactics</a></li><li><a title="The rise of responsible behavior: Western commercial reports on Western cyber threat actors" rel="nofollow" href="https://www.tandfonline.com/doi/full/10.1080/13523260.2025.2498711">The rise of responsible behavior: Western commercial reports on Western cyber threat actors</a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="ASUS Botnet Tracker" rel="nofollow" href="https://lookerstudio.google.com/u/0/reporting/15a9fcb0-7ca3-4ba0-b5fc-a98904f32224/page/tEnnC">ASUS Botnet Tracker</a></li><li><a title="CISA: Logging Made Easy (LME)" rel="nofollow" href="https://github.com/cisagov/LME">CISA: Logging Made Easy (LME)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 48</strong>: We unpack a Dutch intelligence agencies report on ‘Laundry Bear’ and Microsoft’s parallel ‘Void Blizzard’  write-up, finding major gaps and bemoaning the absence of IOCs. Plus, discussion on why threat-intel naming is so messy, how initial-access brokers are powering even nation-state break-ins, and whether customers (or vendors) are to blame for the confusion.</p>

<p>Plus, thoughts on an academic paper on the vanishing art of Western companies exposing Western (friendly) APT operations, debate whether stealth or self-censorship is to blame, and the long-tail effects on cyber paleontology.</p>

<p>We also dig into Sean Heelan’s proof that OpenAI’s new reasoning model can spot a Linux kernel 0-day and the implications for humans in the bug-hunting chain. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1dw-7Zl4toiXBQ8nEWseDz82pk2Ss3NEXAUPsJ7CnDcU/edit?tab=t.0">Transcript (unedited, AI-generated)</a></li><li><a title="Dutch intelligence agency outs &#39;Laundry Bear&#39; Russian APT" rel="nofollow" href="https://www.defensie.nl/actueel/nieuws/2025/05/27/onbekende-russische-groep-achter-hacks-nederlandse-doelen">Dutch intelligence agency outs 'Laundry Bear' Russian APT</a></li><li><a title="Russian gov hackers buying passwords from cybercriminals" rel="nofollow" href="https://www.securityweek.com/russian-government-hackers-caught-buying-passwords-from-cybercriminals/">Russian gov hackers buying passwords from cybercriminals</a></li><li><a title="Microsoft: Russian actor Void Blizzard targets critical sectors for espionage" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/05/27/new-russia-affiliated-actor-void-blizzard-targets-critical-sectors-for-espionage/">Microsoft: Russian actor Void Blizzard targets critical sectors for espionage</a></li><li><a title="Censys data on AyySSHush ASUS router botnet" rel="nofollow" href="https://censys.com/blog/tracking-ayysshush-a-newly-discovered-asus-router-botnet-campaign">Censys data on AyySSHush ASUS router botnet</a></li><li><a title="Czech Republic statement on Chinese hack" rel="nofollow" href="https://mzv.gov.cz/jnp/en/issues_and_press/press_releases/statement_by_the_government_of_the_czech.html">Czech Republic statement on Chinese hack</a></li><li><a title="Czech gov condemns Chinese hack on critical infrastructure" rel="nofollow" href="https://www.securityweek.com/czech-government-condemns-chinese-hack-on-critical-infrastructure/">Czech gov condemns Chinese hack on critical infrastructure</a></li><li><a title="NATO floats cybersecurity included in new spending target" rel="nofollow" href="https://archive.ph/M9EaX">NATO floats cybersecurity included in new spending target</a></li><li><a title="Mark your Google Calendar: APT41 innovative tactics" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics">Mark your Google Calendar: APT41 innovative tactics</a></li><li><a title="The rise of responsible behavior: Western commercial reports on Western cyber threat actors" rel="nofollow" href="https://www.tandfonline.com/doi/full/10.1080/13523260.2025.2498711">The rise of responsible behavior: Western commercial reports on Western cyber threat actors</a></li><li><a title="How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation" rel="nofollow" href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</a></li><li><a title="ASUS Botnet Tracker" rel="nofollow" href="https://lookerstudio.google.com/u/0/reporting/15a9fcb0-7ca3-4ba0-b5fc-a98904f32224/page/tEnnC">ASUS Botnet Tracker</a></li><li><a title="CISA: Logging Made Easy (LME)" rel="nofollow" href="https://github.com/cisagov/LME">CISA: Logging Made Easy (LME)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+tjweabfS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+tjweabfS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate</title>
      <link>http://securityconversations.fireside.fm/russia-ukraine-badsuccessor-debate</link>
      <guid isPermaLink="false">c29a1c55-dabb-4e6c-849f-9ce8e38326ac</guid>
      <pubDate>Fri, 23 May 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c29a1c55-dabb-4e6c-849f-9ce8e38326ac.mp3" length="117693808" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 47:  We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.

The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. 

Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>2:30:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c29a1c55-dabb-4e6c-849f-9ce8e38326ac/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Russia, China, Ukraine, GRU, Fancy Bear, Sofacy, APT28, Akamai, Microsoft, responsible disclosure, Signal, Windows Recall, NSO, Japan, OpenAI, Privacy</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 47</strong>: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.</p>

<p>The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines. </p>

<p>Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LS6j5WB33HBmDELA1HTO9VWQaq-xtEmsdZdRvbrxBIE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian hackers hitting logistics companies supplying Ukraine" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">Russian hackers hitting logistics companies supplying Ukraine</a></li><li><a title="CISA says Russian hackers targeting Ukraine war supply lines" rel="nofollow" href="https://www.securityweek.com/cisa-says-russian-hackers-targeting-western-supply-lines-to-ukraine/">CISA says Russian hackers targeting Ukraine war supply lines</a></li><li><a title="ViciousTrap: Turning edge devices into honeypots" rel="nofollow" href="https://blog.sekoia.io/vicioustrap-infiltrate-control-lure-turning-edge-devices-into-honeypots-en-masse/">ViciousTrap: Turning edge devices into honeypots</a></li><li><a title="BadSuccessor: Abusing dMSA to escalate privileges in Active Directory" rel="nofollow" href="https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory">BadSuccessor: Abusing dMSA to escalate privileges in Active Directory</a></li><li><a title="Signal adds anti-screenshot to thwart Windows Recall" rel="nofollow" href="https://signal.org/blog/signal-doesnt-recall/">Signal adds anti-screenshot to thwart Windows Recall</a></li><li><a title="Controversial Windows Recall gets security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Controversial Windows Recall gets security makeover</a></li><li><a title="Microsoft&#39;s International Criminal Court blockade" rel="nofollow" href="https://www.techzine.eu/news/privacy-compliance/131536/microsofts-icc-blockade-digital-dependence-comes-at-a-cost/">Microsoft's International Criminal Court blockade</a></li><li><a title="Japan enacts active cyberdefense law" rel="nofollow" href="https://www.japantimes.co.jp/news/2025/05/16/japan/politics/cyber-bill-enactment/">Japan enacts active cyberdefense law</a></li><li><a title="UAE recruiting US personnel Displaced by DOGE" rel="nofollow" href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/">UAE recruiting US personnel Displaced by DOGE</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+zWztmBC3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+zWztmBC3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>A Coinbase breach with bribes, rogue contractors and a $20M ransom demand</title>
      <link>http://securityconversations.fireside.fm/coinbase-breach-ivanti-zero-days-android-intrusion-logging</link>
      <guid isPermaLink="false">e41fa5a7-38a9-4b9f-ab7a-ad6f9d00c2ad</guid>
      <pubDate>Fri, 16 May 2025 11:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e41fa5a7-38a9-4b9f-ab7a-ad6f9d00c2ad.mp3" length="101815632" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demands. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>2:23:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e41fa5a7-38a9-4b9f-ab7a-ad6f9d00c2ad/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 46</strong>:  We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new &#39;Intrusion Logging&#39; feature coming to Android, Apple&#39;s iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>Coinbase, ransomware, Ivanti, Fortinet, Sonicwall, zero-day, Microsoft, Intrusion Logging, Android, iOS, ENISA</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 46</strong>:  We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new &#39;Intrusion Logging&#39; feature coming to Android, Apple&#39;s iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18lG0HnPcDS4zsR7aVdhv6q5qnHBDF7wsbCkEuMU8iDc/edit?tab=t.0#heading=h.xoy008k76n3z">Transcript (unedited, AI-generated)</a></li><li><a title="Coinbase on $20m ransom demand" rel="nofollow" href="https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists">Coinbase on $20m ransom demand</a></li><li><a title="SEC filing on Coinbase breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/1679788/000167978825000094/coin-20250514.htm?7194ef805fa2d04b0f7e8c9521f97343">SEC filing on Coinbase breach</a></li><li><a title="Coinbase Rogue Contractors Bribed to Leak Customer Data" rel="nofollow" href="https://www.securityweek.com/coinbase-rejects-20m-ransom-after-rogue-contractors-bribed-to-leak-customer-data/">Coinbase Rogue Contractors Bribed to Leak Customer Data</a></li><li><a title="Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US&amp;_gl=1*nrofxr*_gcl_au*MjQ3MzY1MzY5LjE3NDcxOTkyODY">Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)</a></li><li><a title="Watchtowr blog on new Ivanti 0days" rel="nofollow" href="https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/">Watchtowr blog on new Ivanti 0days</a></li><li><a title="CISA Known Exploited Vulnerabilities (KEV)" rel="nofollow" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA Known Exploited Vulnerabilities (KEV)</a></li><li><a title="&#39;Advanced Protection&#39; comes to Android 16" rel="nofollow" href="https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html?m=1">'Advanced Protection' comes to Android 16</a></li><li><a title="Europe launches it own vulnerability database" rel="nofollow" href="https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security">Europe launches it own vulnerability database</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 46</strong>:  We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new &#39;Intrusion Logging&#39; feature coming to Android, Apple&#39;s iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18lG0HnPcDS4zsR7aVdhv6q5qnHBDF7wsbCkEuMU8iDc/edit?tab=t.0#heading=h.xoy008k76n3z">Transcript (unedited, AI-generated)</a></li><li><a title="Coinbase on $20m ransom demand" rel="nofollow" href="https://www.coinbase.com/blog/protecting-our-customers-standing-up-to-extortionists">Coinbase on $20m ransom demand</a></li><li><a title="SEC filing on Coinbase breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/1679788/000167978825000094/coin-20250514.htm?7194ef805fa2d04b0f7e8c9521f97343">SEC filing on Coinbase breach</a></li><li><a title="Coinbase Rogue Contractors Bribed to Leak Customer Data" rel="nofollow" href="https://www.securityweek.com/coinbase-rejects-20m-ransom-after-rogue-contractors-bribed-to-leak-customer-data/">Coinbase Rogue Contractors Bribed to Leak Customer Data</a></li><li><a title="Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US&amp;_gl=1*nrofxr*_gcl_au*MjQ3MzY1MzY5LjE3NDcxOTkyODY">Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)</a></li><li><a title="Watchtowr blog on new Ivanti 0days" rel="nofollow" href="https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/">Watchtowr blog on new Ivanti 0days</a></li><li><a title="CISA Known Exploited Vulnerabilities (KEV)" rel="nofollow" href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA Known Exploited Vulnerabilities (KEV)</a></li><li><a title="&#39;Advanced Protection&#39; comes to Android 16" rel="nofollow" href="https://security.googleblog.com/2025/05/advanced-protection-mobile-devices.html?m=1">'Advanced Protection' comes to Android 16</a></li><li><a title="Europe launches it own vulnerability database" rel="nofollow" href="https://www.enisa.europa.eu/news/consult-the-european-vulnerability-database-to-enhance-your-digital-security">Europe launches it own vulnerability database</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+iXk0M1PS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+iXk0M1PS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>JAGS keynote: The intricacies of wartime cyber threat intelligence </title>
      <link>http://securityconversations.fireside.fm/wartime-cyber-threat-intel-counterthreats-keynote</link>
      <guid isPermaLink="false">e86c0a26-27c7-44e7-a6fd-1d85e4e5b3d2</guid>
      <pubDate>Fri, 09 May 2025 09:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e86c0a26-27c7-44e7-a6fd-1d85e4e5b3d2.mp3" length="26254337" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). 

In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.

Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>31:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e86c0a26-27c7-44e7-a6fd-1d85e4e5b3d2/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 45</strong>: (The buddies are trapped in timezone hell with cross-continent travel this week). </p>

<p>In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It&#39;s a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.</p>

<p><em>Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.</em></p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>CTI, threat intelligence, wartime, Ukraine, Israel, cyberwar, cyber offense, NCSC, CyberThreat, SANS Institute, SentinelOne</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 45</strong>: (The buddies are trapped in timezone hell with cross-continent travel this week). </p>

<p>In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It&#39;s a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.</p>

<p><em>Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.</em></p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Keynote transcript" rel="nofollow" href="https://docs.google.com/document/d/1ZBQuHSF3sAwT9acg8ng4AtCw04jPLFOwkuZjS1nnpbI/edit?tab=t.0#heading=h.pi42p8chtkss">Keynote transcript</a></li><li><a title="The ethics and perils of APT research" rel="nofollow" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/10/20080228/Guerrero-Saade-VB2015.pdf">The ethics and perils of APT research</a></li><li><a title="Recommended Talks" rel="nofollow" href="https://www.epicturla.com/recommended-material">Recommended Talks</a></li><li><a title="The Lost APT Reports" rel="nofollow" href="https://www.epicturla.com/blog">The Lost APT Reports</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 45</strong>: (The buddies are trapped in timezone hell with cross-continent travel this week). </p>

<p>In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It&#39;s a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.</p>

<p><em>Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.</em></p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Keynote transcript" rel="nofollow" href="https://docs.google.com/document/d/1ZBQuHSF3sAwT9acg8ng4AtCw04jPLFOwkuZjS1nnpbI/edit?tab=t.0#heading=h.pi42p8chtkss">Keynote transcript</a></li><li><a title="The ethics and perils of APT research" rel="nofollow" href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2017/10/20080228/Guerrero-Saade-VB2015.pdf">The ethics and perils of APT research</a></li><li><a title="Recommended Talks" rel="nofollow" href="https://www.epicturla.com/recommended-material">Recommended Talks</a></li><li><a title="The Lost APT Reports" rel="nofollow" href="https://www.epicturla.com/blog">The Lost APT Reports</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+bHAF-HfS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+bHAF-HfS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Signalgate redux, OpenAI's Aardvark, normalizing cyber offense</title>
      <link>http://securityconversations.fireside.fm/signal-archiving-open-ai-aardvark-hacking-back-</link>
      <guid isPermaLink="false">6b6d31fa-9f59-4c43-81ac-cafcf58c799e</guid>
      <pubDate>Sat, 03 May 2025 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6b6d31fa-9f59-4c43-81ac-cafcf58c799e.mp3" length="123764937" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 44: We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors.
Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist.

Cast: Costin Raiu, Juan Andres Guerrero-Saade and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>2:38:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6b6d31fa-9f59-4c43-81ac-cafcf58c799e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 44</strong>:  We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors.</p>

<p>Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p>]]>
      </description>
      <itunes:keywords>OpenAI, Aardvark, RSA Conference, JP Morgan Chase, Apple, North Korea, Russia, zero-day, Google, Romania, CISA, crypto, Bitcoin</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 44</strong>:  We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors.</p>

<p>Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1K6oD3WVGNtnQZQy-1hBW3qoRNgVo1UrNKy2dktwL7RA/edit?tab=t.0#heading=h.iyimfr9zwj2b">Transcript (unedited, AI-generated)</a></li><li><a title="US government using obscure app to archive Signal messages" rel="nofollow" href="https://www.404media.co/mike-waltz-accidentally-reveals-obscure-app-the-government-is-using-to-archive-signal-messages/">US government using obscure app to archive Signal messages</a></li><li><a title="Reuters photo of Mike Waltz phone" rel="nofollow" href="https://www.reutersconnect.com/item/us-national-security-advisor-mike-waltz-attends-a-cabinet-meeting-held-by-president-trump-at-the-white-house-in-washington/dGFnOnJldXRlcnMuY29tLDIwMjU6bmV3c21sX1JDMkg4RUFEOEtGRw%3D%3D?ref=404media.co">Reuters photo of Mike Waltz phone</a></li><li><a title="US revokes Romania visa waiver program" rel="nofollow" href="https://www.dhs.gov/news/2025/05/02/dhs-announces-rescission-romanias-designation-visa-waiver-program">US revokes Romania visa waiver program</a></li><li><a title="OpenSSH bug found by OpenAI &#39;Aardvark&#39;" rel="nofollow" href="https://github.com/openssh/openssh-portable/commit/c991273c18afc490313a9f282383eaf59d9c13b9">OpenSSH bug found by OpenAI 'Aardvark'</a></li><li><a title="JP Morgan Chase CISO: An open letter to third-party suppliers" rel="nofollow" href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">JP Morgan Chase CISO: An open letter to third-party suppliers</a></li><li><a title="JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference" rel="nofollow" href="https://www.securityweek.com/jpmorgan-chase-ciso-fires-warning-shot-ahead-of-rsa-conference/">JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference</a></li><li><a title="SentinelOne LABS on DPRK threat actor targeting" rel="nofollow" href="https://www.sentinelone.com/labs/top-tier-target-what-it-takes-to-defend-a-cybersecurity-company-from-todays-adversaries/">SentinelOne LABS on DPRK threat actor targeting</a></li><li><a title="Alexei Bulazel comments at RSA conference" rel="nofollow" href="https://cyberscoop.com/alexei-bulazel-white-house-national-security-councial-destigmatize-offensive-cyber-rsac-2025/">Alexei Bulazel comments at RSA conference</a></li><li><a title="Google report on 0day exploitation in 2024" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends">Google report on 0day exploitation in 2024</a></li><li><a title="Apple notifies new victims of spyware attacks across the world" rel="nofollow" href="https://techcrunch.com/2025/04/30/apple-notifies-new-victims-of-spyware-attacks-across-the-world/">Apple notifies new victims of spyware attacks across the world</a></li><li><a title="France attributes cyberattacks to Russia&#39;s military intelligence" rel="nofollow" href="https://www.diplomatie.gouv.fr/fr/dossiers-pays/russie/evenements/evenements-de-l-annee-2025/article/russie-attribution-de-cyberattaques-contre-la-france-au-service-de">France attributes cyberattacks to Russia's military intelligence</a></li><li><a title="RT-Solar on ViPNet backdoor from 2021" rel="nofollow" href="https://rt-solar.ru/solar-4rays/blog/5487/">RT-Solar on ViPNet backdoor from 2021</a></li><li><a title="Kaspersky: Sophisticated backdoor mimicking secure networking software updates" rel="nofollow" href="https://securelist.com/new-backdoor-mimics-security-software-update/116246/">Kaspersky: Sophisticated backdoor mimicking secure networking software updates</a></li><li><a title="$330m Bitcoin heist" rel="nofollow" href="https://x.com/zachxbt/status/1916756932763046273?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">$330m Bitcoin heist</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 44</strong>:  We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors.</p>

<p>Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>,  <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> and    <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1K6oD3WVGNtnQZQy-1hBW3qoRNgVo1UrNKy2dktwL7RA/edit?tab=t.0#heading=h.iyimfr9zwj2b">Transcript (unedited, AI-generated)</a></li><li><a title="US government using obscure app to archive Signal messages" rel="nofollow" href="https://www.404media.co/mike-waltz-accidentally-reveals-obscure-app-the-government-is-using-to-archive-signal-messages/">US government using obscure app to archive Signal messages</a></li><li><a title="Reuters photo of Mike Waltz phone" rel="nofollow" href="https://www.reutersconnect.com/item/us-national-security-advisor-mike-waltz-attends-a-cabinet-meeting-held-by-president-trump-at-the-white-house-in-washington/dGFnOnJldXRlcnMuY29tLDIwMjU6bmV3c21sX1JDMkg4RUFEOEtGRw%3D%3D?ref=404media.co">Reuters photo of Mike Waltz phone</a></li><li><a title="US revokes Romania visa waiver program" rel="nofollow" href="https://www.dhs.gov/news/2025/05/02/dhs-announces-rescission-romanias-designation-visa-waiver-program">US revokes Romania visa waiver program</a></li><li><a title="OpenSSH bug found by OpenAI &#39;Aardvark&#39;" rel="nofollow" href="https://github.com/openssh/openssh-portable/commit/c991273c18afc490313a9f282383eaf59d9c13b9">OpenSSH bug found by OpenAI 'Aardvark'</a></li><li><a title="JP Morgan Chase CISO: An open letter to third-party suppliers" rel="nofollow" href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">JP Morgan Chase CISO: An open letter to third-party suppliers</a></li><li><a title="JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference" rel="nofollow" href="https://www.securityweek.com/jpmorgan-chase-ciso-fires-warning-shot-ahead-of-rsa-conference/">JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference</a></li><li><a title="SentinelOne LABS on DPRK threat actor targeting" rel="nofollow" href="https://www.sentinelone.com/labs/top-tier-target-what-it-takes-to-defend-a-cybersecurity-company-from-todays-adversaries/">SentinelOne LABS on DPRK threat actor targeting</a></li><li><a title="Alexei Bulazel comments at RSA conference" rel="nofollow" href="https://cyberscoop.com/alexei-bulazel-white-house-national-security-councial-destigmatize-offensive-cyber-rsac-2025/">Alexei Bulazel comments at RSA conference</a></li><li><a title="Google report on 0day exploitation in 2024" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends">Google report on 0day exploitation in 2024</a></li><li><a title="Apple notifies new victims of spyware attacks across the world" rel="nofollow" href="https://techcrunch.com/2025/04/30/apple-notifies-new-victims-of-spyware-attacks-across-the-world/">Apple notifies new victims of spyware attacks across the world</a></li><li><a title="France attributes cyberattacks to Russia&#39;s military intelligence" rel="nofollow" href="https://www.diplomatie.gouv.fr/fr/dossiers-pays/russie/evenements/evenements-de-l-annee-2025/article/russie-attribution-de-cyberattaques-contre-la-france-au-service-de">France attributes cyberattacks to Russia's military intelligence</a></li><li><a title="RT-Solar on ViPNet backdoor from 2021" rel="nofollow" href="https://rt-solar.ru/solar-4rays/blog/5487/">RT-Solar on ViPNet backdoor from 2021</a></li><li><a title="Kaspersky: Sophisticated backdoor mimicking secure networking software updates" rel="nofollow" href="https://securelist.com/new-backdoor-mimics-security-software-update/116246/">Kaspersky: Sophisticated backdoor mimicking secure networking software updates</a></li><li><a title="$330m Bitcoin heist" rel="nofollow" href="https://x.com/zachxbt/status/1916756932763046273?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">$330m Bitcoin heist</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+OUl2_LrJ</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+OUl2_LrJ" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security</title>
      <link>http://securityconversations.fireside.fm/tom-rid-joins-the-show</link>
      <guid isPermaLink="false">a43a154a-06cd-4cf3-97fa-3945dc08f544</guid>
      <pubDate>Fri, 25 Apr 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a43a154a-06cd-4cf3-97fa-3945dc08f544.mp3" length="77152373" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. 

Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. 

Cast: Thomas Rid, Juan Andres Guerrero-Saade and Ryan Naraine.  

* Costin Raiu is away this week.</itunes:subtitle>
      <itunes:duration>1:33:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a43a154a-06cd-4cf3-97fa-3945dc08f544/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p>]]>
      </description>
      <itunes:keywords>China, NSA, attribution, Volt Typhoon, Apple iOS, zero-day, CVE, MITRE, CISA, Microsoft, Europe, Anthropic, TP-Link</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 43</strong>:  Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism.  We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. </p>

<p>Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. </p>

<p><strong>Cast:</strong> <a href="https://sais.jhu.edu/users/trid2" rel="nofollow">Thomas Rid</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.   <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> is away this week.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1NJq0S9X5LyFVv3-X9EpljGIOVsOszEGA82ZFHSfA428/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Anthropic: Exploring AI model welfare, consciousness" rel="nofollow" href="https://www.anthropic.com/research/exploring-model-welfare">Anthropic: Exploring AI model welfare, consciousness</a></li><li><a title="David Chalmers: Taking AI Welfare Seriously" rel="nofollow" href="https://arxiv.org/pdf/2411.00986">David Chalmers: Taking AI Welfare Seriously</a></li><li><a title="Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’" rel="nofollow" href="https://therecord.media/sam-altman-openai-privacy-safeguards">Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’</a></li><li><a title="TP-Link router pricing and China ties under US gov probe" rel="nofollow" href="https://www.techspot.com/news/107682-tp-link-router-pricing-china-ties-under-us.html">TP-Link router pricing and China ties under US gov probe</a></li><li><a title="Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China" rel="nofollow" href="https://archive.ph/YWpQA">Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China</a></li><li><a title="Verizon DBIR 2015 (full report)" rel="nofollow" href="https://www.verizon.com/business/resources/T2ff/reports/2025-dbir-data-breach-investigations-report.pdf">Verizon DBIR 2015 (full report)</a></li><li><a title="Mandiant M-Trends 2025 Report" rel="nofollow" href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a></li><li><a title="FBI seeking tips about China&#39;s &#39;Salt Typhoon&#39; hackers" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250424-2">FBI seeking tips about China's 'Salt Typhoon' hackers</a></li><li><a title="North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature" rel="nofollow" href="https://www.securityweek.com/north-korean-cryptocurrency-thieves-caught-hijacking-zoom-remote-control-feature/">North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature</a></li><li><a title="Dan Geer on the realpolitik of cybersecurity" rel="nofollow" href="https://www.youtube.com/watch?v=nT-TGvYOBpI&amp;ab_channel=BlackHat">Dan Geer on the realpolitik of cybersecurity</a></li><li><a title="LABScon 2025 CFP is open" rel="nofollow" href="https://www.cvent.com/c/abstracts/fe3bffe0-6e1f-482d-9435-fb39af52138c">LABScon 2025 CFP is open</a></li><li><a title="Ransom War by Max Smeets" rel="nofollow" href="https://www.hurstpublishers.com/book/ransom-war/">Ransom War by Max Smeets</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+emP_LPd9</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+emP_LPd9" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>China doxxes NSA, CVE's funding crisis, Apple's zero-day troubles</title>
      <link>http://securityconversations.fireside.fm/china-doxxes-nsa-cisa-cve-apple-zero-days</link>
      <guid isPermaLink="false">4ef18f59-700b-4713-93c0-db500e43ed18</guid>
      <pubDate>Thu, 17 Apr 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4ef18f59-700b-4713-93c0-db500e43ed18.mp3" length="82057286" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   

Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:39:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4ef18f59-700b-4713-93c0-db500e43ed18/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 42</strong>:  We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   </p>

<p>Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs&#39; exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>China, NSA, attribution, Volt Typhoon, Apple iOS, zero-day, CVE, MITRE, CISA, Microsoft, Europe</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 42</strong>:  We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   </p>

<p>Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs&#39; exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LM4EHnm8-uHKIur7iqOp3y4Z1wrItETvASD5IRnKJqo/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="China names alleged NSA cyberattack agents" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/chinas-harbin-says-us-launched-advanced-cyber-attacks-winter-games-2025-04-15/">China names alleged NSA cyberattack agents</a></li><li><a title="WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks" rel="nofollow" href="https://archive.ph/yDvP3">WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks</a></li><li><a title="Apple Quashes Two Zero-Days With iOS, MacOS Patches" rel="nofollow" href="https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/">Apple Quashes Two Zero-Days With iOS, MacOS Patches</a></li><li><a title="Apple bulletin - iOS 18.4.1 Security Vulnerabilities" rel="nofollow" href="https://support.apple.com/en-us/122282">Apple bulletin - iOS 18.4.1 Security Vulnerabilities</a></li><li><a title="Android zero-days documented" rel="nofollow" href="https://source.android.com/docs/security/bulletin/2025-04-01">Android zero-days documented</a></li><li><a title="MITRE CVE Program Gets Last-Hour Funding Reprieve" rel="nofollow" href="https://www.securityweek.com/mitre-cve-program-gets-last-hour-funding-reprieve/">MITRE CVE Program Gets Last-Hour Funding Reprieve</a></li><li><a title="NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD" rel="nofollow" href="https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/">NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD</a></li><li><a title="EU issues US-bound staff with burner phones to avoid espionage" rel="nofollow" href="https://archive.ph/VcBLY">EU issues US-bound staff with burner phones to avoid espionage</a></li><li><a title="Exploitation of CLFS zero-day leads to ransomware " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/">Exploitation of CLFS zero-day leads to ransomware </a></li><li><a title="Google announces Sec-Gemini v1 cybersecurity model" rel="nofollow" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html">Google announces Sec-Gemini v1 cybersecurity model</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 42</strong>:  We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games.  Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.   </p>

<p>Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs&#39; exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1LM4EHnm8-uHKIur7iqOp3y4Z1wrItETvASD5IRnKJqo/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="China names alleged NSA cyberattack agents" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/chinas-harbin-says-us-launched-advanced-cyber-attacks-winter-games-2025-04-15/">China names alleged NSA cyberattack agents</a></li><li><a title="WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks" rel="nofollow" href="https://archive.ph/yDvP3">WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks</a></li><li><a title="Apple Quashes Two Zero-Days With iOS, MacOS Patches" rel="nofollow" href="https://www.securityweek.com/apple-pushes-ios-macos-patches-to-quash-two-zero-days/">Apple Quashes Two Zero-Days With iOS, MacOS Patches</a></li><li><a title="Apple bulletin - iOS 18.4.1 Security Vulnerabilities" rel="nofollow" href="https://support.apple.com/en-us/122282">Apple bulletin - iOS 18.4.1 Security Vulnerabilities</a></li><li><a title="Android zero-days documented" rel="nofollow" href="https://source.android.com/docs/security/bulletin/2025-04-01">Android zero-days documented</a></li><li><a title="MITRE CVE Program Gets Last-Hour Funding Reprieve" rel="nofollow" href="https://www.securityweek.com/mitre-cve-program-gets-last-hour-funding-reprieve/">MITRE CVE Program Gets Last-Hour Funding Reprieve</a></li><li><a title="NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD" rel="nofollow" href="https://www.securityweek.com/nist-still-struggling-to-clear-vulnerability-submissions-backlog-in-nvd/">NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD</a></li><li><a title="EU issues US-bound staff with burner phones to avoid espionage" rel="nofollow" href="https://archive.ph/VcBLY">EU issues US-bound staff with burner phones to avoid espionage</a></li><li><a title="Exploitation of CLFS zero-day leads to ransomware " rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/04/08/exploitation-of-clfs-zero-day-leads-to-ransomware-activity/">Exploitation of CLFS zero-day leads to ransomware </a></li><li><a title="Google announces Sec-Gemini v1 cybersecurity model" rel="nofollow" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html">Google announces Sec-Gemini v1 cybersecurity model</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+k67wY2JY</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+k67wY2JY" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>NSA director fired, Ivanti's 0day screw-up, backdoor in robot dogs</title>
      <link>http://securityconversations.fireside.fm/bunnie-huang-black-hat-ivanti-zeroday-robodog</link>
      <guid isPermaLink="false">8ee6db1b-3fe7-45d5-ae76-01d697ffdff9</guid>
      <pubDate>Fri, 04 Apr 2025 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8ee6db1b-3fe7-45d5-ae76-01d697ffdff9.mp3" length="84762978" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 41: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang's keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti's misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices.  Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh.

We also discuss Microsoft touting AI's value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a backdoor in a popular Chinese robot dog, and Chinese dominance of the robotics market.

 Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:36:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8ee6db1b-3fe7-45d5-ae76-01d697ffdff9/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 41</strong>: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang&#39;s keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti&#39;s misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices.  Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh.</p>

<p>We also discuss Microsoft touting AI&#39;s value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a backdoor in a popular Chinese robot dog, and Chinese dominance of the robotics market.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Black Hat Asia, Singapore, Bunnie Huang, hardware trust, supply chain, China, Ivanti, Mandiant, Microsoft Security Copilot, Unitree, robotics</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 41</strong>: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang&#39;s keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti&#39;s misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices.  Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh.</p>

<p>We also discuss Microsoft touting AI&#39;s value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a backdoor in a popular Chinese robot dog, and Chinese dominance of the robotics market.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1kgNSEX2RyhL2Ph0OoTk1GwNRPaKGITQbe-XSMU21fgk/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="National Security Agency chief ousted after far-right activist urged his removal" rel="nofollow" href="https://archive.ph/tWaVv">National Security Agency chief ousted after far-right activist urged his removal</a></li><li><a title="Mandiant: China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability " rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability">Mandiant: China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability </a></li><li><a title="Ivanti security bulletin (CVE-2025-22457)" rel="nofollow" href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US">Ivanti security bulletin (CVE-2025-22457)</a></li><li><a title="Chinese APT exploits misdiagnosed RCE in Ivanti VPNs" rel="nofollow" href="https://www.securityweek.com/chinese-apt-pounces-on-misdiagnosed-rce-in-ivanti-vpn-appliances/">Chinese APT exploits misdiagnosed RCE in Ivanti VPNs</a></li><li><a title="Another exploited 0day in Apple iOS " rel="nofollow" href="https://support.apple.com/en-us/122346">Another exploited 0day in Apple iOS </a></li><li><a title="Android version of Lockdown Mode coming" rel="nofollow" href="https://www.androidauthority.com/android-inactivity-reboot-android-16-3539949/">Android version of Lockdown Mode coming</a></li><li><a title="Microsoft:  Using AI to find open-source bootloader flaws" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/03/31/analyzing-open-source-bootloaders-finding-vulnerabilities-faster-with-ai/">Microsoft:  Using AI to find open-source bootloader flaws</a></li><li><a title="Indiana University cybersecurity &quot;safe&quot; after FBI home searches" rel="nofollow" href="https://archive.ph/KIX8k#selection-465.0-465.84">Indiana University cybersecurity "safe" after FBI home searches</a></li><li><a title="Silent Push: Russians impersonate CIA to target Ukraine sympathizers" rel="nofollow" href="https://www.silentpush.com/blog/russian-intelligence-phishing/">Silent Push: Russians impersonate CIA to target Ukraine sympathizers</a></li><li><a title="Unitree Go1 robot dog backdoor documentation" rel="nofollow" href="https://think-awesome.com/download_unitree_report">Unitree Go1 robot dog backdoor documentation</a></li><li><a title="America is missing in the robotics race" rel="nofollow" href="https://semianalysis.com/2025/03/11/america-is-missing-the-new-labor-economy-robotics-part-1/">America is missing in the robotics race</a></li><li><a title="Automated AI Reverse Engineering with MCP for IDA and Ghidra" rel="nofollow" href="https://www.youtube.com/watch?v=iFxNuk3kxhk&amp;ab_channel=OALabs">Automated AI Reverse Engineering with MCP for IDA and Ghidra</a></li><li><a title="Bunny Huang: Perspectives on trust in hardware supply chains" rel="nofollow" href="https://www.blackhat.com/asia-25/briefings/schedule/#keynote-perspectives-on-trust-in-hardware-supply-chains-44613">Bunny Huang: Perspectives on trust in hardware supply chains</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 41</strong>: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang&#39;s keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti&#39;s misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices.  Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh.</p>

<p>We also discuss Microsoft touting AI&#39;s value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a backdoor in a popular Chinese robot dog, and Chinese dominance of the robotics market.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1kgNSEX2RyhL2Ph0OoTk1GwNRPaKGITQbe-XSMU21fgk/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="National Security Agency chief ousted after far-right activist urged his removal" rel="nofollow" href="https://archive.ph/tWaVv">National Security Agency chief ousted after far-right activist urged his removal</a></li><li><a title="Mandiant: China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability " rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability">Mandiant: China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability </a></li><li><a title="Ivanti security bulletin (CVE-2025-22457)" rel="nofollow" href="https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US">Ivanti security bulletin (CVE-2025-22457)</a></li><li><a title="Chinese APT exploits misdiagnosed RCE in Ivanti VPNs" rel="nofollow" href="https://www.securityweek.com/chinese-apt-pounces-on-misdiagnosed-rce-in-ivanti-vpn-appliances/">Chinese APT exploits misdiagnosed RCE in Ivanti VPNs</a></li><li><a title="Another exploited 0day in Apple iOS " rel="nofollow" href="https://support.apple.com/en-us/122346">Another exploited 0day in Apple iOS </a></li><li><a title="Android version of Lockdown Mode coming" rel="nofollow" href="https://www.androidauthority.com/android-inactivity-reboot-android-16-3539949/">Android version of Lockdown Mode coming</a></li><li><a title="Microsoft:  Using AI to find open-source bootloader flaws" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/03/31/analyzing-open-source-bootloaders-finding-vulnerabilities-faster-with-ai/">Microsoft:  Using AI to find open-source bootloader flaws</a></li><li><a title="Indiana University cybersecurity &quot;safe&quot; after FBI home searches" rel="nofollow" href="https://archive.ph/KIX8k#selection-465.0-465.84">Indiana University cybersecurity "safe" after FBI home searches</a></li><li><a title="Silent Push: Russians impersonate CIA to target Ukraine sympathizers" rel="nofollow" href="https://www.silentpush.com/blog/russian-intelligence-phishing/">Silent Push: Russians impersonate CIA to target Ukraine sympathizers</a></li><li><a title="Unitree Go1 robot dog backdoor documentation" rel="nofollow" href="https://think-awesome.com/download_unitree_report">Unitree Go1 robot dog backdoor documentation</a></li><li><a title="America is missing in the robotics race" rel="nofollow" href="https://semianalysis.com/2025/03/11/america-is-missing-the-new-labor-economy-robotics-part-1/">America is missing in the robotics race</a></li><li><a title="Automated AI Reverse Engineering with MCP for IDA and Ghidra" rel="nofollow" href="https://www.youtube.com/watch?v=iFxNuk3kxhk&amp;ab_channel=OALabs">Automated AI Reverse Engineering with MCP for IDA and Ghidra</a></li><li><a title="Bunny Huang: Perspectives on trust in hardware supply chains" rel="nofollow" href="https://www.blackhat.com/asia-25/briefings/schedule/#keynote-perspectives-on-trust-in-hardware-supply-chains-44613">Bunny Huang: Perspectives on trust in hardware supply chains</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+6E6X6x_Y</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+6E6X6x_Y" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Signalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returns</title>
      <link>http://securityconversations.fireside.fm/signalgate-id-management-puzzlemaker-chrome-zero-day</link>
      <guid isPermaLink="false">b9f48f51-2a3a-4f4e-8e3a-1c9c5bf76f9c</guid>
      <pubDate>Fri, 28 Mar 2025 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b9f48f51-2a3a-4f4e-8e3a-1c9c5bf76f9c.mp3" length="88112428" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 40: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who's behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures.

 Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:52:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b9f48f51-2a3a-4f4e-8e3a-1c9c5bf76f9c/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 40</strong>: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who&#39;s behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Signal, PuzzleMaker, encryption, secure messaging, Operation Forum Troll, Chrome, zero-day, China, NSA, CIA, Lab Dooktegan, Intrusion Truth, Tornado Cash, i-Soon, Pangu Labs</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 40</strong>: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who&#39;s behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1u3s6n977qAHCEIChdXeRTrbseZ_2ZFYofneh8a5BMTg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="The Atlantic: The Trump admin accidentally texted me its war plans" rel="nofollow" href="https://archive.ph/JEYep">The Atlantic: The Trump admin accidentally texted me its war plans</a></li><li><a title="The Atlantic: Here are the attack plans shared on Signal" rel="nofollow" href="https://archive.ph/fNUm7">The Atlantic: Here are the attack plans shared on Signal</a></li><li><a title="Signal statement on SignalGate" rel="nofollow" href="https://x.com/signalapp/status/1904666111989166408">Signal statement on SignalGate</a></li><li><a title="Our experts separate Signal from noise in the Trump team group chat" rel="nofollow" href="https://www.atlanticcouncil.org/blogs/new-atlanticist/our-experts-separate-signal-from-noise-in-the-trump-teams-messages-about-bombing-the-houthis/">Our experts separate Signal from noise in the Trump team group chat</a></li><li><a title="Operation ForumTroll exploits zero-days in Google Chrome" rel="nofollow" href="https://securelist.com/operation-forumtroll/115989/">Operation ForumTroll exploits zero-days in Google Chrome</a></li><li><a title="PuzzleMaker attacks with Chrome zero-day exploit chain" rel="nofollow" href="https://securelist.com/puzzlemaker-chrome-zero-day-exploit-chain/102771/">PuzzleMaker attacks with Chrome zero-day exploit chain</a></li><li><a title="Ten most mysterious APT campaigns that remain unattributed" rel="nofollow" href="https://securelist.com/top-10-unattributed-apt-mysteries/107676/">Ten most mysterious APT campaigns that remain unattributed</a></li><li><a title="Operation FishMedley linked to i-SOON" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/operation-fishmedley/">Operation FishMedley linked to i-SOON</a></li><li><a title="Chinese gov agency on mobile attacks by US intel agencies" rel="nofollow" href="http://www.news.cn/world/20250325/02ba448744ac4b75a81df613a88b4d26/2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f.pdf">Chinese gov agency on mobile attacks by US intel agencies</a></li><li><a title="LabDookhtegan Telegram channel" rel="nofollow" href="https://t.me/Lab_Dookhtegan_Channel/254">LabDookhtegan Telegram channel</a></li><li><a title="Tornado Cash sanctions removed" rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0057">Tornado Cash sanctions removed</a></li><li><a title="Intrusion Truth " rel="nofollow" href="https://intrusiontruth.wordpress.com/">Intrusion Truth </a></li><li><a title="Lab Dookhtegan archives on CyberScoop" rel="nofollow" href="https://cyberscoop.com/tag/lab-dookhtegan/">Lab Dookhtegan archives on CyberScoop</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 40</strong>: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who&#39;s behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1u3s6n977qAHCEIChdXeRTrbseZ_2ZFYofneh8a5BMTg/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="The Atlantic: The Trump admin accidentally texted me its war plans" rel="nofollow" href="https://archive.ph/JEYep">The Atlantic: The Trump admin accidentally texted me its war plans</a></li><li><a title="The Atlantic: Here are the attack plans shared on Signal" rel="nofollow" href="https://archive.ph/fNUm7">The Atlantic: Here are the attack plans shared on Signal</a></li><li><a title="Signal statement on SignalGate" rel="nofollow" href="https://x.com/signalapp/status/1904666111989166408">Signal statement on SignalGate</a></li><li><a title="Our experts separate Signal from noise in the Trump team group chat" rel="nofollow" href="https://www.atlanticcouncil.org/blogs/new-atlanticist/our-experts-separate-signal-from-noise-in-the-trump-teams-messages-about-bombing-the-houthis/">Our experts separate Signal from noise in the Trump team group chat</a></li><li><a title="Operation ForumTroll exploits zero-days in Google Chrome" rel="nofollow" href="https://securelist.com/operation-forumtroll/115989/">Operation ForumTroll exploits zero-days in Google Chrome</a></li><li><a title="PuzzleMaker attacks with Chrome zero-day exploit chain" rel="nofollow" href="https://securelist.com/puzzlemaker-chrome-zero-day-exploit-chain/102771/">PuzzleMaker attacks with Chrome zero-day exploit chain</a></li><li><a title="Ten most mysterious APT campaigns that remain unattributed" rel="nofollow" href="https://securelist.com/top-10-unattributed-apt-mysteries/107676/">Ten most mysterious APT campaigns that remain unattributed</a></li><li><a title="Operation FishMedley linked to i-SOON" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/operation-fishmedley/">Operation FishMedley linked to i-SOON</a></li><li><a title="Chinese gov agency on mobile attacks by US intel agencies" rel="nofollow" href="http://www.news.cn/world/20250325/02ba448744ac4b75a81df613a88b4d26/2025032522b55fd15b244a5fac54e424c62be9b7_1616350dfed1c44ba786a82d574c86c30f.pdf">Chinese gov agency on mobile attacks by US intel agencies</a></li><li><a title="LabDookhtegan Telegram channel" rel="nofollow" href="https://t.me/Lab_Dookhtegan_Channel/254">LabDookhtegan Telegram channel</a></li><li><a title="Tornado Cash sanctions removed" rel="nofollow" href="https://home.treasury.gov/news/press-releases/sb0057">Tornado Cash sanctions removed</a></li><li><a title="Intrusion Truth " rel="nofollow" href="https://intrusiontruth.wordpress.com/">Intrusion Truth </a></li><li><a title="Lab Dookhtegan archives on CyberScoop" rel="nofollow" href="https://cyberscoop.com/tag/lab-dookhtegan/">Lab Dookhtegan archives on CyberScoop</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+zC1XfnOm</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+zC1XfnOm" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>China exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cuts</title>
      <link>http://securityconversations.fireside.fm/china-taiwan-paragon-whatsapp-cisa</link>
      <guid isPermaLink="false">eaa3f669-ac3a-4173-ad61-053f13fb6253</guid>
      <pubDate>Fri, 21 Mar 2025 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/eaa3f669-ac3a-4173-ad61-053f13fb6253.mp3" length="94023970" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 39:  Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs.

 Cast: Katie Moussouris (Luta Security), Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:56:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/eaa3f669-ac3a-4173-ad61-053f13fb6253/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 39</strong>: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab&#39;s report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs.</p>

<p><strong>Cast:</strong>   <a href="https://lutasecurity.com" rel="nofollow">Katie Moussouris</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>China, Taiwan, Iran, APT15, Luta Security, Citizen Lab, Paragon, Operation Zero, Telegram, Russia, GitHub Actions, CISA, LNK, Lab Dooktegen, CISA</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 39</strong>: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab&#39;s report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs.</p>

<p><strong>Cast:</strong>   <a href="https://lutasecurity.com" rel="nofollow">Katie Moussouris</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1nr3Ug3XbuqcsIf7btZ2bdAQhTbBTUEfzphKG49_uYZ4/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="China&#39;s MSS discloses Taiwan APTs " rel="nofollow" href="http://eng.mod.gov.cn/xb/News_213114/TopStories/16375392.html">China's MSS discloses Taiwan APTs </a></li><li><a title="Antiy report Taiwan&#39;s &quot;Green Spot&quot; attack group" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/GreenSpot_Analysis_202503.html">Antiy report Taiwan's "Green Spot" attack group</a></li><li><a title="Citizen Lab on Paragon’s Proliferating Spyware Operations" rel="nofollow" href="https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/">Citizen Lab on Paragon’s Proliferating Spyware Operations</a></li><li><a title="Operation Zero wants Telegram 1-click RCE exploits" rel="nofollow" href="https://x.com/opzero_en/status/1902665005675295186?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Operation Zero wants Telegram 1-click RCE exploits</a></li><li><a title="Operation Zero 0day Vulnerability Platform" rel="nofollow" href="https://opzero.ru/en/">Operation Zero 0day Vulnerability Platform</a></li><li><a title="GitHub Action supply chain attack" rel="nofollow" href="https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised">GitHub Action supply chain attack</a></li><li><a title="Blast radius of GitHub Action supply chain attack" rel="nofollow" href="https://www.endorlabs.com/learn/blast-radius-of-the-tj-actions-changed-files-supply-chain-attack">Blast radius of GitHub Action supply chain attack</a></li><li><a title="Windows .lnk shortcut exploit abused as zero-day" rel="nofollow" href="https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html">Windows .lnk shortcut exploit abused as zero-day</a></li><li><a title="Sean Plankey nominated to lead CISA" rel="nofollow" href="https://www.congress.gov/nomination/119th-congress/26/38">Sean Plankey nominated to lead CISA</a></li><li><a title="Trump admin halts funding for two cybersecurity efforts" rel="nofollow" href="https://www.securityweek.com/trump-administration-halts-funding-for-two-cybersecurity-efforts-including-one-for-elections/">Trump admin halts funding for two cybersecurity efforts</a></li><li><a title="CISA publishes Jen Easterley&#39;s calendars" rel="nofollow" href="https://www.dhs.gov/publication/cisa-calendars">CISA publishes Jen Easterley's calendars</a></li><li><a title="CISA statement on &#39;red-team&#39; layoff reports" rel="nofollow" href="https://www.cisa.gov/news-events/news/statement-cisas-red-team">CISA statement on 'red-team' layoff reports</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 39</strong>: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab&#39;s report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs.</p>

<p><strong>Cast:</strong>   <a href="https://lutasecurity.com" rel="nofollow">Katie Moussouris</a>, <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1nr3Ug3XbuqcsIf7btZ2bdAQhTbBTUEfzphKG49_uYZ4/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="China&#39;s MSS discloses Taiwan APTs " rel="nofollow" href="http://eng.mod.gov.cn/xb/News_213114/TopStories/16375392.html">China's MSS discloses Taiwan APTs </a></li><li><a title="Antiy report Taiwan&#39;s &quot;Green Spot&quot; attack group" rel="nofollow" href="https://www.antiy.cn/research/notice&amp;report/research_report/GreenSpot_Analysis_202503.html">Antiy report Taiwan's "Green Spot" attack group</a></li><li><a title="Citizen Lab on Paragon’s Proliferating Spyware Operations" rel="nofollow" href="https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/">Citizen Lab on Paragon’s Proliferating Spyware Operations</a></li><li><a title="Operation Zero wants Telegram 1-click RCE exploits" rel="nofollow" href="https://x.com/opzero_en/status/1902665005675295186?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">Operation Zero wants Telegram 1-click RCE exploits</a></li><li><a title="Operation Zero 0day Vulnerability Platform" rel="nofollow" href="https://opzero.ru/en/">Operation Zero 0day Vulnerability Platform</a></li><li><a title="GitHub Action supply chain attack" rel="nofollow" href="https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised">GitHub Action supply chain attack</a></li><li><a title="Blast radius of GitHub Action supply chain attack" rel="nofollow" href="https://www.endorlabs.com/learn/blast-radius-of-the-tj-actions-changed-files-supply-chain-attack">Blast radius of GitHub Action supply chain attack</a></li><li><a title="Windows .lnk shortcut exploit abused as zero-day" rel="nofollow" href="https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html">Windows .lnk shortcut exploit abused as zero-day</a></li><li><a title="Sean Plankey nominated to lead CISA" rel="nofollow" href="https://www.congress.gov/nomination/119th-congress/26/38">Sean Plankey nominated to lead CISA</a></li><li><a title="Trump admin halts funding for two cybersecurity efforts" rel="nofollow" href="https://www.securityweek.com/trump-administration-halts-funding-for-two-cybersecurity-efforts-including-one-for-elections/">Trump admin halts funding for two cybersecurity efforts</a></li><li><a title="CISA publishes Jen Easterley&#39;s calendars" rel="nofollow" href="https://www.dhs.gov/publication/cisa-calendars">CISA publishes Jen Easterley's calendars</a></li><li><a title="CISA statement on &#39;red-team&#39; layoff reports" rel="nofollow" href="https://www.cisa.gov/news-events/news/statement-cisas-red-team">CISA statement on 'red-team' layoff reports</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+H08extCw</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+H08extCw" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>A half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit hunting</title>
      <link>http://securityconversations.fireside.fm/zero-day-tuesday-juniper-custom-backdoor-bootkit-hunting</link>
      <guid isPermaLink="false">e8ceaea1-2a65-4964-9062-3aca6da98d36</guid>
      <pubDate>Fri, 14 Mar 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e8ceaea1-2a65-4964-9062-3aca6da98d36.mp3" length="99623327" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 38:  On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek.

Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:05:43</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e8ceaea1-2a65-4964-9062-3aca6da98d36/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 38</strong>: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China&#39;s DeepSeek.</p>

<p>Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV &#39;sandwich attacks&#39; front-running cryptocurrency transactions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Microsoft, Apple, Patch Tuesday, zero-day, WebKit, iOS 18.3.2, China, unpatched.ai, Microsoft Access, OpenAI, deepseek, UEFI, Binarly, bootkits, YARA, FWHunt, Mandian, Juniper, Jun OS, backdoor, router, MEV, sandwich attacks, cryptocurrency</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 38</strong>: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China&#39;s DeepSeek.</p>

<p>Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV &#39;sandwich attacks&#39; front-running cryptocurrency transactions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1eGHr2QVVzfFht4x-6NqNpiXOvU7qPYNbNoYLbnXo9JA/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft Flags Six Active Zero-Days, Patches 57 Flaws" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-patches-57-flaws-flags-six-active-zero-days/">Microsoft Flags Six Active Zero-Days, Patches 57 Flaws</a></li><li><a title="Unpatched.ai discoveries" rel="nofollow" href="https://www.unpatched.ai/reports">Unpatched.ai discoveries</a></li><li><a title="Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw" rel="nofollow" href="https://www.securityweek.com/apple-ships-ios-18-3-2-to-fix-already-exploited-webkit-flaw/">Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw</a></li><li><a title="Apple iOS 18.3.2 and iPadOS 18.3.2 documentation" rel="nofollow" href="https://support.apple.com/en-us/122281">Apple iOS 18.3.2 and iPadOS 18.3.2 documentation</a></li><li><a title="Citizen Lab: Predator in the wires" rel="nofollow" href="https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/">Citizen Lab: Predator in the wires</a></li><li><a title="FreeType Zero-Day Being Exploited in the Wild" rel="nofollow" href="https://www.securityweek.com/freetype-zero-day-being-exploited-in-the-wild/">FreeType Zero-Day Being Exploited in the Wild</a></li><li><a title="CVE-2020-15999: FreeType Heap Buffer Overflow" rel="nofollow" href="https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-15999.html">CVE-2020-15999: FreeType Heap Buffer Overflow</a></li><li><a title="Mandiant : Ghost in the Juniper router" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers">Mandiant : Ghost in the Juniper router</a></li><li><a title="Jun OS out-of-cycle security bulletin (CVE-2025-21590)" rel="nofollow" href="https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US">Jun OS out-of-cycle security bulletin (CVE-2025-21590)</a></li><li><a title="Juniper Malware Removal Tool" rel="nofollow" href="https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/concept/juniper-malware-removal-tool.html">Juniper Malware Removal Tool</a></li><li><a title="Binarly: UEFI Bootkit Hunting -- In-Depth Search for Unique Code Behavior" rel="nofollow" href="https://www.binarly.io/blog/uefi-bootkit-hunting-in-depth-search-for-unique-code-behavior">Binarly: UEFI Bootkit Hunting -- In-Depth Search for Unique Code Behavior</a></li><li><a title="Crypto Trader Loses $215,000 in MEV Sandwich Attack on Uniswap" rel="nofollow" href="https://blockonomi.com/crypto-trader-loses-215000-in-mev-sandwich-attack-on-uniswap/">Crypto Trader Loses $215,000 in MEV Sandwich Attack on Uniswap</a></li><li><a title="The Secretive World Of MEV, Where Bots Front-Run Crypto Investors For Big Profits" rel="nofollow" href="https://www.forbes.com/sites/jeffkauflin/2022/10/11/the-secretive-world-of-mev-where-crypto-bots-scalp-investors-for-big-profits/">The Secretive World Of MEV, Where Bots Front-Run Crypto Investors For Big Profits</a></li><li><a title="Reuters journalist Raphael Satter loses overseas citizenship" rel="nofollow" href="https://www.theguardian.com/world/2025/mar/13/us-journalist-sues-indian-government-after-losing-his-overseas-citizenship">Reuters journalist Raphael Satter loses overseas citizenship</a></li><li><a title="Yanis Varoufakis: Trump’s tariff chaos explained" rel="nofollow" href="https://www.youtube.com/watch?v=f1CdbCsetpw&amp;ab_channel=TimesRadio">Yanis Varoufakis: Trump’s tariff chaos explained</a></li><li><a title="Technofeudalism: What Killed Capitalism (Yanis Varoufakis)" rel="nofollow" href="https://www.goodreads.com/book/show/75560037-techno-feudalism">Technofeudalism: What Killed Capitalism (Yanis Varoufakis)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 38</strong>: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China&#39;s DeepSeek.</p>

<p>Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV &#39;sandwich attacks&#39; front-running cryptocurrency transactions.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1eGHr2QVVzfFht4x-6NqNpiXOvU7qPYNbNoYLbnXo9JA/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Microsoft Flags Six Active Zero-Days, Patches 57 Flaws" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-patches-57-flaws-flags-six-active-zero-days/">Microsoft Flags Six Active Zero-Days, Patches 57 Flaws</a></li><li><a title="Unpatched.ai discoveries" rel="nofollow" href="https://www.unpatched.ai/reports">Unpatched.ai discoveries</a></li><li><a title="Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw" rel="nofollow" href="https://www.securityweek.com/apple-ships-ios-18-3-2-to-fix-already-exploited-webkit-flaw/">Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw</a></li><li><a title="Apple iOS 18.3.2 and iPadOS 18.3.2 documentation" rel="nofollow" href="https://support.apple.com/en-us/122281">Apple iOS 18.3.2 and iPadOS 18.3.2 documentation</a></li><li><a title="Citizen Lab: Predator in the wires" rel="nofollow" href="https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/">Citizen Lab: Predator in the wires</a></li><li><a title="FreeType Zero-Day Being Exploited in the Wild" rel="nofollow" href="https://www.securityweek.com/freetype-zero-day-being-exploited-in-the-wild/">FreeType Zero-Day Being Exploited in the Wild</a></li><li><a title="CVE-2020-15999: FreeType Heap Buffer Overflow" rel="nofollow" href="https://googleprojectzero.github.io/0days-in-the-wild/0day-RCAs/2020/CVE-2020-15999.html">CVE-2020-15999: FreeType Heap Buffer Overflow</a></li><li><a title="Mandiant : Ghost in the Juniper router" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-espionage-targets-juniper-routers">Mandiant : Ghost in the Juniper router</a></li><li><a title="Jun OS out-of-cycle security bulletin (CVE-2025-21590)" rel="nofollow" href="https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US">Jun OS out-of-cycle security bulletin (CVE-2025-21590)</a></li><li><a title="Juniper Malware Removal Tool" rel="nofollow" href="https://www.juniper.net/documentation/us/en/software/junos/security-services/topics/concept/juniper-malware-removal-tool.html">Juniper Malware Removal Tool</a></li><li><a title="Binarly: UEFI Bootkit Hunting -- In-Depth Search for Unique Code Behavior" rel="nofollow" href="https://www.binarly.io/blog/uefi-bootkit-hunting-in-depth-search-for-unique-code-behavior">Binarly: UEFI Bootkit Hunting -- In-Depth Search for Unique Code Behavior</a></li><li><a title="Crypto Trader Loses $215,000 in MEV Sandwich Attack on Uniswap" rel="nofollow" href="https://blockonomi.com/crypto-trader-loses-215000-in-mev-sandwich-attack-on-uniswap/">Crypto Trader Loses $215,000 in MEV Sandwich Attack on Uniswap</a></li><li><a title="The Secretive World Of MEV, Where Bots Front-Run Crypto Investors For Big Profits" rel="nofollow" href="https://www.forbes.com/sites/jeffkauflin/2022/10/11/the-secretive-world-of-mev-where-crypto-bots-scalp-investors-for-big-profits/">The Secretive World Of MEV, Where Bots Front-Run Crypto Investors For Big Profits</a></li><li><a title="Reuters journalist Raphael Satter loses overseas citizenship" rel="nofollow" href="https://www.theguardian.com/world/2025/mar/13/us-journalist-sues-indian-government-after-losing-his-overseas-citizenship">Reuters journalist Raphael Satter loses overseas citizenship</a></li><li><a title="Yanis Varoufakis: Trump’s tariff chaos explained" rel="nofollow" href="https://www.youtube.com/watch?v=f1CdbCsetpw&amp;ab_channel=TimesRadio">Yanis Varoufakis: Trump’s tariff chaos explained</a></li><li><a title="Technofeudalism: What Killed Capitalism (Yanis Varoufakis)" rel="nofollow" href="https://www.goodreads.com/book/show/75560037-techno-feudalism">Technofeudalism: What Killed Capitalism (Yanis Varoufakis)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+-NIX65Hh</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+-NIX65Hh" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Revisiting the Lamberts, i-Soon indictments, VMware zero-days</title>
      <link>http://securityconversations.fireside.fm/revisiting-the-lamberts-apt</link>
      <guid isPermaLink="false">63a92335-8a4c-4f44-8bc4-b1f6a374ffed</guid>
      <pubDate>Sat, 08 Mar 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/63a92335-8a4c-4f44-8bc4-b1f6a374ffed.mp3" length="79756556" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. 

Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:39:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/63a92335-8a4c-4f44-8bc4-b1f6a374ffed/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 37</strong>: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. </p>

<p>Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Russia, Kim Zetter, Cyber Command, CISA, Lambert, Black Lambert, Triangulation, VMware, i-Soon, zero-day, Pangu Team, Apple, iOS, Amnesty International</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 37</strong>: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. </p>

<p>Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18Jv-csHfMCuSBFRIjwA55PKys4YIVDYCpc0Eq-BHWbU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Kim Zetter: Did Trump admin order a stand-down on Russia? " rel="nofollow" href="https://www.zetter-zeroday.com/did-trump-admin-order-u-s-cyber-command-and-cisa-to-stand-down-on-russia/">Kim Zetter: Did Trump admin order a stand-down on Russia? </a></li><li><a title="Unraveling the Lamberts Toolkit (Securelist)" rel="nofollow" href="https://securelist.com/unraveling-the-lamberts-toolkit/77990/">Unraveling the Lamberts Toolkit (Securelist)</a></li><li><a title="VB2019: King of the hill: nation-state counterintelligence for victim deconfliction" rel="nofollow" href="https://www.virusbulletin.com/virusbulletin/2020/01/vb2019-paper-king-hill-nation-state-counterintelligence-victim-deconfliction/">VB2019: King of the hill: nation-state counterintelligence for victim deconfliction</a></li><li><a title="VB2018: Draw me like one of your French APTs " rel="nofollow" href="https://www.virusbulletin.com/virusbulletin/2019/01/vb2018-paper-draw-me-one-your-french-apts-expanding-our-descriptive-palette-cyber-threat-actors/">VB2018: Draw me like one of your French APTs </a></li><li><a title="Symantec: Who is Longhorn?" rel="nofollow" href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7ca2e331-2209-46a8-9e60-4cb83f9602de&amp;CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&amp;tab=librarydocuments">Symantec: Who is Longhorn?</a></li><li><a title="VMware: Three new zero-days exploited" rel="nofollow" href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390?utm_campaign=VCF_FY25_VCF_Security-Alert-VMSA-2025-0004_MKT_EM_2938&amp;utm_content=VCF_FY25_VCF_Security-Alert_2938_VMSA-2025-0004_MKT_TRANS_EM_5308&amp;utm_medium=email&amp;utm_source=eloqua">VMware: Three new zero-days exploited</a></li><li><a title="Broadcom patches 3 VMware zero-days exploited in the wild" rel="nofollow" href="https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/">Broadcom patches 3 VMware zero-days exploited in the wild</a></li><li><a title="DOJ indictments: i-Soon hackers for hire and APT27" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-charges-12-chinese-contract-hackers-and-law-enforcement-officers-global">DOJ indictments: i-Soon hackers for hire and APT27</a></li><li><a title="Unmasking I-Soon " rel="nofollow" href="https://www.sentinelone.com/labs/unmasking-i-soon-the-leak-that-revealed-chinas-cyber-operations/">Unmasking I-Soon </a></li><li><a title="Catalan court orders former NSO Group execs be indicted for spyware abuses" rel="nofollow" href="https://therecord.media/catalan-court-orders-nso-execs-investigated">Catalan court orders former NSO Group execs be indicted for spyware abuses</a></li><li><a title="Apple sending &#39;mercenary spyware&#39; threat notifications" rel="nofollow" href="https://bsky.app/profile/donncha.is/post/3ljnm2u7tf225">Apple sending 'mercenary spyware' threat notifications</a></li><li><a title="How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist" rel="nofollow" href="https://www.securityweek.com/how-social-engineering-sparked-a-billion-dollar-supply-chain-cryptocurrency-heist/">How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist</a></li><li><a title="Safe{Wallet] post-mortem on ByBit $1.4B crypto heist" rel="nofollow" href="https://x.com/safe/status/1897663514975649938">Safe{Wallet] post-mortem on ByBit $1.4B crypto heist</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 37</strong>: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. </p>

<p>Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/18Jv-csHfMCuSBFRIjwA55PKys4YIVDYCpc0Eq-BHWbU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Kim Zetter: Did Trump admin order a stand-down on Russia? " rel="nofollow" href="https://www.zetter-zeroday.com/did-trump-admin-order-u-s-cyber-command-and-cisa-to-stand-down-on-russia/">Kim Zetter: Did Trump admin order a stand-down on Russia? </a></li><li><a title="Unraveling the Lamberts Toolkit (Securelist)" rel="nofollow" href="https://securelist.com/unraveling-the-lamberts-toolkit/77990/">Unraveling the Lamberts Toolkit (Securelist)</a></li><li><a title="VB2019: King of the hill: nation-state counterintelligence for victim deconfliction" rel="nofollow" href="https://www.virusbulletin.com/virusbulletin/2020/01/vb2019-paper-king-hill-nation-state-counterintelligence-victim-deconfliction/">VB2019: King of the hill: nation-state counterintelligence for victim deconfliction</a></li><li><a title="VB2018: Draw me like one of your French APTs " rel="nofollow" href="https://www.virusbulletin.com/virusbulletin/2019/01/vb2018-paper-draw-me-one-your-french-apts-expanding-our-descriptive-palette-cyber-threat-actors/">VB2018: Draw me like one of your French APTs </a></li><li><a title="Symantec: Who is Longhorn?" rel="nofollow" href="https://community.broadcom.com/symantecenterprise/communities/community-home/librarydocuments/viewdocument?DocumentKey=7ca2e331-2209-46a8-9e60-4cb83f9602de&amp;CommunityKey=1ecf5f55-9545-44d6-b0f4-4e4a7f5f5e68&amp;tab=librarydocuments">Symantec: Who is Longhorn?</a></li><li><a title="VMware: Three new zero-days exploited" rel="nofollow" href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390?utm_campaign=VCF_FY25_VCF_Security-Alert-VMSA-2025-0004_MKT_EM_2938&amp;utm_content=VCF_FY25_VCF_Security-Alert_2938_VMSA-2025-0004_MKT_TRANS_EM_5308&amp;utm_medium=email&amp;utm_source=eloqua">VMware: Three new zero-days exploited</a></li><li><a title="Broadcom patches 3 VMware zero-days exploited in the wild" rel="nofollow" href="https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/">Broadcom patches 3 VMware zero-days exploited in the wild</a></li><li><a title="DOJ indictments: i-Soon hackers for hire and APT27" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-charges-12-chinese-contract-hackers-and-law-enforcement-officers-global">DOJ indictments: i-Soon hackers for hire and APT27</a></li><li><a title="Unmasking I-Soon " rel="nofollow" href="https://www.sentinelone.com/labs/unmasking-i-soon-the-leak-that-revealed-chinas-cyber-operations/">Unmasking I-Soon </a></li><li><a title="Catalan court orders former NSO Group execs be indicted for spyware abuses" rel="nofollow" href="https://therecord.media/catalan-court-orders-nso-execs-investigated">Catalan court orders former NSO Group execs be indicted for spyware abuses</a></li><li><a title="Apple sending &#39;mercenary spyware&#39; threat notifications" rel="nofollow" href="https://bsky.app/profile/donncha.is/post/3ljnm2u7tf225">Apple sending 'mercenary spyware' threat notifications</a></li><li><a title="How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist" rel="nofollow" href="https://www.securityweek.com/how-social-engineering-sparked-a-billion-dollar-supply-chain-cryptocurrency-heist/">How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist</a></li><li><a title="Safe{Wallet] post-mortem on ByBit $1.4B crypto heist" rel="nofollow" href="https://x.com/safe/status/1897663514975649938">Safe{Wallet] post-mortem on ByBit $1.4B crypto heist</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Si3w6INq</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Si3w6INq" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Lazarus ByBit $1.4B heist was supply chain attack on developer</title>
      <link>http://securityconversations.fireside.fm/lazarus-bybit-supply-chain-cellebrite-cisa-russia</link>
      <guid isPermaLink="false">f12cd870-ed46-4801-84cc-74161e588723</guid>
      <pubDate>Sat, 01 Mar 2025 09:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f12cd870-ed46-4801-84cc-74161e588723.mp3" length="95539533" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 36: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. 

We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S. cyber policy signaling a stand-down on Russia-focused APT ops. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:53:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f12cd870-ed46-4801-84cc-74161e588723/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 36</strong>: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. </p>

<p>We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S. cyber policy signaling a stand-down on Russia-focused ops. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>ByBit, Lazarus, TraderTraitor, North Korea, cryptocurrency, hot wallet, CISA, Russia, Cellebrite, Russia, CyberCommand</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 36</strong>: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. </p>

<p>We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S. cyber policy signaling a stand-down on Russia-focused ops. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1fIXGfKfpyh0ltjAvW31z-g1fGhQvtMV6SsEusbZlJo0/edit?tab=t.0#heading=h.m2k4a9q509q9">Transcript (unedited, AI-generated)</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge" rel="nofollow" href="https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/">FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge</a></li><li><a title="FBI alert on $1.5b crypto heist" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250226">FBI alert on $1.5b crypto heist</a></li><li><a title="CISA report on TraderTraitor " rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-108a">CISA report on TraderTraitor </a></li><li><a title="Bybit launches bug bounty program" rel="nofollow" href="https://www.bybit.com/en/press/post/bybit-launches-recovery-bounty-program-with-rewards-up-to-10-of-stolen-funds-bltcd3ebbb9445d5b74">Bybit launches bug bounty program</a></li><li><a title="Lazarus Bounty  " rel="nofollow" href="https://www.lazarusbounty.com/en/">Lazarus Bounty  </a></li><li><a title="Cellebrite zero-day exploit used to target phone of Serbian student activist " rel="nofollow" href="https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/">Cellebrite zero-day exploit used to target phone of Serbian student activist </a></li><li><a title="Trump administration retreats in fight against Russian cyber threats" rel="nofollow" href="https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security">Trump administration retreats in fight against Russian cyber threats</a></li><li><a title="Hegseth orders Cyber Command to stand down on Russia planning" rel="nofollow" href="https://therecord.media/hegseth-orders-cyber-command-stand-down-russia-planning">Hegseth orders Cyber Command to stand down on Russia planning</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 36</strong>: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. </p>

<p>We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S. cyber policy signaling a stand-down on Russia-focused ops. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1fIXGfKfpyh0ltjAvW31z-g1fGhQvtMV6SsEusbZlJo0/edit?tab=t.0#heading=h.m2k4a9q509q9">Transcript (unedited, AI-generated)</a></li><li><a title="RE//verse Conference" rel="nofollow" href="https://re-verse.io/">RE//verse Conference</a></li><li><a title="FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge" rel="nofollow" href="https://www.securityweek.com/fbi-says-north-korea-hacked-bybit-as-details-of-1-5b-heist-emerge/">FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge</a></li><li><a title="FBI alert on $1.5b crypto heist" rel="nofollow" href="https://www.ic3.gov/PSA/2025/PSA250226">FBI alert on $1.5b crypto heist</a></li><li><a title="CISA report on TraderTraitor " rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-108a">CISA report on TraderTraitor </a></li><li><a title="Bybit launches bug bounty program" rel="nofollow" href="https://www.bybit.com/en/press/post/bybit-launches-recovery-bounty-program-with-rewards-up-to-10-of-stolen-funds-bltcd3ebbb9445d5b74">Bybit launches bug bounty program</a></li><li><a title="Lazarus Bounty  " rel="nofollow" href="https://www.lazarusbounty.com/en/">Lazarus Bounty  </a></li><li><a title="Cellebrite zero-day exploit used to target phone of Serbian student activist " rel="nofollow" href="https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/">Cellebrite zero-day exploit used to target phone of Serbian student activist </a></li><li><a title="Trump administration retreats in fight against Russian cyber threats" rel="nofollow" href="https://www.theguardian.com/us-news/2025/feb/28/trump-russia-hacking-cyber-security">Trump administration retreats in fight against Russian cyber threats</a></li><li><a title="Hegseth orders Cyber Command to stand down on Russia planning" rel="nofollow" href="https://therecord.media/hegseth-orders-cyber-command-stand-down-russia-planning">Hegseth orders Cyber Command to stand down on Russia planning</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+HlQEfuN2</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+HlQEfuN2" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>North Korea's biggest ever crypto heist: $1.4B stolen from Bybit</title>
      <link>http://securityconversations.fireside.fm/north-korea-biggest-crypto-heist-apple-icloud-backups</link>
      <guid isPermaLink="false">55aed9b5-d21a-47d5-8be2-1b104468b4fe</guid>
      <pubDate>Sun, 23 Feb 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/55aed9b5-d21a-47d5-8be2-1b104468b4fe.mp3" length="102684885" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 35: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK. We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espionage against China’s top universities, Chinese hacking gangs moonlighting as ransomware criminals, and Russian APTs abusing Signal’s “linked devices” feature. Plus, Costin explains Microsoft’s quantum computing breakthrough.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:07:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/55aed9b5-d21a-47d5-8be2-1b104468b4fe/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 35</strong>: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK.  We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espionage against China’s top universities, Chinese hacking gangs moonlighting as ransomware criminals, and Russian APTs abusing Signal’s “linked devices” feature. Plus, Costin explains Microsoft’s quantum computing breakthrough.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Citizen Lab, QuaDream, Apple, iCloud, Citizen Lab, Microsoft, Lazarus, ByBit, NSA, China, Russia, Signal, Quantum</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 35</strong>: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK.  We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espionage against China’s top universities, Chinese hacking gangs moonlighting as ransomware criminals, and Russian APTs abusing Signal’s “linked devices” feature. Plus, Costin explains Microsoft’s quantum computing breakthrough.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ZDN0kPbt0SY0cL2draq1L0347ZKSmMAoIVynCOz-1ns/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="DistrictCon: Dissecting a QuaDream iOS zero-day" rel="nofollow" href="https://www.districtcon.org/bios-and-talks-2025/sweetquadreams-or-nightmare-before-christmas">DistrictCon: Dissecting a QuaDream iOS zero-day</a></li><li><a title="Unpacking the UK government&#39;s secret iCloud backdoor demand" rel="nofollow" href="https://securityconversations.com/episode/unpacking-the-uk-governments-secret-icloud-backdoor-demand/">Unpacking the UK government's secret iCloud backdoor demand</a></li><li><a title="U.K. orders Apple to let it spy on users’ encrypted accounts" rel="nofollow" href="https://archive.ph/E6l15">U.K. orders Apple to let it spy on users’ encrypted accounts</a></li><li><a title="Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand" rel="nofollow" href="https://www.securityweek.com/apple-pulls-advanced-data-protection-for-new-uk-users-amid-backdoor-demand/">Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand</a></li><li><a title="Bybit Sees Over $4 Billion ‘Bank Run’ After Crypto’s Biggest Hack" rel="nofollow" href="https://www.coindesk.com/business/2025/02/22/bybit-sees-over-usd4-billion-bank-run-after-crypto-s-biggest-hack">Bybit Sees Over $4 Billion ‘Bank Run’ After Crypto’s Biggest Hack</a></li><li><a title="ByBit CEO explains crypto heist" rel="nofollow" href="https://x.com/benbybit/status/1892963530422505586">ByBit CEO explains crypto heist</a></li><li><a title="iVerify on Pegasus infections" rel="nofollow" href="https://iverify.io/blog/how-democratizing-threat-hunting-is-changing-mobile-security">iVerify on Pegasus infections</a></li><li><a title="Is there a Pangu Team/i-SOON connection?" rel="nofollow" href="https://nattothoughts.substack.com/p/the-pangu-teamios-jailbreak-and-vulnerability">Is there a Pangu Team/i-SOON connection?</a></li><li><a title="Russian hackers actively targeting Signal Messenger" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger">Russian hackers actively targeting Signal Messenger</a></li><li><a title="How Russian APTs abuse Signal &#39;linked devices&#39; for real-time spying" rel="nofollow" href="https://www.securityweek.com/how-russian-hackers-are-exploiting-signals-linked-devices-for-real-time-spying/">How Russian APTs abuse Signal 'linked devices' for real-time spying</a></li><li><a title="Cisco Talos: In the midst of a Typhoon" rel="nofollow" href="https://blog.talosintelligence.com/salt-typhoon-analysis/">Cisco Talos: In the midst of a Typhoon</a></li><li><a title="Satya Nadella: Reflections on a quantum computing breakthrough" rel="nofollow" href="https://x.com/satyanadella/status/1892242895094313420">Satya Nadella: Reflections on a quantum computing breakthrough</a></li><li><a title="Taiwan wants to ban Fortinet, Zoom" rel="nofollow" href="https://www.taipeitimes.com/News/taiwan/archives/2020/06/18/2003738438">Taiwan wants to ban Fortinet, Zoom</a></li><li><a title="Pangu Team Bvp47 report" rel="nofollow" href="https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf">Pangu Team Bvp47 report</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 35</strong>: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK.  We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espionage against China’s top universities, Chinese hacking gangs moonlighting as ransomware criminals, and Russian APTs abusing Signal’s “linked devices” feature. Plus, Costin explains Microsoft’s quantum computing breakthrough.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ZDN0kPbt0SY0cL2draq1L0347ZKSmMAoIVynCOz-1ns/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="DistrictCon: Dissecting a QuaDream iOS zero-day" rel="nofollow" href="https://www.districtcon.org/bios-and-talks-2025/sweetquadreams-or-nightmare-before-christmas">DistrictCon: Dissecting a QuaDream iOS zero-day</a></li><li><a title="Unpacking the UK government&#39;s secret iCloud backdoor demand" rel="nofollow" href="https://securityconversations.com/episode/unpacking-the-uk-governments-secret-icloud-backdoor-demand/">Unpacking the UK government's secret iCloud backdoor demand</a></li><li><a title="U.K. orders Apple to let it spy on users’ encrypted accounts" rel="nofollow" href="https://archive.ph/E6l15">U.K. orders Apple to let it spy on users’ encrypted accounts</a></li><li><a title="Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand" rel="nofollow" href="https://www.securityweek.com/apple-pulls-advanced-data-protection-for-new-uk-users-amid-backdoor-demand/">Apple Pulls Advanced Data Protection for New UK Users Amid Backdoor Demand</a></li><li><a title="Bybit Sees Over $4 Billion ‘Bank Run’ After Crypto’s Biggest Hack" rel="nofollow" href="https://www.coindesk.com/business/2025/02/22/bybit-sees-over-usd4-billion-bank-run-after-crypto-s-biggest-hack">Bybit Sees Over $4 Billion ‘Bank Run’ After Crypto’s Biggest Hack</a></li><li><a title="ByBit CEO explains crypto heist" rel="nofollow" href="https://x.com/benbybit/status/1892963530422505586">ByBit CEO explains crypto heist</a></li><li><a title="iVerify on Pegasus infections" rel="nofollow" href="https://iverify.io/blog/how-democratizing-threat-hunting-is-changing-mobile-security">iVerify on Pegasus infections</a></li><li><a title="Is there a Pangu Team/i-SOON connection?" rel="nofollow" href="https://nattothoughts.substack.com/p/the-pangu-teamios-jailbreak-and-vulnerability">Is there a Pangu Team/i-SOON connection?</a></li><li><a title="Russian hackers actively targeting Signal Messenger" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger">Russian hackers actively targeting Signal Messenger</a></li><li><a title="How Russian APTs abuse Signal &#39;linked devices&#39; for real-time spying" rel="nofollow" href="https://www.securityweek.com/how-russian-hackers-are-exploiting-signals-linked-devices-for-real-time-spying/">How Russian APTs abuse Signal 'linked devices' for real-time spying</a></li><li><a title="Cisco Talos: In the midst of a Typhoon" rel="nofollow" href="https://blog.talosintelligence.com/salt-typhoon-analysis/">Cisco Talos: In the midst of a Typhoon</a></li><li><a title="Satya Nadella: Reflections on a quantum computing breakthrough" rel="nofollow" href="https://x.com/satyanadella/status/1892242895094313420">Satya Nadella: Reflections on a quantum computing breakthrough</a></li><li><a title="Taiwan wants to ban Fortinet, Zoom" rel="nofollow" href="https://www.taipeitimes.com/News/taiwan/archives/2020/06/18/2003738438">Taiwan wants to ban Fortinet, Zoom</a></li><li><a title="Pangu Team Bvp47 report" rel="nofollow" href="https://www.pangulab.cn/files/The_Bvp47_a_top-tier_backdoor_of_us_nsa_equation_group.en.pdf">Pangu Team Bvp47 report</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+jxqc4xXr</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+jxqc4xXr" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>An 'extremely sophisticated' iPhone hack; Google flags major AMD microcode bug</title>
      <link>http://securityconversations.fireside.fm/iphone-exploited-0day-amd-microcode</link>
      <guid isPermaLink="false">5ba11788-5a89-4134-81c1-fae481c8c05f</guid>
      <pubDate>Sat, 15 Feb 2025 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5ba11788-5a89-4134-81c1-fae481c8c05f.mp3" length="69262992" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 34: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>1:25:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5ba11788-5a89-4134-81c1-fae481c8c05f/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 34</strong>: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>apple, zero-day, patch tuesday, microsoft, beyondtrust, rapid7, amd, microcode, binarly, google, MSTIC, china, russia, CrowdStrike</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 34</strong>: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1aYtBxxmypz4Tnjf4p7by8urvQ15CISg-xYC_D0_yCCU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Apple iOS 18.3.1 zero-day bulletin" rel="nofollow" href="https://support.apple.com/en-us/122174">Apple iOS 18.3.1 zero-day bulletin</a></li><li><a title="Apple Says iPhone USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack" rel="nofollow" href="https://www.securityweek.com/apple-confirms-usb-restricted-mode-exploited-in-extremely-sophisticated-attack/">Apple Says iPhone USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack</a></li><li><a title="Quarkslab: Analysis of USB Restricted Mode bypass (CVE-2025-24200)" rel="nofollow" href="https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html">Quarkslab: Analysis of USB Restricted Mode bypass (CVE-2025-24200)</a></li><li><a title="ZDI Patch Tuesday recap (exploited Windows 0days)" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/2/11/the-february-2025-security-update-review">ZDI Patch Tuesday recap (exploited Windows 0days)</a></li><li><a title="The BadPilot campaign (Seashell Blizzard subgroup)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/">The BadPilot campaign (Seashell Blizzard subgroup)</a></li><li><a title="Rapid7 on PostgreSQL zero-day linked to BeyondTrust 0days" rel="nofollow" href="https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis">Rapid7 on PostgreSQL zero-day linked to BeyondTrust 0days</a></li><li><a title="PostgreSQL 0day advisory (CVE-2025-1094)" rel="nofollow" href="https://www.postgresql.org/support/security/CVE-2025-1094/">PostgreSQL 0day advisory (CVE-2025-1094)</a></li><li><a title="Google partial disclosure of high-risk flaw in AMD microcode" rel="nofollow" href="https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w">Google partial disclosure of high-risk flaw in AMD microcode</a></li><li><a title="AMD SEV Confidential Computing Vulnerability (CVE-2024-56161)" rel="nofollow" href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html">AMD SEV Confidential Computing Vulnerability (CVE-2024-56161)</a></li><li><a title="Fortinet documents another exploited 0day" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-24-535">Fortinet documents another exploited 0day</a></li><li><a title="Storm-2372 conducts device code phishing campaign" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/">Storm-2372 conducts device code phishing campaign</a></li><li><a title="CrowdStrike on malware naming schemes" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/how-adversary-taxonomies-strengthen-global-security/">CrowdStrike on malware naming schemes</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 34</strong>: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1aYtBxxmypz4Tnjf4p7by8urvQ15CISg-xYC_D0_yCCU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Apple iOS 18.3.1 zero-day bulletin" rel="nofollow" href="https://support.apple.com/en-us/122174">Apple iOS 18.3.1 zero-day bulletin</a></li><li><a title="Apple Says iPhone USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack" rel="nofollow" href="https://www.securityweek.com/apple-confirms-usb-restricted-mode-exploited-in-extremely-sophisticated-attack/">Apple Says iPhone USB Restricted Mode Exploited in ‘Extremely Sophisticated’ Attack</a></li><li><a title="Quarkslab: Analysis of USB Restricted Mode bypass (CVE-2025-24200)" rel="nofollow" href="https://blog.quarkslab.com/first-analysis-of-apples-usb-restricted-mode-bypass-cve-2025-24200.html">Quarkslab: Analysis of USB Restricted Mode bypass (CVE-2025-24200)</a></li><li><a title="ZDI Patch Tuesday recap (exploited Windows 0days)" rel="nofollow" href="https://www.zerodayinitiative.com/blog/2025/2/11/the-february-2025-security-update-review">ZDI Patch Tuesday recap (exploited Windows 0days)</a></li><li><a title="The BadPilot campaign (Seashell Blizzard subgroup)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/02/12/the-badpilot-campaign-seashell-blizzard-subgroup-conducts-multiyear-global-access-operation/">The BadPilot campaign (Seashell Blizzard subgroup)</a></li><li><a title="Rapid7 on PostgreSQL zero-day linked to BeyondTrust 0days" rel="nofollow" href="https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis">Rapid7 on PostgreSQL zero-day linked to BeyondTrust 0days</a></li><li><a title="PostgreSQL 0day advisory (CVE-2025-1094)" rel="nofollow" href="https://www.postgresql.org/support/security/CVE-2025-1094/">PostgreSQL 0day advisory (CVE-2025-1094)</a></li><li><a title="Google partial disclosure of high-risk flaw in AMD microcode" rel="nofollow" href="https://github.com/google/security-research/security/advisories/GHSA-4xq7-4mgh-gp6w">Google partial disclosure of high-risk flaw in AMD microcode</a></li><li><a title="AMD SEV Confidential Computing Vulnerability (CVE-2024-56161)" rel="nofollow" href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3019.html">AMD SEV Confidential Computing Vulnerability (CVE-2024-56161)</a></li><li><a title="Fortinet documents another exploited 0day" rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-24-535">Fortinet documents another exploited 0day</a></li><li><a title="Storm-2372 conducts device code phishing campaign" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/02/13/storm-2372-conducts-device-code-phishing-campaign/">Storm-2372 conducts device code phishing campaign</a></li><li><a title="CrowdStrike on malware naming schemes" rel="nofollow" href="https://www.crowdstrike.com/en-us/blog/how-adversary-taxonomies-strengthen-global-security/">CrowdStrike on malware naming schemes</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+pFDeGRM8</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+pFDeGRM8" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Unpacking the UK government's secret iCloud backdoor demand</title>
      <link>http://securityconversations.fireside.fm/apple-cloud-back-up-backdoor</link>
      <guid isPermaLink="false">6b31620f-d604-4f80-b4b8-9c3a1acc658f</guid>
      <pubDate>Sat, 08 Feb 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6b31620f-d604-4f80-b4b8-9c3a1acc658f.mp3" length="119291664" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 33:  In this episode, we unpack the UK government's secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale.  Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hacking, and TikTok-powered election disinformation and interference.

From wormable exploits like Eternal Bue to the realities of AI-based spying, the episode offers a detailed look into how government oversight, private sector collaboration, and shifting market forces have reshaped the way we think about cybersecurity.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:22:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6b31620f-d604-4f80-b4b8-9c3a1acc658f/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 33</strong>:  In this episode, we unpack the UK government&#39;s secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale.  Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hacking, and TikTok-powered election disinformation and interference.</p>

<p>From wormable exploits like Eternal Bue to the realities of AI-based spying, the episode offers a detailed look into how government oversight, private sector collaboration, and shifting market forces have reshaped the way we think about cybersecurity.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>United Kingdom, iCloud, backdoor, Apple, Google, Android, zero-day, VEP, Romania elections</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 33</strong>:  In this episode, we unpack the UK government&#39;s secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale.  Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hacking, and TikTok-powered election disinformation and interference.</p>

<p>From wormable exploits like Eternal Bue to the realities of AI-based spying, the episode offers a detailed look into how government oversight, private sector collaboration, and shifting market forces have reshaped the way we think about cybersecurity.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/14ISO1W7s7togIynY8gUu1EkmMELRFvsCJeMSTDW3aBU/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="UK orders Apple to let it spy on users’ iCloud data" rel="nofollow" href="https://archive.ph/E6l15">UK orders Apple to let it spy on users’ iCloud data</a></li><li><a title="How to turn on Advanced Data Protection for iCloud" rel="nofollow" href="https://support.apple.com/en-us/108756">How to turn on Advanced Data Protection for iCloud</a></li><li><a title="Kim Zetter: US government disclosed 39 zero-days in 2023" rel="nofollow" href="https://www.zetter-zeroday.com/u-s-government-disclosed-39-zero-day-vulnerabilities-in-2023-per-first-ever-report/">Kim Zetter: US government disclosed 39 zero-days in 2023</a></li><li><a title="CISA alert on Trimble zero-day exploitation" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2025/02/07/trimble-releases-security-updates-address-vulnerability-cityworks-software">CISA alert on Trimble zero-day exploitation</a></li><li><a title="France VIGINUM report on foreign digital election interference" rel="nofollow" href="https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/news/article/foreign-digital-interference-publication-of-the-viginum-report-on-information">France VIGINUM report on foreign digital election interference</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 33</strong>:  In this episode, we unpack the UK government&#39;s secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale.  Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hacking, and TikTok-powered election disinformation and interference.</p>

<p>From wormable exploits like Eternal Bue to the realities of AI-based spying, the episode offers a detailed look into how government oversight, private sector collaboration, and shifting market forces have reshaped the way we think about cybersecurity.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/14ISO1W7s7togIynY8gUu1EkmMELRFvsCJeMSTDW3aBU/edit?tab=t.0#heading=h.jbbo41oysex">Transcript (unedited, AI-generated)</a></li><li><a title="UK orders Apple to let it spy on users’ iCloud data" rel="nofollow" href="https://archive.ph/E6l15">UK orders Apple to let it spy on users’ iCloud data</a></li><li><a title="How to turn on Advanced Data Protection for iCloud" rel="nofollow" href="https://support.apple.com/en-us/108756">How to turn on Advanced Data Protection for iCloud</a></li><li><a title="Kim Zetter: US government disclosed 39 zero-days in 2023" rel="nofollow" href="https://www.zetter-zeroday.com/u-s-government-disclosed-39-zero-day-vulnerabilities-in-2023-per-first-ever-report/">Kim Zetter: US government disclosed 39 zero-days in 2023</a></li><li><a title="CISA alert on Trimble zero-day exploitation" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2025/02/07/trimble-releases-security-updates-address-vulnerability-cityworks-software">CISA alert on Trimble zero-day exploitation</a></li><li><a title="France VIGINUM report on foreign digital election interference" rel="nofollow" href="https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/news/article/foreign-digital-interference-publication-of-the-viginum-report-on-information">France VIGINUM report on foreign digital election interference</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+1ywcXQ1r</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+1ywcXQ1r" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Inside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devices</title>
      <link>http://securityconversations.fireside.fm/inside-the-deepseek-ai-existential-crisis</link>
      <guid isPermaLink="false">89f0f4d2-96eb-4a23-b08e-ebd2a9b550a1</guid>
      <pubDate>Fri, 31 Jan 2025 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/89f0f4d2-96eb-4a23-b08e-ebd2a9b550a1.mp3" length="110179568" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 32: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoing debate over IP theft and innovation, and the challenges that come with a Chinese company shipping an open-source alternative.

Beyond AI, we dig into some of the latest headlines; from a Chinese ‘backdoor’ in medical devices, problems with CISA’s backdoor bulletin, the risks of insecure IoT, phishing attacks on influencers, and ongoing battles over censorship in the VPN space. We also touch on WhatsApp catching spyware vendor Paragon Solutions and potential shifts in U.S. government policy on commercial mercenary hacking and surveillance companies.  

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade.</itunes:subtitle>
      <itunes:duration>2:19:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/89f0f4d2-96eb-4a23-b08e-ebd2a9b550a1/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 32</strong>: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoing debate over IP theft and innovation, and the challenges that come with a Chinese company shipping an open-source alternative.</p>

<p>Beyond AI, we dig into some of the latest headlines; from a Chinese ‘backdoor’ in medical devices, problems with CISA’s backdoor bulletin, the risks of insecure IoT, phishing attacks on influencers, and ongoing battles over censorship in the VPN space. We also touch on WhatsApp catching spyware vendor Paragon Solutions and potential shifts in U.S. government policy on commercial mercenary hacking and surveillance companies.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>DeepSeek, AI, OpenAI, privacy, IP theft, China, LLMs, Google, Mandiant, CISA, VPN, backdoor</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 32</strong>: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoing debate over IP theft and innovation, and the challenges that come with a Chinese company shipping an open-source alternative.</p>

<p>Beyond AI, we dig into some of the latest headlines; from a Chinese ‘backdoor’ in medical devices, problems with CISA’s backdoor bulletin, the risks of insecure IoT, phishing attacks on influencers, and ongoing battles over censorship in the VPN space. We also touch on WhatsApp catching spyware vendor Paragon Solutions and potential shifts in U.S. government policy on commercial mercenary hacking and surveillance companies.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Vg9du9EcqqdpQ-p4QJIcRu84XynZ5pFSAn8Q2CAoij8/edit?tab=t.0#heading=h.ywmge3vqzj3r">Transcript (unedited, AI-generated)</a></li><li><a title="DeepSeek Privacy Policy" rel="nofollow" href="https://archive.ph/PS9lR">DeepSeek Privacy Policy</a></li><li><a title="White House evaluates effect of China AI app DeepSeek on national security" rel="nofollow" href="https://www.reuters.com/technology/artificial-intelligence/white-house-evaluates-china-ai-app-deepseeks-affect-national-security-official-2025-01-28/">White House evaluates effect of China AI app DeepSeek on national security</a></li><li><a title="Why ‘Distillation’ Has Become the Scariest Word for AI Companies" rel="nofollow" href="https://archive.ph/uLjU4">Why ‘Distillation’ Has Become the Scariest Word for AI Companies</a></li><li><a title="Microsoft Probing If DeepSeek-Linked Group Improperly Obtained OpenAI Data" rel="nofollow" href="https://archive.ph/QAZNI">Microsoft Probing If DeepSeek-Linked Group Improperly Obtained OpenAI Data</a></li><li><a title="U.S. Navy bans use of DeepSeek AI" rel="nofollow" href="https://www.cnbc.com/2025/01/28/us-navy-restricts-use-of-deepseek-ai-imperative-to-avoid-using.html">U.S. Navy bans use of DeepSeek AI</a></li><li><a title="Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information" rel="nofollow" href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information</a></li><li><a title="ScatterBrain: Unmasking the Shadow of PoisonPlug&#39;s Obfuscator" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/scatterbrain-unmasking-poisonplug-obfuscator">ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator</a></li><li><a title="ScatterBrain: Deobfuscation library for PoisionPlug.SHADOW&#39;s ScatterBrain obfuscator" rel="nofollow" href="https://github.com/mandiant/poisonplug-scatterbrain">ScatterBrain: Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator</a></li><li><a title="CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors" rel="nofollow" href="https://www.securityweek.com/cisa-fda-warn-of-dangerous-backdoor-in-contec-patient-monitors/">CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors</a></li><li><a title="CISA advisory: Contec CMS8000 contains a backdoor" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf">CISA advisory: Contec CMS8000 contains a backdoor</a></li><li><a title="Contec CMS 8000 product manual" rel="nofollow" href="https://www.gimaitaly.com/DocumentiGIMA/Manuali/EN/M35152EN.pdf">Contec CMS 8000 product manual</a></li><li><a title="NordVPN NordWhisper" rel="nofollow" href="https://nordvpn.com/blog/nordwhisper-protocol/">NordVPN NordWhisper</a></li><li><a title="WhatsApp: Spyware company Paragon targeted users in two dozen countries" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/">WhatsApp: Spyware company Paragon targeted users in two dozen countries</a></li><li><a title="X Phishing Campaign Targeting High Profile Accounts, Promoting Crypto Scams" rel="nofollow" href="https://www.sentinelone.com/labs/phishing-on-x-high-profile-account-targeting-campaign-returns/">X Phishing Campaign Targeting High Profile Accounts, Promoting Crypto Scams</a></li><li><a title="LABScon24: Follow the Money -- CCP’s Ownership of Firms Investing in the USA (Elly Rostoum)" rel="nofollow" href="https://www.youtube.com/watch?v=glyHKbaS4Fs&amp;ab_channel=SentinelOne">LABScon24: Follow the Money -- CCP’s Ownership of Firms Investing in the USA (Elly Rostoum)</a></li><li><a title="Binarly Post-Quantum Readiness Technology" rel="nofollow" href="https://www.binarly.io/blog/binarly-transparency-platform-v2-7-propels-enterprises-toward-post-quantum-readiness">Binarly Post-Quantum Readiness Technology</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 32</strong>: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoing debate over IP theft and innovation, and the challenges that come with a Chinese company shipping an open-source alternative.</p>

<p>Beyond AI, we dig into some of the latest headlines; from a Chinese ‘backdoor’ in medical devices, problems with CISA’s backdoor bulletin, the risks of insecure IoT, phishing attacks on influencers, and ongoing battles over censorship in the VPN space. We also touch on WhatsApp catching spyware vendor Paragon Solutions and potential shifts in U.S. government policy on commercial mercenary hacking and surveillance companies.  </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Vg9du9EcqqdpQ-p4QJIcRu84XynZ5pFSAn8Q2CAoij8/edit?tab=t.0#heading=h.ywmge3vqzj3r">Transcript (unedited, AI-generated)</a></li><li><a title="DeepSeek Privacy Policy" rel="nofollow" href="https://archive.ph/PS9lR">DeepSeek Privacy Policy</a></li><li><a title="White House evaluates effect of China AI app DeepSeek on national security" rel="nofollow" href="https://www.reuters.com/technology/artificial-intelligence/white-house-evaluates-china-ai-app-deepseeks-affect-national-security-official-2025-01-28/">White House evaluates effect of China AI app DeepSeek on national security</a></li><li><a title="Why ‘Distillation’ Has Become the Scariest Word for AI Companies" rel="nofollow" href="https://archive.ph/uLjU4">Why ‘Distillation’ Has Become the Scariest Word for AI Companies</a></li><li><a title="Microsoft Probing If DeepSeek-Linked Group Improperly Obtained OpenAI Data" rel="nofollow" href="https://archive.ph/QAZNI">Microsoft Probing If DeepSeek-Linked Group Improperly Obtained OpenAI Data</a></li><li><a title="U.S. Navy bans use of DeepSeek AI" rel="nofollow" href="https://www.cnbc.com/2025/01/28/us-navy-restricts-use-of-deepseek-ai-imperative-to-avoid-using.html">U.S. Navy bans use of DeepSeek AI</a></li><li><a title="Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information" rel="nofollow" href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information</a></li><li><a title="ScatterBrain: Unmasking the Shadow of PoisonPlug&#39;s Obfuscator" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/scatterbrain-unmasking-poisonplug-obfuscator">ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator</a></li><li><a title="ScatterBrain: Deobfuscation library for PoisionPlug.SHADOW&#39;s ScatterBrain obfuscator" rel="nofollow" href="https://github.com/mandiant/poisonplug-scatterbrain">ScatterBrain: Deobfuscation library for PoisionPlug.SHADOW's ScatterBrain obfuscator</a></li><li><a title="CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors" rel="nofollow" href="https://www.securityweek.com/cisa-fda-warn-of-dangerous-backdoor-in-contec-patient-monitors/">CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors</a></li><li><a title="CISA advisory: Contec CMS8000 contains a backdoor" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf">CISA advisory: Contec CMS8000 contains a backdoor</a></li><li><a title="Contec CMS 8000 product manual" rel="nofollow" href="https://www.gimaitaly.com/DocumentiGIMA/Manuali/EN/M35152EN.pdf">Contec CMS 8000 product manual</a></li><li><a title="NordVPN NordWhisper" rel="nofollow" href="https://nordvpn.com/blog/nordwhisper-protocol/">NordVPN NordWhisper</a></li><li><a title="WhatsApp: Spyware company Paragon targeted users in two dozen countries" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/metas-whatsapp-says-israeli-spyware-company-paragon-targeted-scores-users-2025-01-31/">WhatsApp: Spyware company Paragon targeted users in two dozen countries</a></li><li><a title="X Phishing Campaign Targeting High Profile Accounts, Promoting Crypto Scams" rel="nofollow" href="https://www.sentinelone.com/labs/phishing-on-x-high-profile-account-targeting-campaign-returns/">X Phishing Campaign Targeting High Profile Accounts, Promoting Crypto Scams</a></li><li><a title="LABScon24: Follow the Money -- CCP’s Ownership of Firms Investing in the USA (Elly Rostoum)" rel="nofollow" href="https://www.youtube.com/watch?v=glyHKbaS4Fs&amp;ab_channel=SentinelOne">LABScon24: Follow the Money -- CCP’s Ownership of Firms Investing in the USA (Elly Rostoum)</a></li><li><a title="Binarly Post-Quantum Readiness Technology" rel="nofollow" href="https://www.binarly.io/blog/binarly-transparency-platform-v2-7-propels-enterprises-toward-post-quantum-readiness">Binarly Post-Quantum Readiness Technology</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+JuDEsgTe</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+JuDEsgTe" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Death of the CSRB, zero-days storms at the edge, Juniper router backdoors</title>
      <link>http://securityconversations.fireside.fm/zero-day-storms-death-of-crsb</link>
      <guid isPermaLink="false">a8b5e326-37a9-40ab-b769-f92834d95934</guid>
      <pubDate>Fri, 24 Jan 2025 14:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a8b5e326-37a9-40ab-b769-f92834d95934.mp3" length="91593748" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. 

Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. 

Cast: Dennis Fisher (guest host), Costin Raiu and Juan Andres Guerrero-Saade.

* Ryan Naraine is on work travel.</itunes:subtitle>
      <itunes:duration>1:48:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a8b5e326-37a9-40ab-b769-f92834d95934/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 31</strong>: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. </p>

<p>Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and Dennis Fisher.</p>

<ul>
<li><a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> in on work travel.</li>
</ul>]]>
      </description>
      <itunes:keywords>CSRB, CISA, FBI, Ivanti, SonicWall, network appliances, end-of-life devices, APTs, IOCs, YARA, Black Lotus Labs</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 31</strong>: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. </p>

<p>Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and Dennis Fisher.</p>

<ul>
<li><a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> in on work travel.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qT2olnStWy4-0PWd6KdBNHAG20hJxe83zyGqXO7_B9Y/edit?tab=t.0#heading=h.ywmge3vqzj3r">Transcript (unedited, AI-generated)</a></li><li><a title="DHS Disbands Cyber Safety Review Board, Ending One of CISA’s Few Bright Spots" rel="nofollow" href="https://www.securityweek.com/dhs-disbands-cyber-safety-review-board-ending-one-of-cisas-few-bright-spots/">DHS Disbands Cyber Safety Review Board, Ending One of CISA’s Few Bright Spots</a></li><li><a title="CSRB report on Microsoft Exchange Online Intrusion" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft Exchange Online Intrusion</a></li><li><a title="Senator Ron Wyden on CSRB disbandment" rel="nofollow" href="https://bsky.app/profile/wyden.senate.gov/post/3lgbvtdltic2h">Senator Ron Wyden on CSRB disbandment</a></li><li><a title="CISA CSRB: good riddance" rel="nofollow" href="https://cybersect.substack.com/p/cisa-csrb-good-riddance">CISA CSRB: good riddance</a></li><li><a title="Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a">Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications</a></li><li><a title="SonicWall confirms new 0day exploited in the wild" rel="nofollow" href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002">SonicWall confirms new 0day exploited in the wild</a></li><li><a title="The J-Magic Show: Magic Packets and Where to Find Them" rel="nofollow" href="https://blog.lumen.com/the-j-magic-show-magic-packets-and-where-to-find-them/">The J-Magic Show: Magic Packets and Where to Find Them</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 31</strong>: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. </p>

<p>Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and Dennis Fisher.</p>

<ul>
<li><a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> in on work travel.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1qT2olnStWy4-0PWd6KdBNHAG20hJxe83zyGqXO7_B9Y/edit?tab=t.0#heading=h.ywmge3vqzj3r">Transcript (unedited, AI-generated)</a></li><li><a title="DHS Disbands Cyber Safety Review Board, Ending One of CISA’s Few Bright Spots" rel="nofollow" href="https://www.securityweek.com/dhs-disbands-cyber-safety-review-board-ending-one-of-cisas-few-bright-spots/">DHS Disbands Cyber Safety Review Board, Ending One of CISA’s Few Bright Spots</a></li><li><a title="CSRB report on Microsoft Exchange Online Intrusion" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft Exchange Online Intrusion</a></li><li><a title="Senator Ron Wyden on CSRB disbandment" rel="nofollow" href="https://bsky.app/profile/wyden.senate.gov/post/3lgbvtdltic2h">Senator Ron Wyden on CSRB disbandment</a></li><li><a title="CISA CSRB: good riddance" rel="nofollow" href="https://cybersect.substack.com/p/cisa-csrb-good-riddance">CISA CSRB: good riddance</a></li><li><a title="Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a">Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications</a></li><li><a title="SonicWall confirms new 0day exploited in the wild" rel="nofollow" href="https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002">SonicWall confirms new 0day exploited in the wild</a></li><li><a title="The J-Magic Show: Magic Packets and Where to Find Them" rel="nofollow" href="https://blog.lumen.com/the-j-magic-show-magic-packets-and-where-to-find-them/">The J-Magic Show: Magic Packets and Where to Find Them</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+d5Fkx8ht</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+d5Fkx8ht" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day</title>
      <link>http://securityconversations.fireside.fm/cisa-victory-lap-plugx-removal-tiktok-ban</link>
      <guid isPermaLink="false">f31e117e-f570-453a-862f-604a0314c90b</guid>
      <pubDate>Fri, 17 Jan 2025 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f31e117e-f570-453a-862f-604a0314c90b.mp3" length="95741011" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 30: We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. 

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
      <itunes:duration>1:59:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f31e117e-f570-453a-862f-604a0314c90b/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 30</strong>:  We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Sekoia, PlugX, FBI, China, CISA, Secure by Design Pledge, Jen Easterly, Executive Order, Fortinet, zero-day, TikTok, mobile tracking</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 30</strong>:  We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1HS3gbpFtueD9eaOkBNbgS5Hg-x7SNSKudF9gx84_qMU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-and-fbi-conduct-international-operation-delete-malware-used-china-backed">Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers</a></li><li><a title="PlugX removal affidavit" rel="nofollow" href="https://www.justice.gov/opa/media/1384136/dl">PlugX removal affidavit</a></li><li><a title="Sekoia -- PlugX worm disinfection campaign" rel="nofollow" href="https://blog.sekoia.io/plugx-worm-disinfection-campaign-feedbacks/">Sekoia -- PlugX worm disinfection campaign</a></li><li><a title="Jen Easterly: Building a secure by Design ecosystem " rel="nofollow" href="https://www.cisa.gov/news-events/news/building-secure-design-ecosystem">Jen Easterly: Building a secure by Design ecosystem </a></li><li><a title="Trump zeroes in on Sean Plankey to lead CISA" rel="nofollow" href="https://www.politico.com/live-updates/2025/01/15/congress/sean-plankey-likely-to-lead-u-s-cyber-agency-00198382">Trump zeroes in on Sean Plankey to lead CISA</a></li><li><a title="Sean Plankey bio" rel="nofollow" href="https://www.sans.org/profiles/sean-plankey/">Sean Plankey bio</a></li><li><a title="Biden cybersecurity executive order" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/">Biden cybersecurity executive order</a></li><li><a title="Biden executive order aims to shore up US cyber defenses" rel="nofollow" href="https://apnews.com/article/cybersecurity-biden-trump-china-russia-ai-quantum-3fc53784ad9d1c05d7de85224a762a36">Biden executive order aims to shore up US cyber defenses</a></li><li><a title="Gravy Analytics accused of negligence over location data breach" rel="nofollow" href="https://news.bloomberglaw.com/privacy-and-data-security/gravy-analytics-accused-of-negligence-over-location-data-breach">Gravy Analytics accused of negligence over location data breach</a></li><li><a title="Tracking the mobile trackers (Costin Raiu) - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=EG6sZA1N8NU&amp;ab_channel=OPCDE">Tracking the mobile trackers (Costin Raiu) - YouTube</a></li><li><a title="Russia&#39;s largest platform for state procurement hit by cyberattack from pro-Ukraine group" rel="nofollow" href="https://therecord.media/russian-platform-for-state-procurement-hit-cyberattack">Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group</a></li><li><a title="New Star Blizzard spear-phishing campaign targets WhatsApp accounts" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/">New Star Blizzard spear-phishing campaign targets WhatsApp accounts</a></li><li><a title="UK proposes ransomware payment ban" rel="nofollow" href="https://www.gov.uk/government/news/world-leading-proposals-to-protect-businesses-from-cybercrime">UK proposes ransomware payment ban</a></li><li><a title="Fortinet authentication bypass zero-day " rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-24-535">Fortinet authentication bypass zero-day </a></li><li><a title="Fortinet: Deep dive into a Linux rootkit malware" rel="nofollow" href="https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware">Fortinet: Deep dive into a Linux rootkit malware</a></li><li><a title="Bernardo Quintero&#39;s new book on VirusTotal (Spanish-language)" rel="nofollow" href="https://www.amazon.com/Infectado-Spectrum-emprendedor-accidental-Spanish/dp/8409666227/ref=sr_1_1?crid=27KFPUV4ECRH7&amp;dib=eyJ2IjoiMSJ9.RtftyW4qSxl2Q07QPDYz0JgOYLm_jlK0D5e4quXsVNSmjtQQ8abhBlRIA-Nf7U52lLy4zw2gX2NTgPAbcbW6n4rBuiAXNmN3-GgGABAjMjDXf_3a6-W0W9zIyiKdEYRWl2rlphl_tl5MwyE5wHHlBouzn8aE8_GS_Lk478PIl5G-bFxbGPG9Gd8OAzKjHaxqUbf7P4jpSzKvIsumlR5eaI3rVPfdcdYXyLaGM_LpxGk.B0D0HYHfmenDvtslyNwXiMtNFrsxLEiihfv4twDd4t8&amp;dib_tag=se&amp;keywords=bernardo+quintero&amp;qid=1737143167&amp;sprefix=%2Caps%2C143&amp;sr=8-1">Bernardo Quintero's new book on VirusTotal (Spanish-language)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 30</strong>:  We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1HS3gbpFtueD9eaOkBNbgS5Hg-x7SNSKudF9gx84_qMU/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-and-fbi-conduct-international-operation-delete-malware-used-china-backed">Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. Computers</a></li><li><a title="PlugX removal affidavit" rel="nofollow" href="https://www.justice.gov/opa/media/1384136/dl">PlugX removal affidavit</a></li><li><a title="Sekoia -- PlugX worm disinfection campaign" rel="nofollow" href="https://blog.sekoia.io/plugx-worm-disinfection-campaign-feedbacks/">Sekoia -- PlugX worm disinfection campaign</a></li><li><a title="Jen Easterly: Building a secure by Design ecosystem " rel="nofollow" href="https://www.cisa.gov/news-events/news/building-secure-design-ecosystem">Jen Easterly: Building a secure by Design ecosystem </a></li><li><a title="Trump zeroes in on Sean Plankey to lead CISA" rel="nofollow" href="https://www.politico.com/live-updates/2025/01/15/congress/sean-plankey-likely-to-lead-u-s-cyber-agency-00198382">Trump zeroes in on Sean Plankey to lead CISA</a></li><li><a title="Sean Plankey bio" rel="nofollow" href="https://www.sans.org/profiles/sean-plankey/">Sean Plankey bio</a></li><li><a title="Biden cybersecurity executive order" rel="nofollow" href="https://www.whitehouse.gov/briefing-room/presidential-actions/2025/01/16/executive-order-on-strengthening-and-promoting-innovation-in-the-nations-cybersecurity/">Biden cybersecurity executive order</a></li><li><a title="Biden executive order aims to shore up US cyber defenses" rel="nofollow" href="https://apnews.com/article/cybersecurity-biden-trump-china-russia-ai-quantum-3fc53784ad9d1c05d7de85224a762a36">Biden executive order aims to shore up US cyber defenses</a></li><li><a title="Gravy Analytics accused of negligence over location data breach" rel="nofollow" href="https://news.bloomberglaw.com/privacy-and-data-security/gravy-analytics-accused-of-negligence-over-location-data-breach">Gravy Analytics accused of negligence over location data breach</a></li><li><a title="Tracking the mobile trackers (Costin Raiu) - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=EG6sZA1N8NU&amp;ab_channel=OPCDE">Tracking the mobile trackers (Costin Raiu) - YouTube</a></li><li><a title="Russia&#39;s largest platform for state procurement hit by cyberattack from pro-Ukraine group" rel="nofollow" href="https://therecord.media/russian-platform-for-state-procurement-hit-cyberattack">Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group</a></li><li><a title="New Star Blizzard spear-phishing campaign targets WhatsApp accounts" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2025/01/16/new-star-blizzard-spear-phishing-campaign-targets-whatsapp-accounts/">New Star Blizzard spear-phishing campaign targets WhatsApp accounts</a></li><li><a title="UK proposes ransomware payment ban" rel="nofollow" href="https://www.gov.uk/government/news/world-leading-proposals-to-protect-businesses-from-cybercrime">UK proposes ransomware payment ban</a></li><li><a title="Fortinet authentication bypass zero-day " rel="nofollow" href="https://fortiguard.fortinet.com/psirt/FG-IR-24-535">Fortinet authentication bypass zero-day </a></li><li><a title="Fortinet: Deep dive into a Linux rootkit malware" rel="nofollow" href="https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware">Fortinet: Deep dive into a Linux rootkit malware</a></li><li><a title="Bernardo Quintero&#39;s new book on VirusTotal (Spanish-language)" rel="nofollow" href="https://www.amazon.com/Infectado-Spectrum-emprendedor-accidental-Spanish/dp/8409666227/ref=sr_1_1?crid=27KFPUV4ECRH7&amp;dib=eyJ2IjoiMSJ9.RtftyW4qSxl2Q07QPDYz0JgOYLm_jlK0D5e4quXsVNSmjtQQ8abhBlRIA-Nf7U52lLy4zw2gX2NTgPAbcbW6n4rBuiAXNmN3-GgGABAjMjDXf_3a6-W0W9zIyiKdEYRWl2rlphl_tl5MwyE5wHHlBouzn8aE8_GS_Lk478PIl5G-bFxbGPG9Gd8OAzKjHaxqUbf7P4jpSzKvIsumlR5eaI3rVPfdcdYXyLaGM_LpxGk.B0D0HYHfmenDvtslyNwXiMtNFrsxLEiihfv4twDd4t8&amp;dib_tag=se&amp;keywords=bernardo+quintero&amp;qid=1737143167&amp;sprefix=%2Caps%2C143&amp;sr=8-1">Bernardo Quintero's new book on VirusTotal (Spanish-language)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+u-wr0lby</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+u-wr0lby" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Hijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vuln</title>
      <link>http://securityconversations.fireside.fm/ivanti-zero-day-samsung-zero-click-china-blame</link>
      <guid isPermaLink="false">84744251-fc7f-4c4c-bee0-e328e8ae3c02</guid>
      <pubDate>Fri, 10 Jan 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/84744251-fc7f-4c4c-bee0-e328e8ae3c02.mp3" length="91922860" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 29: Another day, another Ivanti zero-day being exploited in the wild.  Plus, China's strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter's reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors and Ukrainian hacktivists wiping a major Russian ISP.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
      <itunes:duration>1:48:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/84744251-fc7f-4c4c-bee0-e328e8ae3c02/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 29</strong>:  Another day, another Ivanti zero-day being exploited in the wild.  Plus, China&#39;s strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter&#39;s reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors and Ukrainian hacktivists wiping a major Russian ISP.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Ivanti, zero-day, Mandiant, China, Vietnam, Japan, Samsung, zero-click, Project Zero, Nodex, Ukraine Cyber Alliance</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 29</strong>:  Another day, another Ivanti zero-day being exploited in the wild.  Plus, China&#39;s strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter&#39;s reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors and Ukrainian hacktivists wiping a major Russian ISP.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1v4WDMg3bTW_lQ0cYU7LBrlLND9eVBt-wkpw4tLJI3f4/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivanti Connect Secure zero-day advisory" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US">Ivanti Connect Secure zero-day advisory</a></li><li><a title="Mandiant report on new Ivanti zero-day" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day/">Mandiant report on new Ivanti zero-day</a></li><li><a title="China Daily responds to Volt Typhoon attribution" rel="nofollow" href="https://x.com/chinadaily/status/1876581637762457694?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">China Daily responds to Volt Typhoon attribution</a></li><li><a title="Japan warns about Chinese &#39;MirrorFace&#39; attacks" rel="nofollow" href="https://www.npa.go.jp/bureau/cyber/koho/caution/caution20250108.html">Japan warns about Chinese 'MirrorFace' attacks</a></li><li><a title="Who is MirrorFace?" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/mirrorface">Who is MirrorFace?</a></li><li><a title="Natalie Silvanovich on new Samsung 0-click" rel="nofollow" href="https://x.com/natashenka/status/1877507134474109437">Natalie Silvanovich on new Samsung 0-click</a></li><li><a title="Kim Zetter: Anatomy of a Nuclear Scare" rel="nofollow" href="https://www.zetter-zeroday.com/anatomy-of-a-nuclear-scare/">Kim Zetter: Anatomy of a Nuclear Scare</a></li><li><a title="Backdooring .gov backdoors via $20 domains" rel="nofollow" href="https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/">Backdooring .gov backdoors via $20 domains</a></li><li><a title="APT32 poisoning GitHub, targeting Chinese security pros" rel="nofollow" href="https://threatbook.io/blog/APT32-Poisoning-GitHub,-Targeting-Chinese-Cybersecurity-Professionals-and-Specific-Large-Enterprises">APT32 poisoning GitHub, targeting Chinese security pros</a></li><li><a title="Ukraine wipes Russian ISP" rel="nofollow" href="https://vk.com/wall-7622_825">Ukraine wipes Russian ISP</a></li><li><a title="Russian internet provider confirms network ‘destroyed’ by Ukrainian hackers" rel="nofollow" href="https://therecord.media/russian-internet-provider-says-network-destroyed-cyberattack">Russian internet provider confirms network ‘destroyed’ by Ukrainian hackers</a></li><li><a title="Mullvad: Quantum-resistant tunnels on desktop VPN" rel="nofollow" href="https://mullvad.net/en/blog/quantum-resistant-tunnels-are-now-the-default-on-desktop">Mullvad: Quantum-resistant tunnels on desktop VPN</a></li><li><a title="Fundraiser for Marc Rogers" rel="nofollow" href="https://www.gofundme.com/f/support-marc-rogers-road-to-recovery">Fundraiser for Marc Rogers</a></li><li><a title="CNN: Amit Yoran has died at 54 " rel="nofollow" href="https://www.cnn.com/2025/01/04/business/amit-yoran-dies-tenable-ceo/index.html">CNN: Amit Yoran has died at 54 </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 29</strong>:  Another day, another Ivanti zero-day being exploited in the wild.  Plus, China&#39;s strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter&#39;s reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors and Ukrainian hacktivists wiping a major Russian ISP.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1v4WDMg3bTW_lQ0cYU7LBrlLND9eVBt-wkpw4tLJI3f4/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivanti Connect Secure zero-day advisory" rel="nofollow" href="https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US">Ivanti Connect Secure zero-day advisory</a></li><li><a title="Mandiant report on new Ivanti zero-day" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day/">Mandiant report on new Ivanti zero-day</a></li><li><a title="China Daily responds to Volt Typhoon attribution" rel="nofollow" href="https://x.com/chinadaily/status/1876581637762457694?s=46&amp;t=NxSQbkIl4wl2Ei8yYr-9IQ">China Daily responds to Volt Typhoon attribution</a></li><li><a title="Japan warns about Chinese &#39;MirrorFace&#39; attacks" rel="nofollow" href="https://www.npa.go.jp/bureau/cyber/koho/caution/caution20250108.html">Japan warns about Chinese 'MirrorFace' attacks</a></li><li><a title="Who is MirrorFace?" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/mirrorface">Who is MirrorFace?</a></li><li><a title="Natalie Silvanovich on new Samsung 0-click" rel="nofollow" href="https://x.com/natashenka/status/1877507134474109437">Natalie Silvanovich on new Samsung 0-click</a></li><li><a title="Kim Zetter: Anatomy of a Nuclear Scare" rel="nofollow" href="https://www.zetter-zeroday.com/anatomy-of-a-nuclear-scare/">Kim Zetter: Anatomy of a Nuclear Scare</a></li><li><a title="Backdooring .gov backdoors via $20 domains" rel="nofollow" href="https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/">Backdooring .gov backdoors via $20 domains</a></li><li><a title="APT32 poisoning GitHub, targeting Chinese security pros" rel="nofollow" href="https://threatbook.io/blog/APT32-Poisoning-GitHub,-Targeting-Chinese-Cybersecurity-Professionals-and-Specific-Large-Enterprises">APT32 poisoning GitHub, targeting Chinese security pros</a></li><li><a title="Ukraine wipes Russian ISP" rel="nofollow" href="https://vk.com/wall-7622_825">Ukraine wipes Russian ISP</a></li><li><a title="Russian internet provider confirms network ‘destroyed’ by Ukrainian hackers" rel="nofollow" href="https://therecord.media/russian-internet-provider-says-network-destroyed-cyberattack">Russian internet provider confirms network ‘destroyed’ by Ukrainian hackers</a></li><li><a title="Mullvad: Quantum-resistant tunnels on desktop VPN" rel="nofollow" href="https://mullvad.net/en/blog/quantum-resistant-tunnels-are-now-the-default-on-desktop">Mullvad: Quantum-resistant tunnels on desktop VPN</a></li><li><a title="Fundraiser for Marc Rogers" rel="nofollow" href="https://www.gofundme.com/f/support-marc-rogers-road-to-recovery">Fundraiser for Marc Rogers</a></li><li><a title="CNN: Amit Yoran has died at 54 " rel="nofollow" href="https://www.cnn.com/2025/01/04/business/amit-yoran-dies-tenable-ceo/index.html">CNN: Amit Yoran has died at 54 </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+AFyyZir8</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+AFyyZir8" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>US Treasury hacked via BeyondTrust, MISP and the threat actor naming mess</title>
      <link>http://securityconversations.fireside.fm/fixing-threat-actor-naming-mess</link>
      <guid isPermaLink="false">2702a1ec-2c6e-4d8c-902a-5f462b1a93be</guid>
      <pubDate>Fri, 03 Jan 2025 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2702a1ec-2c6e-4d8c-902a-5f462b1a93be.mp3" length="88069225" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 28: In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. 

Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the  Xdr33 CIA Hive malware, and exclusive new information on the Cyberhaven Chrome extension security incident.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
      <itunes:duration>1:49:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2702a1ec-2c6e-4d8c-902a-5f462b1a93be/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 28</strong>:  In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. </p>

<p>Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the  Xdr33 CIA Hive malware, and exclusive new information on the Cyberhaven Chrome extension security incident.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>BeyondTrust, OFAC, zero-day, Salt Typhoon, Aurora, BeyondCorp, Zero Trust, Google, MISP, Threat Intelligence, Synapse, Pink Lambert, Cyberhaven, US Sanctions,  </itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 28</strong>:  In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. </p>

<p>Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the  Xdr33 CIA Hive malware, and exclusive new information on the Cyberhaven Chrome extension security incident.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Fozuh0j1k3EiKJr8mSxP__6O6dQ3iLgAxeEq8f9GKxI/edit?tab=t.0#heading=h.1u39inyn4ent">Transcript (unedited, AI-generated)</a></li><li><a title="BeyondTrust statement on hack investigation" rel="nofollow" href="https://www.beyondtrust.com/remote-support-saas-service-security-investigation">BeyondTrust statement on hack investigation</a></li><li><a title="U.S. Treasury says it was hacked by China-backed actors" rel="nofollow" href="https://archive.ph/0ELY2">U.S. Treasury says it was hacked by China-backed actors</a></li><li><a title="Another Palo Alto 0day exploited in the wild" rel="nofollow" href="https://security.paloaltonetworks.com/CVE-2024-3393">Another Palo Alto 0day exploited in the wild</a></li><li><a title="US telcos say they&#39;ve evicted Salt Typhoon Chinese hackers" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/">US telcos say they've evicted Salt Typhoon Chinese hackers</a></li><li><a title="Google: What is BeyondCorp?" rel="nofollow" href="https://cloud.google.com/beyondcorp">Google: What is BeyondCorp?</a></li><li><a title="Introducing the MISP Threat Actor Naming Standard" rel="nofollow" href="https://www.misp-standard.org/blog/Naming-Threat-Actor/">Introducing the MISP Threat Actor Naming Standard</a></li><li><a title="MISP: Recommendations on Naming Threat Actors" rel="nofollow" href="https://www.misp-standard.org/rfc/threat-actor-naming.html">MISP: Recommendations on Naming Threat Actors</a></li><li><a title="New variant of the CIA HIVE attack kit" rel="nofollow" href="https://x.com/nextronresearch/status/1874690494930014703">New variant of the CIA HIVE attack kit</a></li><li><a title="Xdr33 Variant Of CIA&#39;s HIVE Attack Kit Emerges" rel="nofollow" href="https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/">Xdr33 Variant Of CIA's HIVE Attack Kit Emerges</a></li><li><a title="Savvy Seahorse connection to Cyberhaven incident" rel="nofollow" href="https://blogs.infoblox.com/threat-intelligence/beware-the-shallow-waters-savvy-seahorse-lures-victims-to-fake-investment-platforms-through-facebook-ads/">Savvy Seahorse connection to Cyberhaven incident</a></li><li><a title="US sanctions China&#39;s Integrity Technology over Flax Typhoon hacks" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/us-issues-cybersecurity-sanctions-against-chinas-integrity-technology-2025-01-03/">US sanctions China's Integrity Technology over Flax Typhoon hacks</a></li><li><a title="Operation Aurora" rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Operation Aurora</a></li><li><a title="APT1 Exposing One of China’s Cyber Espionage Units" rel="nofollow" href="https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf">APT1 Exposing One of China’s Cyber Espionage Units</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 28</strong>:  In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. </p>

<p>Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the  Xdr33 CIA Hive malware, and exclusive new information on the Cyberhaven Chrome extension security incident.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Fozuh0j1k3EiKJr8mSxP__6O6dQ3iLgAxeEq8f9GKxI/edit?tab=t.0#heading=h.1u39inyn4ent">Transcript (unedited, AI-generated)</a></li><li><a title="BeyondTrust statement on hack investigation" rel="nofollow" href="https://www.beyondtrust.com/remote-support-saas-service-security-investigation">BeyondTrust statement on hack investigation</a></li><li><a title="U.S. Treasury says it was hacked by China-backed actors" rel="nofollow" href="https://archive.ph/0ELY2">U.S. Treasury says it was hacked by China-backed actors</a></li><li><a title="Another Palo Alto 0day exploited in the wild" rel="nofollow" href="https://security.paloaltonetworks.com/CVE-2024-3393">Another Palo Alto 0day exploited in the wild</a></li><li><a title="US telcos say they&#39;ve evicted Salt Typhoon Chinese hackers" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/chinese-salt-typhoon-cyberespionage-targets-att-networks-secure-carrier-says-2024-12-29/">US telcos say they've evicted Salt Typhoon Chinese hackers</a></li><li><a title="Google: What is BeyondCorp?" rel="nofollow" href="https://cloud.google.com/beyondcorp">Google: What is BeyondCorp?</a></li><li><a title="Introducing the MISP Threat Actor Naming Standard" rel="nofollow" href="https://www.misp-standard.org/blog/Naming-Threat-Actor/">Introducing the MISP Threat Actor Naming Standard</a></li><li><a title="MISP: Recommendations on Naming Threat Actors" rel="nofollow" href="https://www.misp-standard.org/rfc/threat-actor-naming.html">MISP: Recommendations on Naming Threat Actors</a></li><li><a title="New variant of the CIA HIVE attack kit" rel="nofollow" href="https://x.com/nextronresearch/status/1874690494930014703">New variant of the CIA HIVE attack kit</a></li><li><a title="Xdr33 Variant Of CIA&#39;s HIVE Attack Kit Emerges" rel="nofollow" href="https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/">Xdr33 Variant Of CIA's HIVE Attack Kit Emerges</a></li><li><a title="Savvy Seahorse connection to Cyberhaven incident" rel="nofollow" href="https://blogs.infoblox.com/threat-intelligence/beware-the-shallow-waters-savvy-seahorse-lures-victims-to-fake-investment-platforms-through-facebook-ads/">Savvy Seahorse connection to Cyberhaven incident</a></li><li><a title="US sanctions China&#39;s Integrity Technology over Flax Typhoon hacks" rel="nofollow" href="https://www.reuters.com/technology/cybersecurity/us-issues-cybersecurity-sanctions-against-chinas-integrity-technology-2025-01-03/">US sanctions China's Integrity Technology over Flax Typhoon hacks</a></li><li><a title="Operation Aurora" rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Operation Aurora</a></li><li><a title="APT1 Exposing One of China’s Cyber Espionage Units" rel="nofollow" href="https://www.mandiant.com/sites/default/files/2021-09/mandiant-apt1-report.pdf">APT1 Exposing One of China’s Cyber Espionage Units</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+xqw6aVX4</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+xqw6aVX4" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights</title>
      <link>http://securityconversations.fireside.fm/palo-alto-backdoor-cyberhaven-hack-year-review</link>
      <guid isPermaLink="false">55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903</guid>
      <pubDate>Fri, 27 Dec 2024 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903.mp3" length="91383420" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 27:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.

Cast: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade</itunes:subtitle>
      <itunes:duration>1:53:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/55fe71f1-b9b4-4a31-8a0b-8f6a8d59b903/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Sora, AI, deepfake, cybersecurity, Cyberhaven, browser extensions, malware, insider threats, ChatGPT, privacy, Chrome, data security, malware, cybersecurity, attribution, corporate responsibility, cyber operations, physical conflict, research, cybersecurity, malware, nation-state threats, drone technology, election interference, CSRB, research, cybersecurity challenges, global conflicts, cyber warfare</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1321LDAuU5PosOnXODrFvvXAx8TiTXr1kbtQZE1PhhLw/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor " rel="nofollow" href="https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf">LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor </a></li><li><a title="Palo Alto: Operation Lunar Peek" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/">Palo Alto: Operation Lunar Peek</a></li><li><a title="Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistence/">Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts</a></li><li><a title="“A Digital Prison”: Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/">“A Digital Prison”: Surveillance and the suppression of civil society in Serbia</a></li><li><a title="Cyberhaven breach reported. Employee phished and pushed malicious chrome extension" rel="nofollow" href="https://x.com/cstanley/status/1872365853318225931">Cyberhaven breach reported. Employee phished and pushed malicious chrome extension</a></li><li><a title="GRU 29155 doing cyber operations" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">GRU 29155 doing cyber operations</a></li><li><a title="How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar " rel="nofollow" href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar </a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days</a></li><li><a title="Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova&#39;s National Elections" rel="nofollow" href="https://blog.checkpoint.com/research/operation-middlefloor-unmasking-the-disinformation-campaign-targeting-moldovas-national-elections/">Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections</a></li><li><a title="NSPX30: A sophisticated AitM-enabled implant evolving since 2005" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/">NSPX30: A sophisticated AitM-enabled implant evolving since 2005</a></li><li><a title="backdoor in upstream xz/liblzma leading to ssh server compromise" rel="nofollow" href="https://seclists.org/oss-sec/2024/q1/268">backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a title="PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem" rel="nofollow" href="https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem">PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem</a></li><li><a title="The Tech Coup - How to Save Democracy from Silicon Valley" rel="nofollow" href="https://press.princeton.edu/books/hardcover/9780691241173/the-tech-coup?srsltid=AfmBOoq7pNBk27MtRxluxXHgYpx1hk2misTivpgZBRfkrplbw9t3q81i">The Tech Coup - How to Save Democracy from Silicon Valley</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 27</strong>:  We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1321LDAuU5PosOnXODrFvvXAx8TiTXr1kbtQZE1PhhLw/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor " rel="nofollow" href="https://northwave-cybersecurity.com/hubfs/LITTLELAMB%20WOOLTEA%20technical%20writeup%20Schrijver%20and%20Oudenaarden.pdf">LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor </a></li><li><a title="Palo Alto: Operation Lunar Peek" rel="nofollow" href="https://unit42.paloaltonetworks.com/cve-2024-0012-cve-2024-9474/">Palo Alto: Operation Lunar Peek</a></li><li><a title="Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistence/">Investigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts</a></li><li><a title="“A Digital Prison”: Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/12/a-digital-prison-surveillance-and-the-suppression-of-civil-society-in-serbia/">“A Digital Prison”: Surveillance and the suppression of civil society in Serbia</a></li><li><a title="Cyberhaven breach reported. Employee phished and pushed malicious chrome extension" rel="nofollow" href="https://x.com/cstanley/status/1872365853318225931">Cyberhaven breach reported. Employee phished and pushed malicious chrome extension</a></li><li><a title="GRU 29155 doing cyber operations" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">GRU 29155 doing cyber operations</a></li><li><a title="How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar " rel="nofollow" href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar </a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers Targeting Firewall Zero-Days</a></li><li><a title="Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova&#39;s National Elections" rel="nofollow" href="https://blog.checkpoint.com/research/operation-middlefloor-unmasking-the-disinformation-campaign-targeting-moldovas-national-elections/">Operation MiddleFloor: Unmasking the Disinformation Campaign Targeting Moldova's National Elections</a></li><li><a title="NSPX30: A sophisticated AitM-enabled implant evolving since 2005" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/nspx30-sophisticated-aitm-enabled-implant-evolving-since-2005/">NSPX30: A sophisticated AitM-enabled implant evolving since 2005</a></li><li><a title="backdoor in upstream xz/liblzma leading to ssh server compromise" rel="nofollow" href="https://seclists.org/oss-sec/2024/q1/268">backdoor in upstream xz/liblzma leading to ssh server compromise</a></li><li><a title="PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem" rel="nofollow" href="https://www.binarly.io/blog/pkfail-untrusted-platform-keys-undermine-secure-boot-on-uefi-ecosystem">PKfail: Untrusted Platform Keys Undermine Secure Boot on UEFI Ecosystem</a></li><li><a title="The Tech Coup - How to Save Democracy from Silicon Valley" rel="nofollow" href="https://press.princeton.edu/books/hardcover/9780691241173/the-tech-coup?srsltid=AfmBOoq7pNBk27MtRxluxXHgYpx1hk2misTivpgZBRfkrplbw9t3q81i">The Tech Coup - How to Save Democracy from Silicon Valley</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+xFbBjY_1</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+xFbBjY_1" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>US government's VPN advice, dropping bombs on ransomware gangs</title>
      <link>http://securityconversations.fireside.fm/cisa-vpn-advice-tp-link-cellebrite-novispy</link>
      <guid isPermaLink="false">4e8b8384-f9ae-4e42-87fe-d72ab006ab10</guid>
      <pubDate>Mon, 23 Dec 2024 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4e8b8384-f9ae-4e42-87fe-d72ab006ab10.mp3" length="97305809" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 26:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.

Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:58:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4e8b8384-f9ae-4e42-87fe-d72ab006ab10/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 26</strong>:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International&#39;s explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.</p>

<p>Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad&#39;s dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>political interference, Romania, surveillance technology, digital security, iOS, Android, mobile exploits, activists, VPNs, VPN, privacy, CISA, cryptocurrency, anonymity, security solutions, software quality, government regulations, cybercrime, digital trust, cybersecurity, espionage, ransomware, supply chain attacks, cyber warfare, intelligence agencies, US-China relations, malware, cyber norms, innovation</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 26</strong>:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International&#39;s explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.</p>

<p>Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad&#39;s dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1v_-VcFPFydOVKG42d5hAO5MPx50HNR10l95h8Gh12WA/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://www.amnesty.org/en/documents/eur70/8813/2024/en/">Surveillance and the suppression of civil society in Serbia</a></li><li><a title="CISA: VPN and mobile device security guidance" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">CISA: VPN and mobile device security guidance</a></li><li><a title="Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)" rel="nofollow" href="https://medium.com/@costin.raiu/staying-safe-from-pegasus-chrysaor-and-other-apt-mobile-malware-a923b56d645f">Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)</a></li><li><a title="Bitsight: The Aftermath of the Kaspersky Ban" rel="nofollow" href="https://www.bitsight.com/blog/aftermath-kaspersky-ban">Bitsight: The Aftermath of the Kaspersky Ban</a></li><li><a title="US Probes China-Founded Router Maker TP-Link" rel="nofollow" href="https://archive.ph/tzycz">US Probes China-Founded Router Maker TP-Link</a></li><li><a title="Rob Joyce: Move away from TP-Link" rel="nofollow" href="https://bsky.app/profile/rgblights.bsky.social/post/3ldlr2lrfe22y">Rob Joyce: Move away from TP-Link</a></li><li><a title="China report on US intelligence corporate hacking" rel="nofollow" href="https://www.cert.org.cn/publish/main/8/2024/20241218184234131217571/20241218184234131217571_.html">China report on US intelligence corporate hacking</a></li><li><a title="Foreign hackers need to face real consequences" rel="nofollow" href="https://www.politico.com/news/2024/12/15/mike-waltz-hacking-foreign-penalties-00194415">Foreign hackers need to face real consequences</a></li><li><a title="Israel&#39;s Mossad spent years orchestrating Hezbollah pager plot" rel="nofollow" href="https://www.cbsnews.com/news/israeli-mossad-pager-walkie-talkie-hezbollah-plot-60-minutes/">Israel's Mossad spent years orchestrating Hezbollah pager plot</a></li><li><a title="BeyondTrust 0day" rel="nofollow" href="https://www.beyondtrust.com/remote-support-saas-service-security-investigation">BeyondTrust 0day</a></li><li><a title="Sophos Firewall CVSS 9.8 bulletin" rel="nofollow" href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce">Sophos Firewall CVSS 9.8 bulletin</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 26</strong>:  We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International&#39;s explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite.</p>

<p>Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad&#39;s dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence.  Also, a mysterious BeyondTrust 0-day!</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1v_-VcFPFydOVKG42d5hAO5MPx50HNR10l95h8Gh12WA/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Surveillance and the suppression of civil society in Serbia" rel="nofollow" href="https://www.amnesty.org/en/documents/eur70/8813/2024/en/">Surveillance and the suppression of civil society in Serbia</a></li><li><a title="CISA: VPN and mobile device security guidance" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-12/guidance-mobile-communications-best-practices.pdf">CISA: VPN and mobile device security guidance</a></li><li><a title="Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)" rel="nofollow" href="https://medium.com/@costin.raiu/staying-safe-from-pegasus-chrysaor-and-other-apt-mobile-malware-a923b56d645f">Costin Raiu: Staying safe from Pegasus, Chrysaor and other APT mobile malware (2024 update)</a></li><li><a title="Bitsight: The Aftermath of the Kaspersky Ban" rel="nofollow" href="https://www.bitsight.com/blog/aftermath-kaspersky-ban">Bitsight: The Aftermath of the Kaspersky Ban</a></li><li><a title="US Probes China-Founded Router Maker TP-Link" rel="nofollow" href="https://archive.ph/tzycz">US Probes China-Founded Router Maker TP-Link</a></li><li><a title="Rob Joyce: Move away from TP-Link" rel="nofollow" href="https://bsky.app/profile/rgblights.bsky.social/post/3ldlr2lrfe22y">Rob Joyce: Move away from TP-Link</a></li><li><a title="China report on US intelligence corporate hacking" rel="nofollow" href="https://www.cert.org.cn/publish/main/8/2024/20241218184234131217571/20241218184234131217571_.html">China report on US intelligence corporate hacking</a></li><li><a title="Foreign hackers need to face real consequences" rel="nofollow" href="https://www.politico.com/news/2024/12/15/mike-waltz-hacking-foreign-penalties-00194415">Foreign hackers need to face real consequences</a></li><li><a title="Israel&#39;s Mossad spent years orchestrating Hezbollah pager plot" rel="nofollow" href="https://www.cbsnews.com/news/israeli-mossad-pager-walkie-talkie-hezbollah-plot-60-minutes/">Israel's Mossad spent years orchestrating Hezbollah pager plot</a></li><li><a title="BeyondTrust 0day" rel="nofollow" href="https://www.beyondtrust.com/remote-support-saas-service-security-investigation">BeyondTrust 0day</a></li><li><a title="Sophos Firewall CVSS 9.8 bulletin" rel="nofollow" href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20241219-sfos-rce">Sophos Firewall CVSS 9.8 bulletin</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+V2WTVFnx</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+V2WTVFnx" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Surveillance economics, Turla and Careto, and the AI screenshots nobody asked for</title>
      <link>http://securityconversations.fireside.fm/apple-microsoft-ai-screenshots-nobody-asked-for</link>
      <guid isPermaLink="false">1d7c6464-bcb3-4362-a308-5d0f46d2581a</guid>
      <pubDate>Fri, 13 Dec 2024 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1d7c6464-bcb3-4362-a308-5d0f46d2581a.mp3" length="109974427" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 25:  An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader issues around surveillance capitalism and micro-targeting.  

Plus, news on Turla piggybacking on cybercriminal malware to hit Ukraine, the return of Careto and the absence of IOCs, Claroty report on an Iran-linked cyberweapon targeting critical infrastructure, ethical considerations in cyberwarfare, and the implications of quantum computing on security and cryptocurrencies. 

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.</itunes:subtitle>
      <itunes:duration>2:14:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1d7c6464-bcb3-4362-a308-5d0f46d2581a/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 25</strong>:  An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader issues around surveillance capitalism and micro-targeting.  </p>

<p>Plus, news on Turla piggybacking on cybercriminal malware to hit Ukraine, the return of Careto and the absence of IOCs, Claroty report on an Iran-linked cyberweapon targeting critical infrastructure, ethical considerations in cyberwarfare, and the implications of quantum computing on security and cryptocurrencies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Romania, elections, TikTok, AI, surveillance, Apple, Microsoft, Patch Tuesday, iOS 18.2, zero-day, quantum, bitcoin, careto, turla, Iran Israel</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 25</strong>:  An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader issues around surveillance capitalism and micro-targeting.  </p>

<p>Plus, news on Turla piggybacking on cybercriminal malware to hit Ukraine, the return of Careto and the absence of IOCs, Claroty report on an Iran-linked cyberweapon targeting critical infrastructure, ethical considerations in cyberwarfare, and the implications of quantum computing on security and cryptocurrencies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1iSaLwiCLiTifTLfiM0oQYIl_mBZBswfgVXOAsT8GY1g/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Turla using tools of other groups to attack Ukraine (Microsoft)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/">Turla using tools of other groups to attack Ukraine (Microsoft)</a></li><li><a title="EpicTurla.com: The lost reports" rel="nofollow" href="https://www.epicturla.com/">EpicTurla.com: The lost reports</a></li><li><a title="Microsoft Recall screenshots credit cards and SSNs" rel="nofollow" href="https://www.tomshardware.com/software/windows/microsoft-recall-screenshots-credit-cards-and-social-security-numbers-even-with-the-sensitive-information-filter-enabled">Microsoft Recall screenshots credit cards and SSNs</a></li><li><a title="Stephan Casas: macOS applications quietly capturing screenshots" rel="nofollow" href="https://x.com/stephancasas/status/1867147973479805058?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Stephan Casas: macOS applications quietly capturing screenshots</a></li><li><a title="CVE-2024-49138 - MS 0day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138">CVE-2024-49138 - MS 0day exploited in the wild</a></li><li><a title="Sanctions hit Chinese company behind Sophos 0day attack" rel="nofollow" href="https://home.treasury.gov/news/press-releases/jy2742">Sanctions hit Chinese company behind Sophos 0day attack</a></li><li><a title="SentinelLabs: Operation Digital Eye" rel="nofollow" href="https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/">SentinelLabs: Operation Digital Eye</a></li><li><a title="Careto APT’s recent attacks discovered" rel="nofollow" href="https://securelist.com/careto-is-back/114942/">Careto APT’s recent attacks discovered</a></li><li><a title="Claroty: Inside a New OT/IoT cyberweapon" rel="nofollow" href="https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol">Claroty: Inside a New OT/IoT cyberweapon</a></li><li><a title="Predatory Sparrow: cyber sabotage with a conscience?" rel="nofollow" href="https://bindinghook.com/articles-binding-edge/predatory-sparrow-cyber-sabotage-with-a-conscience/">Predatory Sparrow: cyber sabotage with a conscience?</a></li><li><a title="Willow, Google&#39;s state-of-the-art quantum chip" rel="nofollow" href="https://blog.google/technology/research/google-willow-quantum-chip/">Willow, Google's state-of-the-art quantum chip</a></li><li><a title="What sucks in security? Research findings from 50+ security leaders" rel="nofollow" href="https://mayakaczorowski.com/blogs/what-sucks-in-security">What sucks in security? Research findings from 50+ security leaders</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 25</strong>:  An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader issues around surveillance capitalism and micro-targeting.  </p>

<p>Plus, news on Turla piggybacking on cybercriminal malware to hit Ukraine, the return of Careto and the absence of IOCs, Claroty report on an Iran-linked cyberweapon targeting critical infrastructure, ethical considerations in cyberwarfare, and the implications of quantum computing on security and cryptocurrencies. </p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1iSaLwiCLiTifTLfiM0oQYIl_mBZBswfgVXOAsT8GY1g/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Turla using tools of other groups to attack Ukraine (Microsoft)" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/11/frequent-freeloader-part-ii-russian-actor-secret-blizzard-using-tools-of-other-groups-to-attack-ukraine/">Turla using tools of other groups to attack Ukraine (Microsoft)</a></li><li><a title="EpicTurla.com: The lost reports" rel="nofollow" href="https://www.epicturla.com/">EpicTurla.com: The lost reports</a></li><li><a title="Microsoft Recall screenshots credit cards and SSNs" rel="nofollow" href="https://www.tomshardware.com/software/windows/microsoft-recall-screenshots-credit-cards-and-social-security-numbers-even-with-the-sensitive-information-filter-enabled">Microsoft Recall screenshots credit cards and SSNs</a></li><li><a title="Stephan Casas: macOS applications quietly capturing screenshots" rel="nofollow" href="https://x.com/stephancasas/status/1867147973479805058?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Stephan Casas: macOS applications quietly capturing screenshots</a></li><li><a title="CVE-2024-49138 - MS 0day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138">CVE-2024-49138 - MS 0day exploited in the wild</a></li><li><a title="Sanctions hit Chinese company behind Sophos 0day attack" rel="nofollow" href="https://home.treasury.gov/news/press-releases/jy2742">Sanctions hit Chinese company behind Sophos 0day attack</a></li><li><a title="SentinelLabs: Operation Digital Eye" rel="nofollow" href="https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/">SentinelLabs: Operation Digital Eye</a></li><li><a title="Careto APT’s recent attacks discovered" rel="nofollow" href="https://securelist.com/careto-is-back/114942/">Careto APT’s recent attacks discovered</a></li><li><a title="Claroty: Inside a New OT/IoT cyberweapon" rel="nofollow" href="https://claroty.com/team82/research/inside-a-new-ot-iot-cyber-weapon-iocontrol">Claroty: Inside a New OT/IoT cyberweapon</a></li><li><a title="Predatory Sparrow: cyber sabotage with a conscience?" rel="nofollow" href="https://bindinghook.com/articles-binding-edge/predatory-sparrow-cyber-sabotage-with-a-conscience/">Predatory Sparrow: cyber sabotage with a conscience?</a></li><li><a title="Willow, Google&#39;s state-of-the-art quantum chip" rel="nofollow" href="https://blog.google/technology/research/google-willow-quantum-chip/">Willow, Google's state-of-the-art quantum chip</a></li><li><a title="What sucks in security? Research findings from 50+ security leaders" rel="nofollow" href="https://mayakaczorowski.com/blogs/what-sucks-in-security">What sucks in security? Research findings from 50+ security leaders</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+qlj45SW6</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+qlj45SW6" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Inside the Turla Playbook: Hijacking APTs and fourth-party espionage</title>
      <link>http://securityconversations.fireside.fm/inside-turla-playbook-hijacking-apt-fourth-party-collection</link>
      <guid isPermaLink="false">af6d806f-6e02-4b8a-b12c-ed94b0f61215</guid>
      <pubDate>Sat, 07 Dec 2024 11:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/af6d806f-6e02-4b8a-b12c-ed94b0f61215.mp3" length="89199523" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 24:  In this episode, we dig into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.

Cast: Juan Andres Guerrero-Saade, Costin Raiu, Ryan Naraine.</itunes:subtitle>
      <itunes:duration>1:47:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/af6d806f-6e02-4b8a-b12c-ed94b0f61215/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p>]]>
      </description>
      <itunes:keywords>Monokle, Salt Typhoon, Turla, Solana, spyware, cyberespionage, ransomware, crypto, hacking, surveillance, encryption, regulations, elections, drones, cybersecurity</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1agQ0TqskvYwnB69rmf2jcUReWMJQDfiIv6nrphsEWo0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian APT Turla Caught Stealing From Pakistani APT" rel="nofollow" href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/">Russian APT Turla Caught Stealing From Pakistani APT</a></li><li><a title="Snowblind: The Invisible Hand of Secret Blizzard" rel="nofollow" href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a></li><li><a title="Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog</a></li><li><a title="EpicTurla.com" rel="nofollow" href="https://epicturla.com">EpicTurla.com</a></li><li><a title="Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware" rel="nofollow" href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware</a></li><li><a title="Lookout Security research paper on Monokle spyware" rel="nofollow" href="https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf">Lookout Security research paper on Monokle spyware</a></li><li><a title="Parubets: How a programmer foiled his own FSB recruitment" rel="nofollow" href="https://dept.one/story/parubets/">Parubets: How a programmer foiled his own FSB recruitment</a></li><li><a title="CISA/FBI guidance to repel Salt Typhoon" rel="nofollow" href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">CISA/FBI guidance to repel Salt Typhoon</a></li><li><a title="US officials say they still have not expelled Chinese telco hackers" rel="nofollow" href="https://archive.ph/pncES">US officials say they still have not expelled Chinese telco hackers</a></li><li><a title="Solana backdoored in supply chain hack" rel="nofollow" href="https://github.com/solana-labs/solana-web3.js/releases">Solana backdoored in supply chain hack</a></li><li><a title="Romania&#39;s top court annuls first round of presidential vote won by far-right candidate" rel="nofollow" href="https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b">Romania's top court annuls first round of presidential vote won by far-right candidate</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 24</strong>:  In this episode, we did into Lumen/Microsoft’s revelations on Russia&#39;s Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution.  We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a>, <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a>and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a>.</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1agQ0TqskvYwnB69rmf2jcUReWMJQDfiIv6nrphsEWo0/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Russian APT Turla Caught Stealing From Pakistani APT" rel="nofollow" href="https://www.securityweek.com/spy-v-spy-russian-apt-turla-caught-stealing-from-pakistani-apt/">Russian APT Turla Caught Stealing From Pakistani APT</a></li><li><a title="Snowblind: The Invisible Hand of Secret Blizzard" rel="nofollow" href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a></li><li><a title="Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Microsoft: Secret Blizzard compromising Storm-0156 infrastructure for espionage | Microsoft Security Blog</a></li><li><a title="EpicTurla.com" rel="nofollow" href="https://epicturla.com">EpicTurla.com</a></li><li><a title="Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware" rel="nofollow" href="https://citizenlab.ca/2024/12/device-confiscated-by-russian-authorities-returned-with-monokle-type-spyware-installed/">Device Confiscated by Russian Authorities Returned with Monokle-Type Spyware</a></li><li><a title="Lookout Security research paper on Monokle spyware" rel="nofollow" href="https://www.lookout.com/documents/threat-reports/lookout-discovers-monokle-threat-report.pdf">Lookout Security research paper on Monokle spyware</a></li><li><a title="Parubets: How a programmer foiled his own FSB recruitment" rel="nofollow" href="https://dept.one/story/parubets/">Parubets: How a programmer foiled his own FSB recruitment</a></li><li><a title="CISA/FBI guidance to repel Salt Typhoon" rel="nofollow" href="https://www.cisa.gov/resources-tools/resources/enhanced-visibility-and-hardening-guidance-communications-infrastructure">CISA/FBI guidance to repel Salt Typhoon</a></li><li><a title="US officials say they still have not expelled Chinese telco hackers" rel="nofollow" href="https://archive.ph/pncES">US officials say they still have not expelled Chinese telco hackers</a></li><li><a title="Solana backdoored in supply chain hack" rel="nofollow" href="https://github.com/solana-labs/solana-web3.js/releases">Solana backdoored in supply chain hack</a></li><li><a title="Romania&#39;s top court annuls first round of presidential vote won by far-right candidate" rel="nofollow" href="https://apnews.com/article/romania-election-president-georgescu-court-585e8f8f3ce7013951f5c7cf4054179b">Romania's top court annuls first round of presidential vote won by far-right candidate</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+RU_bnqDg</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+RU_bnqDg" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Volexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectability</title>
      <link>http://securityconversations.fireside.fm/steven-adair-nearest-neighbor-wifi-hack</link>
      <guid isPermaLink="false">38eb067c-05af-457d-91b4-9e809083d842</guid>
      <pubDate>Sat, 30 Nov 2024 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/38eb067c-05af-457d-91b4-9e809083d842.mp3" length="68926322" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 23:  Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.

We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET's discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).

Honorary buddy: Steven Adair (Volexity)</itunes:subtitle>
      <itunes:duration>1:18:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/38eb067c-05af-457d-91b4-9e809083d842/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 23</strong>: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.</p>

<p>We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET&#39;s discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>

<p><strong>Honorary buddy:</strong> <a href="https://twitter.com/sadair" rel="nofollow">Steven Adair</a> (Volexity)</p>]]>
      </description>
      <itunes:keywords>Volexity, memory analysis, incident response, EDR, DEFCAMP, network telemetry,  Wi-Fi security, edge devices, ESET, TOR, Binarly, Bootkitty,</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 23</strong>: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.</p>

<p>We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET&#39;s discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>

<p><strong>Honorary buddy:</strong> <a href="https://twitter.com/sadair" rel="nofollow">Steven Adair</a> (Volexity)</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10qv33zxzGUqQFkFc3FQ8ErRIdEdg4P8wUjBoIW5V1ZY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Steven Adair on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/sadair/">Steven Adair on LinkedIn</a></li><li><a title="The Nearest Neighbor Wi-Fi Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">The Nearest Neighbor Wi-Fi Attack </a></li><li><a title="Detecting Compromise of Palo Alto Networks GlobalProtect Devices" rel="nofollow" href="https://www.volexity.com/blog/2024/05/15/detecting-compromise-of-cve-2024-3400-on-palo-alto-networks-globalprotect-devices/">Detecting Compromise of Palo Alto Networks GlobalProtect Devices</a></li><li><a title="Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days" rel="nofollow" href="https://www.securityweek.com/volexity-catches-chinese-hackers-exploiting-ivanti-vpn-zero-days/">Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days</a></li><li><a title="Volexity Warns of &#39;Active Exploitation&#39; of Zimbra Zero-Day" rel="nofollow" href="https://www.securityweek.com/volexity-warns-active-exploitation-zimbra-zero-day/">Volexity Warns of 'Active Exploitation' of Zimbra Zero-Day</a></li><li><a title="RomCom exploits Firefox and Windows zero days in the wild" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/">RomCom exploits Firefox and Windows zero days in the wild</a></li><li><a title="Bootkitty: Analyzing the first UEFI bootkit for Linux" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/">Bootkitty: Analyzing the first UEFI bootkit for Linux</a></li><li><a title="Binarly: LogoFAIL Exploited to Deploy Bootkitty" rel="nofollow" href="https://www.binarly.io/blog/logofail-exploited-to-deploy-bootkitty-the-first-uefi-bootkit-for-linux">Binarly: LogoFAIL Exploited to Deploy Bootkitty</a></li><li><a title="T-Mobile statement on Salt Typhooon" rel="nofollow" href="https://www.t-mobile.com/news/un-carrier/update-cyberattacks-targeting-us-wireless-companies">T-Mobile statement on Salt Typhooon</a></li><li><a title="LABScon24 Replay -- Cristina Cifuentes" rel="nofollow" href="https://www.youtube.com/watch?v=wo3xEa2elp4&amp;ab_channel=SentinelOne">LABScon24 Replay -- Cristina Cifuentes</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 23</strong>: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions.</p>

<p>We also cover news on a Firefox zero-day exploited on the Tor browser, the  professionalization of ransomware, ESET&#39;s discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmware ecosystem.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>

<p><strong>Honorary buddy:</strong> <a href="https://twitter.com/sadair" rel="nofollow">Steven Adair</a> (Volexity)</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10qv33zxzGUqQFkFc3FQ8ErRIdEdg4P8wUjBoIW5V1ZY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Steven Adair on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/sadair/">Steven Adair on LinkedIn</a></li><li><a title="The Nearest Neighbor Wi-Fi Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">The Nearest Neighbor Wi-Fi Attack </a></li><li><a title="Detecting Compromise of Palo Alto Networks GlobalProtect Devices" rel="nofollow" href="https://www.volexity.com/blog/2024/05/15/detecting-compromise-of-cve-2024-3400-on-palo-alto-networks-globalprotect-devices/">Detecting Compromise of Palo Alto Networks GlobalProtect Devices</a></li><li><a title="Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days" rel="nofollow" href="https://www.securityweek.com/volexity-catches-chinese-hackers-exploiting-ivanti-vpn-zero-days/">Volexity Catches Chinese Hackers Exploiting Ivanti VPN Zero-Days</a></li><li><a title="Volexity Warns of &#39;Active Exploitation&#39; of Zimbra Zero-Day" rel="nofollow" href="https://www.securityweek.com/volexity-warns-active-exploitation-zimbra-zero-day/">Volexity Warns of 'Active Exploitation' of Zimbra Zero-Day</a></li><li><a title="RomCom exploits Firefox and Windows zero days in the wild" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/">RomCom exploits Firefox and Windows zero days in the wild</a></li><li><a title="Bootkitty: Analyzing the first UEFI bootkit for Linux" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/bootkitty-analyzing-first-uefi-bootkit-linux/">Bootkitty: Analyzing the first UEFI bootkit for Linux</a></li><li><a title="Binarly: LogoFAIL Exploited to Deploy Bootkitty" rel="nofollow" href="https://www.binarly.io/blog/logofail-exploited-to-deploy-bootkitty-the-first-uefi-bootkit-for-linux">Binarly: LogoFAIL Exploited to Deploy Bootkitty</a></li><li><a title="T-Mobile statement on Salt Typhooon" rel="nofollow" href="https://www.t-mobile.com/news/un-carrier/update-cyberattacks-targeting-us-wireless-companies">T-Mobile statement on Salt Typhooon</a></li><li><a title="LABScon24 Replay -- Cristina Cifuentes" rel="nofollow" href="https://www.youtube.com/watch?v=wo3xEa2elp4&amp;ab_channel=SentinelOne">LABScon24 Replay -- Cristina Cifuentes</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+7DZAdqVf</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+7DZAdqVf" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Sid Trivedi on the RSA Innovation Sandbox $5 million investment gambit</title>
      <link>http://securityconversations.fireside.fm/sid-trivedi-foundation-capital-rsa-sandbox</link>
      <guid isPermaLink="false">9a555cb5-87d5-444f-b6c3-56ce4cf24bde</guid>
      <pubDate>Thu, 28 Nov 2024 07:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9a555cb5-87d5-444f-b6c3-56ce4cf24bde.mp3" length="52339389" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- Binary Risk Hunt (https://risk.binarly.io)

In this reboot of the Security Conversations interview series, Foundation Capital partner Sid Trivedi weighs in on major changes to the RSA Innovation Sandbox, the mandatory $5M uncapped SAFE investment for all 10 finalists, and red-flag concerns around discounts and pro-rata rights.

Also discussed: controversial pay-for-play dynamics involving CISOs and venture capital firms,  ethical implications of CISOs taking advisory positions in startups, and the challenges of investing in seed-stage startups amidst a trend towards platformization.  </itunes:subtitle>
      <itunes:duration>1:01:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9a555cb5-87d5-444f-b6c3-56ce4cf24bde/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>Binary Risk Hunt (<a href="https://risk.binarly.io" rel="nofollow">https://risk.binarly.io</a>)</li>
</ul>

<p>In this reboot of the Security Conversations interview series, Foundation Capital partner Sid Trivedi weighs in on major changes to the RSA Innovation Sandbox, the mandatory $5M uncapped SAFE investment for all 10 finalists, and red-flag concerns around discounts and pro-rata rights.</p>

<p>Also discussed: controversial pay-for-play dynamics involving CISOs and venture capital firms,  ethical implications of CISOs taking advisory positions in startups, and the challenges of investing in seed-stage startups amidst a trend towards platformization.  </p>]]>
      </description>
      <itunes:keywords>Foundation Capital, Sid Trivedi, RSA Innovation Sandbox, venture capital, SAFE, pro rata rights, pay-for-play, advisory boards, CISO ethics</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>Binary Risk Hunt (<a href="https://risk.binarly.io" rel="nofollow">https://risk.binarly.io</a>)</li>
</ul>

<p>In this reboot of the Security Conversations interview series, Foundation Capital partner Sid Trivedi weighs in on major changes to the RSA Innovation Sandbox, the mandatory $5M uncapped SAFE investment for all 10 finalists, and red-flag concerns around discounts and pro-rata rights.</p>

<p>Also discussed: controversial pay-for-play dynamics involving CISOs and venture capital firms,  ethical implications of CISOs taking advisory positions in startups, and the challenges of investing in seed-stage startups amidst a trend towards platformization.  </p><p>Links:</p><ul><li><a title="RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment" rel="nofollow" href="https://www.securityweek.com/rsa-conference-will-take-equity-in-innovation-sandbox-startup-finalists/">RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment</a></li><li><a title="RSA Innovation Sandbox: $50 Million Annual Investment Program for Top 10 Finalists" rel="nofollow" href="https://www.rsaconference.com/library/press-release/rsa-conference-2025-innovation-sandbox-contest-celebrates-20th-anniversary">RSA Innovation Sandbox: $50 Million Annual Investment Program for Top 10 Finalists</a></li><li><a title="RSA Conference - How do SAFEs work?" rel="nofollow" href="https://www.rsaconference.com/usa/programs/innovation-sandbox/safe">RSA Conference - How do SAFEs work?</a></li><li><a title="This VC Built A Cybersecurity Unicorn Machine. Then Came A Conflict Of Interest Mess." rel="nofollow" href="https://archive.ph/RRHHE">This VC Built A Cybersecurity Unicorn Machine. Then Came A Conflict Of Interest Mess.</a></li><li><a title="The Gili Ra’anan model: CISOs and VCs controversy" rel="nofollow" href="https://www.calcalistech.com/ctechnews/article/b1a1jn00hc">The Gili Ra’anan model: CISOs and VCs controversy</a></li><li><a title="Sid Trivedi bio" rel="nofollow" href="https://foundationcapital.com/member/sid-trivedi/">Sid Trivedi bio</a></li><li><a title="Foundation Capital" rel="nofollow" href="https://foundationcapital.com/">Foundation Capital</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>Binary Risk Hunt (<a href="https://risk.binarly.io" rel="nofollow">https://risk.binarly.io</a>)</li>
</ul>

<p>In this reboot of the Security Conversations interview series, Foundation Capital partner Sid Trivedi weighs in on major changes to the RSA Innovation Sandbox, the mandatory $5M uncapped SAFE investment for all 10 finalists, and red-flag concerns around discounts and pro-rata rights.</p>

<p>Also discussed: controversial pay-for-play dynamics involving CISOs and venture capital firms,  ethical implications of CISOs taking advisory positions in startups, and the challenges of investing in seed-stage startups amidst a trend towards platformization.  </p><p>Links:</p><ul><li><a title="RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment" rel="nofollow" href="https://www.securityweek.com/rsa-conference-will-take-equity-in-innovation-sandbox-startup-finalists/">RSA’s Innovation Sandbox: Cybersecurity Startups Must Accept $5 Million Investment</a></li><li><a title="RSA Innovation Sandbox: $50 Million Annual Investment Program for Top 10 Finalists" rel="nofollow" href="https://www.rsaconference.com/library/press-release/rsa-conference-2025-innovation-sandbox-contest-celebrates-20th-anniversary">RSA Innovation Sandbox: $50 Million Annual Investment Program for Top 10 Finalists</a></li><li><a title="RSA Conference - How do SAFEs work?" rel="nofollow" href="https://www.rsaconference.com/usa/programs/innovation-sandbox/safe">RSA Conference - How do SAFEs work?</a></li><li><a title="This VC Built A Cybersecurity Unicorn Machine. Then Came A Conflict Of Interest Mess." rel="nofollow" href="https://archive.ph/RRHHE">This VC Built A Cybersecurity Unicorn Machine. Then Came A Conflict Of Interest Mess.</a></li><li><a title="The Gili Ra’anan model: CISOs and VCs controversy" rel="nofollow" href="https://www.calcalistech.com/ctechnews/article/b1a1jn00hc">The Gili Ra’anan model: CISOs and VCs controversy</a></li><li><a title="Sid Trivedi bio" rel="nofollow" href="https://foundationcapital.com/member/sid-trivedi/">Sid Trivedi bio</a></li><li><a title="Foundation Capital" rel="nofollow" href="https://foundationcapital.com/">Foundation Capital</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+btFVQa6_</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+btFVQa6_" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Russian APT weaponized nearby Wi-Fi networks in DC, new macOS zero-days, DOJ v Chrome</title>
      <link>http://securityconversations.fireside.fm/tbp-ep22</link>
      <guid isPermaLink="false">afa36e08-3818-4a0c-ac7a-55ff9ff6c02b</guid>
      <pubDate>Fri, 22 Nov 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/afa36e08-3818-4a0c-ac7a-55ff9ff6c02b.mp3" length="71756075" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 22:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.

We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
      <itunes:duration>1:28:22</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/afa36e08-3818-4a0c-ac7a-55ff9ff6c02b/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 22</strong>:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA&#39;s strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.</p>

<p>We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>Cyberwarcon, APT 28, Wi-Fi hacking, cybersecurity, Chinese surveillance, data sharing, NSA, vendor accountability, cybersecurity, information sharing, regulatory failures, market solutions, NSA, Google breakup, data privacy, surveillance capitalism, antitrust, corporate relationships, Apple, cybersecurity, North Korea, gig economy, cryptocurrency, AI, exploits, security updates, fake IT workers, supply chain attacks</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 22</strong>:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA&#39;s strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.</p>

<p>We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript - (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1-NW6qC6vrI-zQZMM1fQ7ldGgUwFUohtVun1CHsxl_TU/edit?tab=t.0">Transcript - (unedited, AI-generated)</a></li><li><a title="Russian APT WiFI Nearest Neighbor Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">Russian APT WiFI Nearest Neighbor Attack </a></li><li><a title="Russian Spies Jumped From One Network to Another Via Wi-Fi" rel="nofollow" href="https://archive.ph/f0O3n">Russian Spies Jumped From One Network to Another Via Wi-Fi</a></li><li><a title="Advisory: New exploited Apple zero-days" rel="nofollow" href="https://support.apple.com/en-us/121753">Advisory: New exploited Apple zero-days</a></li><li><a title="NSA Director Wants Industry to Disclose Details of Telecom Hacks" rel="nofollow" href="https://archive.ph/2024.11.20-231241/https://www.bloomberg.com/news/articles/2024-11-20/nsa-director-wants-industry-to-disclose-details-of-telecom-hacks#selection-1321.13-1328.0">NSA Director Wants Industry to Disclose Details of Telecom Hacks</a></li><li><a title="Microsoft&#39;s &quot;Free&quot; Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits" rel="nofollow" href="https://www.propublica.org/article/microsoft-white-house-offer-cybersecurity-biden-nadella">Microsoft's "Free" Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits</a></li><li><a title="Microsoft accuses Google of &#39;Shadow Campaigns&#39;" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/28/googles-shadow-campaigns/">Microsoft accuses Google of 'Shadow Campaigns'</a></li><li><a title="DOJ calls for breakup of Google and sale of Chrome" rel="nofollow" href="https://www.nbcnews.com/news/us-news/google-department-of-justice-chrome-sale-breakup-microsoft-apple-rcna181133">DOJ calls for breakup of Google and sale of Chrome</a></li><li><a title="DPRK IT Workers -- A Network of Active Front Companies and Their Links to China" rel="nofollow" href="https://www.sentinelone.com/labs/dprk-it-workers-a-network-of-active-front-companies-and-their-links-to-china/">DPRK IT Workers -- A Network of Active Front Companies and Their Links to China</a></li><li><a title="Be careful when coding with ChatGPT" rel="nofollow" href="https://x.com/r_cky0/status/1859656430888026524">Be careful when coding with ChatGPT</a></li><li><a title="GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models" rel="nofollow" href="https://arxiv.org/pdf/2410.05229">GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models</a></li><li><a title="PIVOTcon 2025" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2025</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 22</strong>:  We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA&#39;s strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks.</p>

<p>We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript - (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1-NW6qC6vrI-zQZMM1fQ7ldGgUwFUohtVun1CHsxl_TU/edit?tab=t.0">Transcript - (unedited, AI-generated)</a></li><li><a title="Russian APT WiFI Nearest Neighbor Attack " rel="nofollow" href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">Russian APT WiFI Nearest Neighbor Attack </a></li><li><a title="Russian Spies Jumped From One Network to Another Via Wi-Fi" rel="nofollow" href="https://archive.ph/f0O3n">Russian Spies Jumped From One Network to Another Via Wi-Fi</a></li><li><a title="Advisory: New exploited Apple zero-days" rel="nofollow" href="https://support.apple.com/en-us/121753">Advisory: New exploited Apple zero-days</a></li><li><a title="NSA Director Wants Industry to Disclose Details of Telecom Hacks" rel="nofollow" href="https://archive.ph/2024.11.20-231241/https://www.bloomberg.com/news/articles/2024-11-20/nsa-director-wants-industry-to-disclose-details-of-telecom-hacks#selection-1321.13-1328.0">NSA Director Wants Industry to Disclose Details of Telecom Hacks</a></li><li><a title="Microsoft&#39;s &quot;Free&quot; Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits" rel="nofollow" href="https://www.propublica.org/article/microsoft-white-house-offer-cybersecurity-biden-nadella">Microsoft's "Free" Plan to Upgrade Government Cybersecurity Was Designed to Box Out Competitors and Drive Profits</a></li><li><a title="Microsoft accuses Google of &#39;Shadow Campaigns&#39;" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/28/googles-shadow-campaigns/">Microsoft accuses Google of 'Shadow Campaigns'</a></li><li><a title="DOJ calls for breakup of Google and sale of Chrome" rel="nofollow" href="https://www.nbcnews.com/news/us-news/google-department-of-justice-chrome-sale-breakup-microsoft-apple-rcna181133">DOJ calls for breakup of Google and sale of Chrome</a></li><li><a title="DPRK IT Workers -- A Network of Active Front Companies and Their Links to China" rel="nofollow" href="https://www.sentinelone.com/labs/dprk-it-workers-a-network-of-active-front-companies-and-their-links-to-china/">DPRK IT Workers -- A Network of Active Front Companies and Their Links to China</a></li><li><a title="Be careful when coding with ChatGPT" rel="nofollow" href="https://x.com/r_cky0/status/1859656430888026524">Be careful when coding with ChatGPT</a></li><li><a title="GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models" rel="nofollow" href="https://arxiv.org/pdf/2410.05229">GSM-Symbolic: Understanding the Limitations of Mathematical Reasoning in Large Language Models</a></li><li><a title="PIVOTcon 2025" rel="nofollow" href="https://pivotcon.org/">PIVOTcon 2025</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+TJW3_VQY</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+TJW3_VQY" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>What happens to CISA now? Is deterrence in cyber possible?</title>
      <link>http://securityconversations.fireside.fm/tbp-ep21</link>
      <guid isPermaLink="false">fde7baf5-5ce2-4870-ac23-2881f78b9684</guid>
      <pubDate>Fri, 15 Nov 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fde7baf5-5ce2-4870-ac23-2881f78b9684.mp3" length="93206263" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 21:  We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the significance of the FBI/CISA public confirmation of China-linked Salt Typhoon hacks. 

Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happens to the agency under the Trump administration.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
      <itunes:duration>1:53:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fde7baf5-5ce2-4870-ac23-2881f78b9684/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 21</strong>:  We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. </p>

<p>Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happens to the agency under the Trump administration.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>Iran, Hamas, FBI CISA report, Predatory Sparrow, FOMO Typhoon, Salt Typhoon, Volt Typhoon, cyber espionage, Volt Typhoon, cyber espionage,  firewall vulnerabilities, CISA, Bitcoin, cryptocurrency, ransomware, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 21</strong>:  We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. </p>

<p>Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happens to the agency under the Trump administration.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19N5nXfxOZNhXeq_dlWVNx9kKQE3ldoUtgJbcq3huNDM/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="CISA/Israel gov report on Iranian hacking operations" rel="nofollow" href="https://www.ic3.gov/CSA/2024/241030.pdf">CISA/Israel gov report on Iranian hacking operations</a></li><li><a title="Check Point: A deep-dive of Iran&#39;s WezRat malware" rel="nofollow" href="https://research.checkpoint.com/2024/wezrat-malware-deep-dive/">Check Point: A deep-dive of Iran's WezRat malware</a></li><li><a title="Trend Micro report on Earth Estries" rel="nofollow" href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">Trend Micro report on Earth Estries</a></li><li><a title="FBI/CISA on China hacking US telcos" rel="nofollow" href="https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications">FBI/CISA on China hacking US telcos</a></li><li><a title="US accuses China of vast cyberespionage against telecoms" rel="nofollow" href="https://archive.ph/kdC7a">US accuses China of vast cyberespionage against telecoms</a></li><li><a title="Volt Typhoon hackers hit SingTel in Singapore" rel="nofollow" href="https://archive.ph/PefIJ">Volt Typhoon hackers hit SingTel in Singapore</a></li><li><a title="New Palo Alto firewall 0day attack" rel="nofollow" href="https://security.paloaltonetworks.com/PAN-SA-2024-0015">New Palo Alto firewall 0day attack</a></li><li><a title="CVE-2024-43450 - China reports Windows DNS Spoofing vuln" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450">CVE-2024-43450 - China reports Windows DNS Spoofing vuln</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 21</strong>:  We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. </p>

<p>Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happens to the agency under the Trump administration.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/19N5nXfxOZNhXeq_dlWVNx9kKQE3ldoUtgJbcq3huNDM/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="CISA/Israel gov report on Iranian hacking operations" rel="nofollow" href="https://www.ic3.gov/CSA/2024/241030.pdf">CISA/Israel gov report on Iranian hacking operations</a></li><li><a title="Check Point: A deep-dive of Iran&#39;s WezRat malware" rel="nofollow" href="https://research.checkpoint.com/2024/wezrat-malware-deep-dive/">Check Point: A deep-dive of Iran's WezRat malware</a></li><li><a title="Trend Micro report on Earth Estries" rel="nofollow" href="https://www.trendmicro.com/en_us/research/24/k/breaking-down-earth-estries-persistent-ttps-in-prolonged-cyber-o.html">Trend Micro report on Earth Estries</a></li><li><a title="FBI/CISA on China hacking US telcos" rel="nofollow" href="https://www.cisa.gov/news-events/news/joint-statement-fbi-and-cisa-peoples-republic-china-prc-targeting-commercial-telecommunications">FBI/CISA on China hacking US telcos</a></li><li><a title="US accuses China of vast cyberespionage against telecoms" rel="nofollow" href="https://archive.ph/kdC7a">US accuses China of vast cyberespionage against telecoms</a></li><li><a title="Volt Typhoon hackers hit SingTel in Singapore" rel="nofollow" href="https://archive.ph/PefIJ">Volt Typhoon hackers hit SingTel in Singapore</a></li><li><a title="New Palo Alto firewall 0day attack" rel="nofollow" href="https://security.paloaltonetworks.com/PAN-SA-2024-0015">New Palo Alto firewall 0day attack</a></li><li><a title="CVE-2024-43450 - China reports Windows DNS Spoofing vuln" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450">CVE-2024-43450 - China reports Windows DNS Spoofing vuln</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+SGaHRFx7</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+SGaHRFx7" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Mysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacks</title>
      <link>http://securityconversations.fireside.fm/tbp-ep20</link>
      <guid isPermaLink="false">4b7375c6-6a49-4e92-8bd1-e706a996e883</guid>
      <pubDate>Sat, 09 Nov 2024 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4b7375c6-6a49-4e92-8bd1-e706a996e883.mp3" length="76955697" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 20:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
      <itunes:duration>1:37:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4b7375c6-6a49-4e92-8bd1-e706a996e883/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 20</strong>:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>Keywords  cybersecurity, EDR software, Google Project Zero, telemetry, threat intelligence, information sharing, security research, exploitation techniques, legal considerations, transparency, EDR, Windows Defender, telemetry, security research, Apple, malware analysis, privacy, law enforcement, cybersecurity, antivirus, Salt Typhoon, Chinese APTs, cyber threats, Goblin Rat, Bitcoin attacks, North Korea, espionage, cybersecurity, iOS vulnerabilities, surveillance</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 20</strong>:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1_R5EC39CoxPRz67njLfqKVLjq8bdkdh6h7l7UwaVHAE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="iPhones mysteriously rebooting themselves" rel="nofollow" href="https://archive.vn/JMEbq">iPhones mysteriously rebooting themselves</a></li><li><a title="Apple quietly ships iPhone reboot code" rel="nofollow" href="https://archive.ph/lpoLQ">Apple quietly ships iPhone reboot code</a></li><li><a title="FBI on China hacking US presidential campaigns iPhones" rel="nofollow" href="https://archive.ph/iAQzO">FBI on China hacking US presidential campaigns iPhones</a></li><li><a title="Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns" rel="nofollow" href="https://www.wsj.com/politics/national-security/chinese-hackers-targeted-phones-of-trump-vance-and-harris-campaign-e04abbdf?mod=article_inline">Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns</a></li><li><a title="Palo Alto: EDR Bypass Testing Reveals Threat Actor&#39;s Toolkit" rel="nofollow" href="https://unit42.paloaltonetworks.com/edr-bypass-extortion-attempt-thwarted/">Palo Alto: EDR Bypass Testing Reveals Threat Actor's Toolkit</a></li><li><a title="Palo Alto CVE-2024-5910 marked as exploited" rel="nofollow" href="https://security.paloaltonetworks.com/CVE-2024-5910">Palo Alto CVE-2024-5910 marked as exploited</a></li><li><a title="Toronto crypto company CEO kidnapped" rel="nofollow" href="https://www.cbc.ca/news/canada/toronto/kidnapping-toronto-businessman-cryptocurrency-1.7376679">Toronto crypto company CEO kidnapped</a></li><li><a title="A list of known &#39;meatspace&#39; crypto attacks" rel="nofollow" href="https://github.com/jlopp/physical-bitcoin-attacks">A list of known 'meatspace' crypto attacks</a></li><li><a title="North Korea crypto thieves targets macOS" rel="nofollow" href="https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/">North Korea crypto thieves targets macOS</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 20</strong>:  We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1_R5EC39CoxPRz67njLfqKVLjq8bdkdh6h7l7UwaVHAE/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="iPhones mysteriously rebooting themselves" rel="nofollow" href="https://archive.vn/JMEbq">iPhones mysteriously rebooting themselves</a></li><li><a title="Apple quietly ships iPhone reboot code" rel="nofollow" href="https://archive.ph/lpoLQ">Apple quietly ships iPhone reboot code</a></li><li><a title="FBI on China hacking US presidential campaigns iPhones" rel="nofollow" href="https://archive.ph/iAQzO">FBI on China hacking US presidential campaigns iPhones</a></li><li><a title="Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns" rel="nofollow" href="https://www.wsj.com/politics/national-security/chinese-hackers-targeted-phones-of-trump-vance-and-harris-campaign-e04abbdf?mod=article_inline">Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns</a></li><li><a title="Palo Alto: EDR Bypass Testing Reveals Threat Actor&#39;s Toolkit" rel="nofollow" href="https://unit42.paloaltonetworks.com/edr-bypass-extortion-attempt-thwarted/">Palo Alto: EDR Bypass Testing Reveals Threat Actor's Toolkit</a></li><li><a title="Palo Alto CVE-2024-5910 marked as exploited" rel="nofollow" href="https://security.paloaltonetworks.com/CVE-2024-5910">Palo Alto CVE-2024-5910 marked as exploited</a></li><li><a title="Toronto crypto company CEO kidnapped" rel="nofollow" href="https://www.cbc.ca/news/canada/toronto/kidnapping-toronto-businessman-cryptocurrency-1.7376679">Toronto crypto company CEO kidnapped</a></li><li><a title="A list of known &#39;meatspace&#39; crypto attacks" rel="nofollow" href="https://github.com/jlopp/physical-bitcoin-attacks">A list of known 'meatspace' crypto attacks</a></li><li><a title="North Korea crypto thieves targets macOS" rel="nofollow" href="https://www.sentinelone.com/labs/bluenoroff-hidden-risk-threat-actor-targets-macs-with-fake-crypto-news-and-novel-persistence/">North Korea crypto thieves targets macOS</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+aFaP4GAo</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+aFaP4GAo" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela</title>
      <link>http://securityconversations.fireside.fm/tbp-ep19</link>
      <guid isPermaLink="false">afe08ad2-3625-4575-aaae-280d146e474c</guid>
      <pubDate>Sun, 03 Nov 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/afe08ad2-3625-4575-aaae-280d146e474c.mp3" length="89415224" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 19:  We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
      <itunes:duration>1:54:14</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/afe08ad2-3625-4575-aaae-280d146e474c/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>Sophos, implants, firewall devices, appliances, China, Chengdu, CIA, Fortinet, Ivanti, Barracuda, India, Canada</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1U8q76wqVXIs9Sdc8vuqAr2S9CtknvnYryxS6l0IALv8/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivan Kwiatkowski: Threat intel truths inside" rel="nofollow" href="https://blog.kwiatkowski.fr/threat-intel-truths-inside">Ivan Kwiatkowski: Threat intel truths inside</a></li><li><a title="JAG-S LABScon keynote" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">JAG-S LABScon keynote</a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers</a></li><li><a title="Sophos Pacific Rim report" rel="nofollow" href="https://www.sophos.com/en-us/content/pacific-rim">Sophos Pacific Rim report</a></li><li><a title="NCSC details ‘Pygmy Goat’ network backdoor" rel="nofollow" href="https://www.securityweek.com/ncsc-details-pygmy-goat-backdoor-planted-on-hacked-sophos-firewall-devices/">NCSC details ‘Pygmy Goat’ network backdoor</a></li><li><a title="NCSC &#39;Pygmy Goat&#39; report" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/pygmy-goat/ncsc-mar-pygmy-goat.pdf">NCSC 'Pygmy Goat' report</a></li><li><a title="Massive hack-for-hire scandal rocks Italian political elites – POLITICO" rel="nofollow" href="https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/">Massive hack-for-hire scandal rocks Italian political elites – POLITICO</a></li><li><a title="Vatican, Israel implicated in Italy hacking scandal" rel="nofollow" href="https://www.politico.eu/article/vatican-israel-italian-hacking-scandal-uk-lithuania-equalize/">Vatican, Israel implicated in Italy hacking scandal</a></li><li><a title="Wired on CIA hack of Venezuela military payroll system" rel="nofollow" href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/?utm_medium=social&amp;mbid=social_twitter&amp;utm_social-type=owned&amp;utm_source=twitter&amp;utm_brand=wired">Wired on CIA hack of Venezuela military payroll system</a></li><li><a title="Is Now on VT!" rel="nofollow" href="https://x.com/Now_on_VT">Is Now on VT!</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 19</strong>:   We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1U8q76wqVXIs9Sdc8vuqAr2S9CtknvnYryxS6l0IALv8/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="Ivan Kwiatkowski: Threat intel truths inside" rel="nofollow" href="https://blog.kwiatkowski.fr/threat-intel-truths-inside">Ivan Kwiatkowski: Threat intel truths inside</a></li><li><a title="JAG-S LABScon keynote" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">JAG-S LABScon keynote</a></li><li><a title="Sophos Used Custom Implants to Surveil Chinese Hackers" rel="nofollow" href="https://www.securityweek.com/sophos-used-custom-implants-to-surveil-chinese-hackers-targeting-firewall-zero-days/">Sophos Used Custom Implants to Surveil Chinese Hackers</a></li><li><a title="Sophos Pacific Rim report" rel="nofollow" href="https://www.sophos.com/en-us/content/pacific-rim">Sophos Pacific Rim report</a></li><li><a title="NCSC details ‘Pygmy Goat’ network backdoor" rel="nofollow" href="https://www.securityweek.com/ncsc-details-pygmy-goat-backdoor-planted-on-hacked-sophos-firewall-devices/">NCSC details ‘Pygmy Goat’ network backdoor</a></li><li><a title="NCSC &#39;Pygmy Goat&#39; report" rel="nofollow" href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/pygmy-goat/ncsc-mar-pygmy-goat.pdf">NCSC 'Pygmy Goat' report</a></li><li><a title="Massive hack-for-hire scandal rocks Italian political elites – POLITICO" rel="nofollow" href="https://www.politico.eu/article/hacking-scandal-italy-matteo-renzi-sergio-mattarella-equalize-nunzio-samuele-calamucci/">Massive hack-for-hire scandal rocks Italian political elites – POLITICO</a></li><li><a title="Vatican, Israel implicated in Italy hacking scandal" rel="nofollow" href="https://www.politico.eu/article/vatican-israel-italian-hacking-scandal-uk-lithuania-equalize/">Vatican, Israel implicated in Italy hacking scandal</a></li><li><a title="Wired on CIA hack of Venezuela military payroll system" rel="nofollow" href="https://www.wired.com/story/trump-cia-venezuela-maduro-regime-change-plot/?utm_medium=social&amp;mbid=social_twitter&amp;utm_social-type=owned&amp;utm_source=twitter&amp;utm_brand=wired">Wired on CIA hack of Venezuela military payroll system</a></li><li><a title="Is Now on VT!" rel="nofollow" href="https://x.com/Now_on_VT">Is Now on VT!</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+-lPAnsdm</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+-lPAnsdm" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Fortinet 0days, Appin hack-for-hire exposé, crypto heists, Russians booted from Linux kernel</title>
      <link>http://securityconversations.fireside.fm/tbp-ep18</link>
      <guid isPermaLink="false">90ccac79-0895-4cbf-a28e-805a46c7e3da</guid>
      <pubDate>Fri, 25 Oct 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/90ccac79-0895-4cbf-a28e-805a46c7e3da.mp3" length="63377599" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 18:  This week’s show covers the White House's new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed from Linux kernel maintenance and China’s Antiy beefing with Sentinel One over APT reporting.

Cast: Ryan Naraine (SecurityWeek), Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh).</itunes:subtitle>
      <itunes:duration>1:26:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/90ccac79-0895-4cbf-a28e-805a46c7e3da/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 18</strong>:  This week’s show covers the White House&#39;s new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed from Linux kernel maintenance and China’s Antiy beefing with Sentinel One over APT reporting.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>TLP, White House, Appin, Reuters, S1, hack-for-hire, Apple, Private Cloud Computer, Fortinet, Ivanti, Pulse Secure, CSRB, crypto, North Korea, Linux, Russia, Antiy, Sentinel One</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 18</strong>:  This week’s show covers the White House&#39;s new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed from Linux kernel maintenance and China’s Antiy beefing with Sentinel One over APT reporting.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1z-Dz25Mmb_97ulETvoKROgQPiN5BHQ_USGvArAqpFXs/edit?usp=sharing">Transcript (AI-generated)</a></li><li><a title="White House TLP guidance" rel="nofollow" href="https://www.whitehouse.gov/oncd/briefing-room/2024/10/22/doubling-down-on-trusted-partnerships-our-commitment-to-researchers/">White House TLP guidance</a></li><li><a title="Applin -- How an Indian startup hacked the world" rel="nofollow" href="https://www.reuters.com/investigates/special-report/usa-hackers-appin/">Applin -- How an Indian startup hacked the world</a></li><li><a title="Burning Zero Days: FortiJump FortiManager Flaw" rel="nofollow" href="https://doublepulsar.com/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773">Burning Zero Days: FortiJump FortiManager Flaw</a></li><li><a title="Mandiant on FortiManager Zero-Day Exploitation" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575">Mandiant on FortiManager Zero-Day Exploitation</a></li><li><a title="Fortinet bulletin on new 0day exploitation" rel="nofollow" href="https://www.fortiguard.com/psirt/FG-IR-24-423">Fortinet bulletin on new 0day exploitation</a></li><li><a title="Radiant Capital $50M cryptocurrency theft" rel="nofollow" href="https://medium.com/@RadiantCapital/radiant-post-mortem-fecd6cd38081">Radiant Capital $50M cryptocurrency theft</a></li><li><a title="DPRK&#39;s Lazarus steals cryptocurrency with decoy MOBA game" rel="nofollow" href="https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/">DPRK's Lazarus steals cryptocurrency with decoy MOBA game</a></li><li><a title="Apple opens Private Cloud Compute to security inspection" rel="nofollow" href="https://security.apple.com/blog/pcc-security-research">Apple opens Private Cloud Compute to security inspection</a></li><li><a title="Russians booted from Linux kernel driver maintenance" rel="nofollow" href="https://www.phoronix.com/news/Russian-Linux-Maintainers-Drop">Russians booted from Linux kernel driver maintenance</a></li><li><a title="Antiy paper responding to SentinelOne" rel="nofollow" href="https://www.antiy.net/p/fight-against-the-bald-eagle-in-the-fog-relaying-cooperating-and-specific-contribution/">Antiy paper responding to SentinelOne</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 18</strong>:  This week’s show covers the White House&#39;s new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed from Linux kernel maintenance and China’s Antiy beefing with Sentinel One over APT reporting.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1z-Dz25Mmb_97ulETvoKROgQPiN5BHQ_USGvArAqpFXs/edit?usp=sharing">Transcript (AI-generated)</a></li><li><a title="White House TLP guidance" rel="nofollow" href="https://www.whitehouse.gov/oncd/briefing-room/2024/10/22/doubling-down-on-trusted-partnerships-our-commitment-to-researchers/">White House TLP guidance</a></li><li><a title="Applin -- How an Indian startup hacked the world" rel="nofollow" href="https://www.reuters.com/investigates/special-report/usa-hackers-appin/">Applin -- How an Indian startup hacked the world</a></li><li><a title="Burning Zero Days: FortiJump FortiManager Flaw" rel="nofollow" href="https://doublepulsar.com/burning-zero-days-fortijump-fortimanager-vulnerability-used-by-nation-state-in-espionage-via-msps-c79abec59773">Burning Zero Days: FortiJump FortiManager Flaw</a></li><li><a title="Mandiant on FortiManager Zero-Day Exploitation" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/fortimanager-zero-day-exploitation-cve-2024-47575">Mandiant on FortiManager Zero-Day Exploitation</a></li><li><a title="Fortinet bulletin on new 0day exploitation" rel="nofollow" href="https://www.fortiguard.com/psirt/FG-IR-24-423">Fortinet bulletin on new 0day exploitation</a></li><li><a title="Radiant Capital $50M cryptocurrency theft" rel="nofollow" href="https://medium.com/@RadiantCapital/radiant-post-mortem-fecd6cd38081">Radiant Capital $50M cryptocurrency theft</a></li><li><a title="DPRK&#39;s Lazarus steals cryptocurrency with decoy MOBA game" rel="nofollow" href="https://securelist.com/lazarus-apt-steals-crypto-with-a-tank-game/114282/">DPRK's Lazarus steals cryptocurrency with decoy MOBA game</a></li><li><a title="Apple opens Private Cloud Compute to security inspection" rel="nofollow" href="https://security.apple.com/blog/pcc-security-research">Apple opens Private Cloud Compute to security inspection</a></li><li><a title="Russians booted from Linux kernel driver maintenance" rel="nofollow" href="https://www.phoronix.com/news/Russian-Linux-Maintainers-Drop">Russians booted from Linux kernel driver maintenance</a></li><li><a title="Antiy paper responding to SentinelOne" rel="nofollow" href="https://www.antiy.net/p/fight-against-the-bald-eagle-in-the-fog-relaying-cooperating-and-specific-contribution/">Antiy paper responding to SentinelOne</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+hRavwBL_</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+hRavwBL_" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>ESET Israel wiper malware, China's Volt Typhoon response, Kaspersky sanctions and isolation</title>
      <link>http://securityconversations.fireside.fm/tbp-ep17</link>
      <guid isPermaLink="false">71d290f7-c156-48af-a22c-c4d3ca4b3f44</guid>
      <pubDate>Fri, 18 Oct 2024 12:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/71d290f7-c156-48af-a22c-c4d3ca4b3f44.mp3" length="78696217" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 17:  News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China's strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
      <itunes:duration>1:38:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/71d290f7-c156-48af-a22c-c4d3ca4b3f44/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 17</strong>:  News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China&#39;s strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>ESET, Israel, wiper, disinformation, China, Section 702, quantum computing, chip backdoor, Internet Explorer, Kaspersky, MAPP, VirusTotal</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 17</strong>:  News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China&#39;s strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="ESET Israel wiper attacks" rel="nofollow" href="https://doublepulsar.com/eiw-eset-israel-wiper-used-in-active-attacks-targeting-israeli-orgs-b1210aed7021">ESET Israel wiper attacks</a></li><li><a title="ESET comment on Israel wiper incident" rel="nofollow" href="https://x.com/ESETresearch/status/1847192384448172387">ESET comment on Israel wiper incident</a></li><li><a title="Dakota Cary on China’s Volt Typhoon Influence Ops" rel="nofollow" href="https://www.sentinelone.com/labs/chinas-influence-ops-twisting-tales-of-volt-typhoon-at-home-and-abroad/">Dakota Cary on China’s Volt Typhoon Influence Ops</a></li><li><a title="Volt Typhoon III (PDF)" rel="nofollow" href="https://www.cverc.org.cn/head/zhaiyao/futetaifeng3_EN.pdf">Volt Typhoon III (PDF)</a></li><li><a title="US Sanctions 12 Kaspersky Executives" rel="nofollow" href="https://www.securityweek.com/us-sanctions-12-kaspersky-executives/">US Sanctions 12 Kaspersky Executives</a></li><li><a title="Kaspersky closing down its UK office" rel="nofollow" href="https://techcrunch.com/2024/10/08/kasperksy-says-its-closing-down-its-uk-office-and-laying-off-dozens/">Kaspersky closing down its UK office</a></li><li><a title="MAPP vendor list" rel="nofollow" href="https://www.microsoft.com/en-us/msrc/mapp">MAPP vendor list</a></li><li><a title="VirusTotal" rel="nofollow" href="https://www.virustotal.com/gui/home/upload">VirusTotal</a></li><li><a title="Transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1w7-KN0SiU-wHiGlOXAfuydgwAgKkmEw-xKLEubNm19k/edit?usp=sharing">Transcript (AI-generated)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 17</strong>:  News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China&#39;s strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="ESET Israel wiper attacks" rel="nofollow" href="https://doublepulsar.com/eiw-eset-israel-wiper-used-in-active-attacks-targeting-israeli-orgs-b1210aed7021">ESET Israel wiper attacks</a></li><li><a title="ESET comment on Israel wiper incident" rel="nofollow" href="https://x.com/ESETresearch/status/1847192384448172387">ESET comment on Israel wiper incident</a></li><li><a title="Dakota Cary on China’s Volt Typhoon Influence Ops" rel="nofollow" href="https://www.sentinelone.com/labs/chinas-influence-ops-twisting-tales-of-volt-typhoon-at-home-and-abroad/">Dakota Cary on China’s Volt Typhoon Influence Ops</a></li><li><a title="Volt Typhoon III (PDF)" rel="nofollow" href="https://www.cverc.org.cn/head/zhaiyao/futetaifeng3_EN.pdf">Volt Typhoon III (PDF)</a></li><li><a title="US Sanctions 12 Kaspersky Executives" rel="nofollow" href="https://www.securityweek.com/us-sanctions-12-kaspersky-executives/">US Sanctions 12 Kaspersky Executives</a></li><li><a title="Kaspersky closing down its UK office" rel="nofollow" href="https://techcrunch.com/2024/10/08/kasperksy-says-its-closing-down-its-uk-office-and-laying-off-dozens/">Kaspersky closing down its UK office</a></li><li><a title="MAPP vendor list" rel="nofollow" href="https://www.microsoft.com/en-us/msrc/mapp">MAPP vendor list</a></li><li><a title="VirusTotal" rel="nofollow" href="https://www.virustotal.com/gui/home/upload">VirusTotal</a></li><li><a title="Transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1w7-KN0SiU-wHiGlOXAfuydgwAgKkmEw-xKLEubNm19k/edit?usp=sharing">Transcript (AI-generated)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+pHAWZTsD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+pHAWZTsD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Typhoons and Blizzards: Cyberespionage and national security on front burner</title>
      <link>http://securityconversations.fireside.fm/tbp-ep16</link>
      <guid isPermaLink="false">b270f0b1-359a-43e1-b218-7b1329f43093</guid>
      <pubDate>Fri, 11 Oct 2024 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b270f0b1-359a-43e1-b218-7b1329f43093.mp3" length="52742416" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
      <itunes:duration>1:09:09</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b270f0b1-359a-43e1-b218-7b1329f43093/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>Cybersecurity Threats, APT29 Cyber Attacks, Salt Typhoon Hacks, Espionage and Cyber Warfare, National Security Risks, SVR cyber threat, APT29 tactics, Russia cyber espionage, Chinese cyber actors, Salt Typhoon vulnerability, Microsoft Teams exploitation, JetBrains TeamCity vulnerability, Supply chain cyber attack, National security cyber risks, Cyber threat indicators</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="NCSC exposé on SVR/APT29 history and tactics" rel="nofollow" href="https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities">NCSC exposé on SVR/APT29 history and tactics</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://attack.mitre.org/groups/G0016/">APT29 / Midnight Blizzard</a></li><li><a title="VIDEO: A Surprise Encounter With A Telco APT" rel="nofollow" href="https://www.youtube.com/watch?v=xCU47bJoLho&amp;ab_channel=HackInTheBoxSecurityConference">VIDEO: A Surprise Encounter With A Telco APT</a></li><li><a title="The Athens Affair - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/the-athens-affair">The Athens Affair - IEEE Spectrum</a> &mdash; How some extremely smart hackers pulled off the most audacious cell-network break-in ever</li><li><a title="Wikipedia: The Athens Affair" rel="nofollow" href="https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305">Wikipedia: The Athens Affair</a></li><li><a title="WSJ report on Salt Typhoon hacks" rel="nofollow" href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951">WSJ report on Salt Typhoon hacks</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Microsoft Confirms Exploited Zero-Day in Windows Management Console" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-confirms-exploited-zero-day-in-windows-management-console/">Microsoft Confirms Exploited Zero-Day in Windows Management Console</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 16</strong>:  We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="NCSC exposé on SVR/APT29 history and tactics" rel="nofollow" href="https://www.ncsc.gov.uk/news/russian-foreign-intelligence-poses-global-threat-with-cyber-campaign-exploiting-established-vulnerabilities">NCSC exposé on SVR/APT29 history and tactics</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://attack.mitre.org/groups/G0016/">APT29 / Midnight Blizzard</a></li><li><a title="VIDEO: A Surprise Encounter With A Telco APT" rel="nofollow" href="https://www.youtube.com/watch?v=xCU47bJoLho&amp;ab_channel=HackInTheBoxSecurityConference">VIDEO: A Surprise Encounter With A Telco APT</a></li><li><a title="The Athens Affair - IEEE Spectrum" rel="nofollow" href="https://spectrum.ieee.org/the-athens-affair">The Athens Affair - IEEE Spectrum</a> &mdash; How some extremely smart hackers pulled off the most audacious cell-network break-in ever</li><li><a title="Wikipedia: The Athens Affair" rel="nofollow" href="https://en.wikipedia.org/wiki/Greek_wiretapping_case_2004%E2%80%9305">Wikipedia: The Athens Affair</a></li><li><a title="WSJ report on Salt Typhoon hacks" rel="nofollow" href="https://www.wsj.com/politics/national-security/u-s-officials-race-to-understand-severity-of-chinas-salt-typhoon-hacks-6e7c3951">WSJ report on Salt Typhoon hacks</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Microsoft Confirms Exploited Zero-Day in Windows Management Console" rel="nofollow" href="https://www.securityweek.com/patch-tuesday-microsoft-confirms-exploited-zero-day-in-windows-management-console/">Microsoft Confirms Exploited Zero-Day in Windows Management Console</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+nzylswT7</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+nzylswT7" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Careto returns, IDA Pro pricing controversy, crypto's North Korea problem</title>
      <link>http://securityconversations.fireside.fm/tbp-ep15</link>
      <guid isPermaLink="false">dae2bdfe-9bc3-41af-88f1-c41782d35f84</guid>
      <pubDate>Fri, 04 Oct 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/dae2bdfe-9bc3-41af-88f1-c41782d35f84.mp3" length="73939478" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
      <itunes:duration>1:30:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/dae2bdfe-9bc3-41af-88f1-c41782d35f84/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>Virus Bulletin, Careto, HexRays, IDA Pro, Yara, VirusTotal, North Korea, Russia, crypto, spyware, Paragon</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1UaVJw7KE2Bl1p1ftqiE5g_CvMXe91eqNfv1_pKAx9uY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="VB abstract: The Mask has been unmasked again" rel="nofollow" href="https://www.virusbulletin.com/conference/vb2024/abstracts/mask-has-been-unmasked-again/">VB abstract: The Mask has been unmasked again</a></li><li><a title="Discover IDA 9.0" rel="nofollow" href="https://hex-rays.com/blog/discover-ida-9.0-exciting-new-features-and-improvements">Discover IDA 9.0</a></li><li><a title="Binary Ninja" rel="nofollow" href="https://binary.ninja/">Binary Ninja</a></li><li><a title="Vertex Synapse" rel="nofollow" href="https://vertex.link/synapse">Vertex Synapse</a></li><li><a title="YARA-X" rel="nofollow" href="https://virustotal.github.io/yara-x/">YARA-X</a></li><li><a title="Microsoft on Star Blizzard disruption" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/03/protecting-democratic-institutions-from-cyber-threats/">Microsoft on Star Blizzard disruption</a></li><li><a title="Tom Rid: The lies Russia tells itself" rel="nofollow" href="https://archive.ph/ZCFqK">Tom Rid: The lies Russia tells itself</a></li><li><a title="North Korea caught targeting German missile manufacturer" rel="nofollow" href="https://www.securityweek.com/north-korea-hackers-linked-to-breach-of-german-missile-manufacturer/">North Korea caught targeting German missile manufacturer</a></li><li><a title="How North Korea infiltrated the crypto industry" rel="nofollow" href="https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/">How North Korea infiltrated the crypto industry</a></li><li><a title="ICE signs $2M contract with spyware maker Paragon" rel="nofollow" href="https://archive.ph/nCEjT">ICE signs $2M contract with spyware maker Paragon</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 15</strong>:  Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro&#39;s subscription model, a major new YARA update, and ongoing issues with VirusTotal&#39;s value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid&#39;s essay on Russian disinformation results, and the US government&#39;s ICE department using commercial spyware from an Israeli vendor.</p>

<p><strong>Cast:</strong> <a href="https://twitter.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade</a> (SentinelLabs), <a href="https://twitter.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh) and <a href="https://twitter.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1UaVJw7KE2Bl1p1ftqiE5g_CvMXe91eqNfv1_pKAx9uY/edit?usp=sharing">Transcript (unedited, AI-generated)</a></li><li><a title="VB abstract: The Mask has been unmasked again" rel="nofollow" href="https://www.virusbulletin.com/conference/vb2024/abstracts/mask-has-been-unmasked-again/">VB abstract: The Mask has been unmasked again</a></li><li><a title="Discover IDA 9.0" rel="nofollow" href="https://hex-rays.com/blog/discover-ida-9.0-exciting-new-features-and-improvements">Discover IDA 9.0</a></li><li><a title="Binary Ninja" rel="nofollow" href="https://binary.ninja/">Binary Ninja</a></li><li><a title="Vertex Synapse" rel="nofollow" href="https://vertex.link/synapse">Vertex Synapse</a></li><li><a title="YARA-X" rel="nofollow" href="https://virustotal.github.io/yara-x/">YARA-X</a></li><li><a title="Microsoft on Star Blizzard disruption" rel="nofollow" href="https://blogs.microsoft.com/on-the-issues/2024/10/03/protecting-democratic-institutions-from-cyber-threats/">Microsoft on Star Blizzard disruption</a></li><li><a title="Tom Rid: The lies Russia tells itself" rel="nofollow" href="https://archive.ph/ZCFqK">Tom Rid: The lies Russia tells itself</a></li><li><a title="North Korea caught targeting German missile manufacturer" rel="nofollow" href="https://www.securityweek.com/north-korea-hackers-linked-to-breach-of-german-missile-manufacturer/">North Korea caught targeting German missile manufacturer</a></li><li><a title="How North Korea infiltrated the crypto industry" rel="nofollow" href="https://www.coindesk.com/tech/2024/10/02/how-north-korea-infiltrated-the-crypto-industry/">How North Korea infiltrated the crypto industry</a></li><li><a title="ICE signs $2M contract with spyware maker Paragon" rel="nofollow" href="https://archive.ph/nCEjT">ICE signs $2M contract with spyware maker Paragon</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+4ei1IhLn</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+4ei1IhLn" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Exploding beepers, critical CUPS flaws, Windows Recall rebuilt for security</title>
      <link>http://securityconversations.fireside.fm/tbp-ep14</link>
      <guid isPermaLink="false">7bd21833-9dcc-4396-a991-be2d3271f727</guid>
      <pubDate>Sat, 28 Sep 2024 12:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7bd21833-9dcc-4396-a991-be2d3271f727.mp3" length="63398046" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 14: The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.

This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</itunes:subtitle>
      <itunes:duration>1:19:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7bd21833-9dcc-4396-a991-be2d3271f727/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 14</strong>:  The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky&#39;s controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.</p>

<p>(<em>This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.</em>)</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>LABScon, Windows Recall, CrowdStrike, Kaspersky, UltraAV, Artificial Intelligence</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 14</strong>:  The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky&#39;s controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.</p>

<p>(<em>This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.</em>)</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="The Consolation of Threat Intel (JAG-S LABScon keynote)" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">The Consolation of Threat Intel (JAG-S LABScon keynote)</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Windows Recall gets major security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Windows Recall gets major security makeover</a></li><li><a title="David Weston on Windows Recall security reboot" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/">David Weston on Windows Recall security reboot</a></li><li><a title="Critical Linux CUPS remote code execution " rel="nofollow" href="https://www.theregister.com/2024/09/26/cups_linux_rce_disclosed/">Critical Linux CUPS remote code execution </a></li><li><a title="How Israel Built Exploding Pagers" rel="nofollow" href="https://archive.ph/kKDVy">How Israel Built Exploding Pagers</a> &mdash; How Israel Built a Modern-Day Trojan Horse: Exploding Pagers</li><li><a title="Apple Suddenly Drops NSO Group Spyware Lawsuit" rel="nofollow" href="https://www.securityweek.com/apple-suddenly-drops-nso-group-spyware-lawsuit/">Apple Suddenly Drops NSO Group Spyware Lawsuit</a></li><li><a title="CrowdStrike Overhauls Testing and Rollout Procedures" rel="nofollow" href="https://www.securityweek.com/crowdstrike-overhauls-testing-and-rollout-procedures-to-avoid-bsod-crashes/">CrowdStrike Overhauls Testing and Rollout Procedures</a></li><li><a title="Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek" rel="nofollow" href="https://www.securityweek.com/post-crowdstrike-fallout-microsoft-redesigning-edr-vendor-access-to-windows-kernel/">Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek</a></li><li><a title="Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent" rel="nofollow" href="https://www.securityweek.com/users-quick-to-remove-ultraav-after-silent-transition-from-kaspersky-antivirus/">Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10P5vAvj_MQplH8XPtYKr6mGuNVhPjxZePgI5y4cKPBw/edit#heading=h.rbgx0o903h7o">Transcript (unedited, AI-generated)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 14</strong>:  The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky&#39;s controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon.</p>

<p>(<em>This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.</em>)</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="The Consolation of Threat Intel (JAG-S LABScon keynote)" rel="nofollow" href="https://securityconversations.com/episode/ep13-the-consolation-of-threat-intel-jag-s-labscon-keynote/">The Consolation of Threat Intel (JAG-S LABScon keynote)</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Windows Recall gets major security makeover" rel="nofollow" href="https://www.securityweek.com/microsofts-controversial-recall-returns-with-proof-of-presence-encryption-data-isolation-opt-in-model/">Windows Recall gets major security makeover</a></li><li><a title="David Weston on Windows Recall security reboot" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/09/27/update-on-recall-security-and-privacy-architecture/">David Weston on Windows Recall security reboot</a></li><li><a title="Critical Linux CUPS remote code execution " rel="nofollow" href="https://www.theregister.com/2024/09/26/cups_linux_rce_disclosed/">Critical Linux CUPS remote code execution </a></li><li><a title="How Israel Built Exploding Pagers" rel="nofollow" href="https://archive.ph/kKDVy">How Israel Built Exploding Pagers</a> &mdash; How Israel Built a Modern-Day Trojan Horse: Exploding Pagers</li><li><a title="Apple Suddenly Drops NSO Group Spyware Lawsuit" rel="nofollow" href="https://www.securityweek.com/apple-suddenly-drops-nso-group-spyware-lawsuit/">Apple Suddenly Drops NSO Group Spyware Lawsuit</a></li><li><a title="CrowdStrike Overhauls Testing and Rollout Procedures" rel="nofollow" href="https://www.securityweek.com/crowdstrike-overhauls-testing-and-rollout-procedures-to-avoid-bsod-crashes/">CrowdStrike Overhauls Testing and Rollout Procedures</a></li><li><a title="Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek" rel="nofollow" href="https://www.securityweek.com/post-crowdstrike-fallout-microsoft-redesigning-edr-vendor-access-to-windows-kernel/">Microsoft Redesigning EDR Vendor Access to Windows Kernel - SecurityWeek</a></li><li><a title="Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent" rel="nofollow" href="https://www.securityweek.com/users-quick-to-remove-ultraav-after-silent-transition-from-kaspersky-antivirus/">Kaspersky Sparks Outrage as UltraAV Takes Over Systems Without Consent</a></li><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/10P5vAvj_MQplH8XPtYKr6mGuNVhPjxZePgI5y4cKPBw/edit#heading=h.rbgx0o903h7o">Transcript (unedited, AI-generated)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+5KTDnPMw</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+5KTDnPMw" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep13: The Consolation of Threat Intel (JAG-S LABScon keynote)</title>
      <link>http://securityconversations.fireside.fm/tbp-ep13</link>
      <guid isPermaLink="false">6ceedb7b-2400-45e2-8798-027400574c18</guid>
      <pubDate>Sat, 21 Sep 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6ceedb7b-2400-45e2-8798-027400574c18.mp3" length="30869148" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem Episode 13:  This is a special edition of the show, featuring Juan Andres Guerrero-Saade's full keynote day remarks at LABScon2024.  In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disenfranchisement among professionals, the void in meaningful work, and the importance of reclaiming control and value in cybersecurity. Juan emphasizes the need for researchers, journalists, and even VCs, to be the change to reinvigorate the industry and ensure its relevance and impact.

Cast: Juan Andres Guerrero-Saade (SentinelLabs).  Costin Raiu and Ryan Naraine are listening to this episode.</itunes:subtitle>
      <itunes:duration>31:41</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6ceedb7b-2400-45e2-8798-027400574c18/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 13</strong>:  This is a special edition of the show, featuring Juan Andres Guerrero-Saade&#39;s full keynote day remarks at LABScon2024.  In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disenfranchisement among professionals, the void in meaningful work, and the importance of reclaiming control and value in cybersecurity. Juan emphasizes the need for researchers, journalists, and even VCs, to be the change to reinvigorate the industry and ensure its relevance and impact.</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs).  Costin Raiu and Ryan Naraine are listening to this episode.</p>]]>
      </description>
      <itunes:keywords>threat intel, APT, nation-state, balkanization, journalism, research, venture capital</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 13</strong>:  This is a special edition of the show, featuring Juan Andres Guerrero-Saade&#39;s full keynote day remarks at LABScon2024.  In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disenfranchisement among professionals, the void in meaningful work, and the importance of reclaiming control and value in cybersecurity. Juan emphasizes the need for researchers, journalists, and even VCs, to be the change to reinvigorate the industry and ensure its relevance and impact.</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs).  Costin Raiu and Ryan Naraine are listening to this episode.</p><p>Links:</p><ul><li><a title="LABScon 2024" rel="nofollow" href="https://www.labscon.io/">LABScon 2024</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 13</strong>:  This is a special edition of the show, featuring Juan Andres Guerrero-Saade&#39;s full keynote day remarks at LABScon2024.  In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disenfranchisement among professionals, the void in meaningful work, and the importance of reclaiming control and value in cybersecurity. Juan emphasizes the need for researchers, journalists, and even VCs, to be the change to reinvigorate the industry and ensure its relevance and impact.</p>

<p><strong>Cast:</strong> Juan Andres Guerrero-Saade (SentinelLabs).  Costin Raiu and Ryan Naraine are listening to this episode.</p><p>Links:</p><ul><li><a title="LABScon 2024" rel="nofollow" href="https://www.labscon.io/">LABScon 2024</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+QWdsOCh1</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+QWdsOCh1" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep12:  Security use-cases for AI chain-of-thought reasoning</title>
      <link>http://securityconversations.fireside.fm/chain-of-thoughtreasoningcomestoai</link>
      <guid isPermaLink="false">ffff9da7-62a5-420f-9de7-6ff155b11720</guid>
      <pubDate>Sat, 14 Sep 2024 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ffff9da7-62a5-420f-9de7-6ff155b11720.mp3" length="60684575" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 12:  Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity.  We discuss the hype around OpenAI's new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed source AI models.

Cast: Gabriel Bernadett-Shapiro, Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)

* Costin Raiu is on vacation.</itunes:subtitle>
      <itunes:duration>1:14:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/ffff9da7-62a5-420f-9de7-6ff155b11720/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 12</strong>:  Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity.  We discuss the hype around OpenAI&#39;s new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed source AI models.</p>

<p><strong>Cast:</strong> <a href="https://x.com/Gabeincognito" rel="nofollow"> Gabriel Bernadett-Shapiro </a>  , <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).   </p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul>]]>
      </description>
      <itunes:keywords>OpenAI, cybersecurity, machine learning, vulnerability discovery, LABScon, generative AI, AI models</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 12</strong>:  Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity.  We discuss the hype around OpenAI&#39;s new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed source AI models.</p>

<p><strong>Cast:</strong> <a href="https://x.com/Gabeincognito" rel="nofollow"> Gabriel Bernadett-Shapiro </a>  , <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).   </p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1VBfGw5k6ed8rjQgA-aCRKdVNIBArxA-33FvxjOVZVHY/edit?usp=sharing">Transcript</a></li><li><a title="Gabe Bernadett-Shapiro at the Alperovitch Institute" rel="nofollow" href="https://alperovitch.sais.jhu.edu/diving-into-the-world-of-ai-machine-learning-w-gabriel-bernadett-shapiro/">Gabe Bernadett-Shapiro at the Alperovitch Institute</a></li><li><a title="Introducing OpenAI o1" rel="nofollow" href="https://openai.com/index/introducing-openai-o1-preview/">Introducing OpenAI o1</a></li><li><a title="OpenAI&#39;s o1 model &#39;cheated&#39; on an impossible test" rel="nofollow" href="https://www.tomsguide.com/ai/chatgpt/openais-new-chatgpt-o1-model-cheated-on-an-impossible-test-heres-what-happened">OpenAI's o1 model 'cheated' on an impossible test</a></li><li><a title="OpenAI o1 System Card" rel="nofollow" href="https://assets.ctfassets.net/kftzwdyauwt9/67qJD51Aur3eIc96iOfeOP/71551c3d223cd97e591aa89567306912/o1_system_card.pdf">OpenAI o1 System Card</a></li><li><a title="Learning to Reason with LLMs" rel="nofollow" href="https://openai.com/index/learning-to-reason-with-llms/">Learning to Reason with LLMs</a></li><li><a title="LABScon 2024 Full Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2024/websitePage:9107aab7-3c7b-47d0-bad4-4f85cf7fcecd">LABScon 2024 Full Agenda</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 12</strong>:  Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity.  We discuss the hype around OpenAI&#39;s new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed source AI models.</p>

<p><strong>Cast:</strong> <a href="https://x.com/Gabeincognito" rel="nofollow"> Gabriel Bernadett-Shapiro </a>  , <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek).   </p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript" rel="nofollow" href="https://docs.google.com/document/d/1VBfGw5k6ed8rjQgA-aCRKdVNIBArxA-33FvxjOVZVHY/edit?usp=sharing">Transcript</a></li><li><a title="Gabe Bernadett-Shapiro at the Alperovitch Institute" rel="nofollow" href="https://alperovitch.sais.jhu.edu/diving-into-the-world-of-ai-machine-learning-w-gabriel-bernadett-shapiro/">Gabe Bernadett-Shapiro at the Alperovitch Institute</a></li><li><a title="Introducing OpenAI o1" rel="nofollow" href="https://openai.com/index/introducing-openai-o1-preview/">Introducing OpenAI o1</a></li><li><a title="OpenAI&#39;s o1 model &#39;cheated&#39; on an impossible test" rel="nofollow" href="https://www.tomsguide.com/ai/chatgpt/openais-new-chatgpt-o1-model-cheated-on-an-impossible-test-heres-what-happened">OpenAI's o1 model 'cheated' on an impossible test</a></li><li><a title="OpenAI o1 System Card" rel="nofollow" href="https://assets.ctfassets.net/kftzwdyauwt9/67qJD51Aur3eIc96iOfeOP/71551c3d223cd97e591aa89567306912/o1_system_card.pdf">OpenAI o1 System Card</a></li><li><a title="Learning to Reason with LLMs" rel="nofollow" href="https://openai.com/index/learning-to-reason-with-llms/">Learning to Reason with LLMs</a></li><li><a title="LABScon 2024 Full Agenda" rel="nofollow" href="https://events.sentinelone.com/event/LABScon2024/websitePage:9107aab7-3c7b-47d0-bad4-4f85cf7fcecd">LABScon 2024 Full Agenda</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+qEjd3IgP</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+qEjd3IgP" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep11: Cyberwarfare takes an ominous turn</title>
      <link>http://securityconversations.fireside.fm/cyberwarfare-takes-an-ominous-turn</link>
      <guid isPermaLink="false">f6139b28-a754-4280-9c11-a9de522d2348</guid>
      <pubDate>Fri, 06 Sep 2024 01:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f6139b28-a754-4280-9c11-a9de522d2348.mp3" length="59083969" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 11:  Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.

Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:15:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f6139b28-a754-4280-9c11-a9de522d2348/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>GRU, Russia, China, North Korea, South Korea, Unit 29155, Doppelganger, YARA, CISA, zero-day, influence operations, Skripal, skills shortage</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 11</strong>: Russia&#39;s notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down &#39;Doppelganger&#39; network spreading Russian propaganda; CISA&#39;s budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise.</p>

<p><strong>Cast:</strong>  <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1jCRDYi37JVCLOSjO8WR15qxuH6PNacAwjTD7Xs8jblg/edit#heading=h.r1e6eglcl8gr">Transcript (unedited)</a></li><li><a title="CISA advisory on GRU Unit 29155" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a">CISA advisory on GRU Unit 29155</a> &mdash; Russian Military Cyber Actors Target US and Global Critical Infrastructure</li><li><a title="Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage" rel="nofollow" href="https://www.securityweek.com/russian-gru-unit-tied-to-assassinations-linked-to-global-cyber-sabotage-and-espionage/">Russian Military Unit Tied to Assassinations Caught Doing Cyber Sabotage</a></li><li><a title="Doppelganger takedown" rel="nofollow" href="https://www.justice.gov/opa/pr/justice-department-disrupts-covert-russian-government-sponsored-foreign-malign-influence">Doppelganger takedown</a></li><li><a title="U.S. says Russian bots, RT operatives interfere in elections" rel="nofollow" href="https://www.npr.org/2024/09/04/nx-s1-5100329/us-russia-election-interference-bots-2024">U.S. says Russian bots, RT operatives interfere in elections</a></li><li><a title="Outsized Impact of a Few Chinese Hackers" rel="nofollow" href="https://warontherocks.com/2024/09/from-world-champions-to-state-assets-the-outsized-impact-of-a-few-chinese-hackers/">Outsized Impact of a Few Chinese Hackers</a></li><li><a title="Korean zero-day discovery" rel="nofollow" href="https://www.welivesecurity.com/en/eset-research/analysis-of-two-arbitrary-code-execution-vulnerabilities-affecting-wps-office/">Korean zero-day discovery</a></li><li><a title="North Korea caught exploiting Chromium zero-day" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/">North Korea caught exploiting Chromium zero-day</a></li><li><a title="#LABScon24 Agenda" rel="nofollow" href="https://s1.ai/agenda24">#LABScon24 Agenda</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+dxPm5F1Q</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+dxPm5F1Q" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep10: Volt Typhoon zero-day, Russia's APT29 reusing spyware exploits, Pavel Durov's arrest</title>
      <link>http://securityconversations.fireside.fm/tbp-ep10</link>
      <guid isPermaLink="false">a8b95520-0c50-46d8-bc16-25bbab115bb9</guid>
      <pubDate>Fri, 30 Aug 2024 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a8b95520-0c50-46d8-bc16-25bbab115bb9.mp3" length="60633397" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Three Buddy Problem - Episode 10 -- Top stories this week: Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France. Plus, the NSA is launching a podcast.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:18:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a8b95520-0c50-46d8-bc16-25bbab115bb9/cover.jpg?v=1"/>
      <podcast:transcript url="https://assets.fireside.fm/file/fireside-images-2024/podcasts/transcripts/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a8b95520-0c50-46d8-bc16-25bbab115bb9/transcript.txt" type="text/plain"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 10</strong>: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia&#39;s APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France.  Plus, the NSA is launching a podcast.</p>

<p><strong>Hosts:</strong> <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>Volt Typhoon, Versa Director, zero-day, network-based attacks, ransomware, APT groups, exploit reuse, iOS exploitation, Pavel Durov, Telegram, encryption, LABScon</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 10</strong>: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia&#39;s APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France.  Plus, the NSA is launching a podcast.</p>

<p><strong>Hosts:</strong> <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Ke2F-qUJpxb6Mnx7wOFYeteoZqfDs_bPqg0jXAyXtGU/edit#heading=h.roy1ekwa04iz">Transcript (unedited)</a></li><li><a title="China&#39;s Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-caught-exploiting-versa-networks-sd-wan-zero-day/">China's Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs</a></li><li><a title="Versa Director Zero-Day Exploitation - Black Lotus Labs" rel="nofollow" href="https://blog.lumen.com/taking-the-crossroads-the-versa-director-zero-day-exploitation/">Versa Director Zero-Day Exploitation - Black Lotus Labs</a></li><li><a title="CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability" rel="nofollow" href="https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/">CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability</a></li><li><a title="Google TAG: APT29 using same exploits as Intellexa, NSO Group" rel="nofollow" href="https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/">Google TAG: APT29 using same exploits as Intellexa, NSO Group</a></li><li><a title="Russia&#39;s APT29 Reusing Exploits From Spyware Merchants" rel="nofollow" href="https://www.securityweek.com/google-catches-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/">Russia's APT29 Reusing Exploits From Spyware Merchants</a></li><li><a title="Official Pavel Durov charges (PDF)" rel="nofollow" href="https://www.tribunal-de-paris.justice.fr/sites/default/files/2024-08/2024-08-26%20-%20CP%20TELEGRAM%20.pdf">Official Pavel Durov charges (PDF)</a></li><li><a title="WSJ: Pavel Durov&#39;s iPhone was hacked by France, UAE" rel="nofollow" href="https://archive.ph/FFPt2">WSJ: Pavel Durov's iPhone was hacked by France, UAE</a></li><li><a title="Microsoft Calls EDR Summit" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/08/23/microsoft-to-host-windows-endpoint-security-ecosystem-summit-in-september/">Microsoft Calls EDR Summit</a></li><li><a title="NSA to Launch ‘No Such Podcast’" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/article/3888139/nsa-to-launch-no-such-podcast-pulling-back-curtain-on-mission-culture-people/">NSA to Launch ‘No Such Podcast’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/apt29">APT29 / Midnight Blizzard</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 10</strong>: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia&#39;s APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France.  Plus, the NSA is launching a podcast.</p>

<p><strong>Hosts:</strong> <a href="https://x.com/craiu" rel="nofollow">Costin Raiu</a> (Art of Noh), <a href="https://x.com/juanandres_gs" rel="nofollow">Juan Andres Guerrero-Saade </a>(SentinelLabs), <a href="https://x.com/ryanaraine" rel="nofollow">Ryan Naraine</a> (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Ke2F-qUJpxb6Mnx7wOFYeteoZqfDs_bPqg0jXAyXtGU/edit#heading=h.roy1ekwa04iz">Transcript (unedited)</a></li><li><a title="China&#39;s Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-caught-exploiting-versa-networks-sd-wan-zero-day/">China's Volt Typhoon Exploiting Zero-Day in Servers Used by ISPs, MSPs</a></li><li><a title="Versa Director Zero-Day Exploitation - Black Lotus Labs" rel="nofollow" href="https://blog.lumen.com/taking-the-crossroads-the-versa-director-zero-day-exploitation/">Versa Director Zero-Day Exploitation - Black Lotus Labs</a></li><li><a title="CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability" rel="nofollow" href="https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/">CVE-2024-39717 – Versa Director Dangerous File Type Upload Vulnerability</a></li><li><a title="Google TAG: APT29 using same exploits as Intellexa, NSO Group" rel="nofollow" href="https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/">Google TAG: APT29 using same exploits as Intellexa, NSO Group</a></li><li><a title="Russia&#39;s APT29 Reusing Exploits From Spyware Merchants" rel="nofollow" href="https://www.securityweek.com/google-catches-russian-apt-re-using-exploits-from-spyware-merchants-nso-group-intellexa/">Russia's APT29 Reusing Exploits From Spyware Merchants</a></li><li><a title="Official Pavel Durov charges (PDF)" rel="nofollow" href="https://www.tribunal-de-paris.justice.fr/sites/default/files/2024-08/2024-08-26%20-%20CP%20TELEGRAM%20.pdf">Official Pavel Durov charges (PDF)</a></li><li><a title="WSJ: Pavel Durov&#39;s iPhone was hacked by France, UAE" rel="nofollow" href="https://archive.ph/FFPt2">WSJ: Pavel Durov's iPhone was hacked by France, UAE</a></li><li><a title="Microsoft Calls EDR Summit" rel="nofollow" href="https://blogs.windows.com/windowsexperience/2024/08/23/microsoft-to-host-windows-endpoint-security-ecosystem-summit-in-september/">Microsoft Calls EDR Summit</a></li><li><a title="NSA to Launch ‘No Such Podcast’" rel="nofollow" href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/article/3888139/nsa-to-launch-no-such-podcast-pulling-back-curtain-on-mission-culture-people/">NSA to Launch ‘No Such Podcast’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li><li><a title="APT29 / Midnight Blizzard" rel="nofollow" href="https://malpedia.caad.fkie.fraunhofer.de/actor/apt29">APT29 / Midnight Blizzard</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+thun-Ekj</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+thun-Ekj" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep9: The blurring lines between nation-state APTs and the ransomware epidemic</title>
      <link>http://securityconversations.fireside.fm/tbp-ep9</link>
      <guid isPermaLink="false">7e54af0b-f1c0-4741-8b5c-e90eddd617b7</guid>
      <pubDate>Fri, 23 Aug 2024 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7e54af0b-f1c0-4741-8b5c-e90eddd617b7.mp3" length="57472403" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 9:  On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. 

Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024  keynote stage.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:06:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7e54af0b-f1c0-4741-8b5c-e90eddd617b7/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>Taiwan, Hitcon, APTs, ransomware, visibility, attribution, threat intelligence, MIVD, Dutch Intel, Netherlands, Japan, Switzerland, cyber operations, ransomware, Iranian hacking, election interference, patching shenanigans, Xiaomi</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 9</strong>: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. </p>

<p>Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="WSJ: The Real Story of the Nord Stream Pipeline Sabotage" rel="nofollow" href="https://archive.ph/TR92c">WSJ: The Real Story of the Nord Stream Pipeline Sabotage</a></li><li><a title="MIVD - The Little Spy Agency That Can" rel="nofollow" href="https://www.spytalk.co/p/the-little-spy-agency-that-can">MIVD - The Little Spy Agency That Can</a></li><li><a title="Iran behind Trump campaign hack" rel="nofollow" href="https://www.reuters.com/world/trump-campaigns-iranian-hackers-have-dangerous-history-deep-expertise-2024-08-23/">Iran behind Trump campaign hack</a></li><li><a title="Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln" rel="nofollow" href="https://hackhunting.com/2024/08/22/xiaomi-patched-an-rce-vulnerability-before-pwn2own-toronto-2023-and-removed-the-patch-afterwards/">Xiaomi Caught Patching, Unpatching Pwn2Own RCE Vuln</a></li><li><a title="Dakota Cary on Xiaomi Pwn2Own patch shenanigans" rel="nofollow" href="https://x.com/dakotaindc/status/1826774594159849586?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">Dakota Cary on Xiaomi Pwn2Own patch shenanigans</a></li><li><a title="Transcript (unedited)" rel="nofollow" href="https://docs.google.com/document/d/1l51jwxKqG3mPAe646xgu7PlbqxLee8hIf3CvuHv1lkI/edit?usp=sharing">Transcript (unedited)</a></li><li><a title="Territorial Dispute by Boldi" rel="nofollow" href="https://www.crysys.hu/publications/files/tedi/ukatemicrysys_territorialdispute.pdf">Territorial Dispute by Boldi</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Q0rfcsK9</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Q0rfcsK9" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep8: Microsoft's zero-days and a wormable Windows TCP/IP flaw known to China</title>
      <link>http://securityconversations.fireside.fm/tbp-ep8</link>
      <guid isPermaLink="false">41525c06-937d-4766-8bb0-e94c8a297650</guid>
      <pubDate>Sat, 17 Aug 2024 04:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/41525c06-937d-4766-8bb0-e94c8a297650.mp3" length="62622049" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 8: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:17:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/41525c06-937d-4766-8bb0-e94c8a297650/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 8</strong>: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>Microsoft, Black Hat, Defcon, LabsCon, Patch Tuesday, zero-day vulnerabilities, IPv6, China, transparency, cybersecurity, Microsoft, IOCs, Iranian hacking, APT names, Palo Alto, CrowdStrike, Qihoo 360, exploitability, balkanization </itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 8</strong>: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode 8 Transcript" rel="nofollow" href="https://docs.google.com/document/d/1zhmvqqWPnK7FLZK38LWGBKm2u29leNXiVESA9mBtrns/edit#heading=h.79ibg3a5rrr7">Episode 8 Transcript</a></li><li><a title="Six Windows Zero-Days Being Actively Exploited" rel="nofollow" href="https://www.securityweek.com/microsoft-warns-of-six-windows-zero-days-being-actively-exploited/">Six Windows Zero-Days Being Actively Exploited</a></li><li><a title="CVE-2024-38063 - Windows Ping of Death" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063">CVE-2024-38063 - Windows Ping of Death</a></li><li><a title="Wormable TCP/IP flaw known to China" rel="nofollow" href="https://www.securityweek.com/zero-click-exploit-concerns-drive-urgent-patching-of-windows-tcp-ip-flaw/">Wormable TCP/IP flaw known to China</a> &mdash; Chinese researcher Xiao Wei of Cyber KunLun said he discovered the vulnerability “several months ago.”  </li><li><a title="Google TAG: Iran steps hacking against Israel, U.S." rel="nofollow" href="https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/">Google TAG: Iran steps hacking against Israel, U.S.</a></li><li><a title="Microsoft report on Iran election hacking" rel="nofollow" href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf">Microsoft report on Iran election hacking</a></li><li><a title="Qihoo claims CrowdStrike bug exploitable" rel="nofollow" href="https://mp-weixin-qq-com.translate.goog/s/uD7mhzyRSX1dTW-TMg4UhQ?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">Qihoo claims CrowdStrike bug exploitable</a></li><li><a title="CrowdStrike root cause analysis" rel="nofollow" href="https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf">CrowdStrike root cause analysis</a></li><li><a title="LABScon - Speakers 2024" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon - Speakers 2024</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 8</strong>: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode 8 Transcript" rel="nofollow" href="https://docs.google.com/document/d/1zhmvqqWPnK7FLZK38LWGBKm2u29leNXiVESA9mBtrns/edit#heading=h.79ibg3a5rrr7">Episode 8 Transcript</a></li><li><a title="Six Windows Zero-Days Being Actively Exploited" rel="nofollow" href="https://www.securityweek.com/microsoft-warns-of-six-windows-zero-days-being-actively-exploited/">Six Windows Zero-Days Being Actively Exploited</a></li><li><a title="CVE-2024-38063 - Windows Ping of Death" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063">CVE-2024-38063 - Windows Ping of Death</a></li><li><a title="Wormable TCP/IP flaw known to China" rel="nofollow" href="https://www.securityweek.com/zero-click-exploit-concerns-drive-urgent-patching-of-windows-tcp-ip-flaw/">Wormable TCP/IP flaw known to China</a> &mdash; Chinese researcher Xiao Wei of Cyber KunLun said he discovered the vulnerability “several months ago.”  </li><li><a title="Google TAG: Iran steps hacking against Israel, U.S." rel="nofollow" href="https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/">Google TAG: Iran steps hacking against Israel, U.S.</a></li><li><a title="Microsoft report on Iran election hacking" rel="nofollow" href="https://cdn-dynmedia-1.microsoft.com/is/content/microsoftcorp/microsoft/final/en-us/microsoft-brand/documents/5bc57431-a7a9-49ad-944d-b93b7d35d0fc.pdf">Microsoft report on Iran election hacking</a></li><li><a title="Qihoo claims CrowdStrike bug exploitable" rel="nofollow" href="https://mp-weixin-qq-com.translate.goog/s/uD7mhzyRSX1dTW-TMg4UhQ?_x_tr_sl=auto&amp;_x_tr_tl=en&amp;_x_tr_hl=en&amp;_x_tr_pto=wapp">Qihoo claims CrowdStrike bug exploitable</a></li><li><a title="CrowdStrike root cause analysis" rel="nofollow" href="https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf">CrowdStrike root cause analysis</a></li><li><a title="LABScon - Speakers 2024" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon - Speakers 2024</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+JO6FpFu4</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+JO6FpFu4" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep7: Crowd2K and the kernel, PKFail supply chain failures, Paris trains sabotage and Russian Olympic attacks</title>
      <link>http://securityconversations.fireside.fm/tbp-ep7</link>
      <guid isPermaLink="false">644134aa-4795-434a-8b2d-9a748cab7561</guid>
      <pubDate>Fri, 02 Aug 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/644134aa-4795-434a-8b2d-9a748cab7561.mp3" length="66162188" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 7:  In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.

The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.

Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:10:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/644134aa-4795-434a-8b2d-9a748cab7561/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>Microsoft, CrowdStrike, Windows kernel, Russia, cyberwar, Dan Geer, PKFail, secure boot bypass, software liability, infrastructure attacks, Olympics, prisoner exchange, Stuxnet</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Xbor_CopwaQiZpInKRXNnyf5CF80bInYP1Yvl_2-wQ0/edit?usp=sharing">Episode Transcript</a></li><li><a title="Microsoft VP David Weston on CrowdStrike issue" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/">Microsoft VP David Weston on CrowdStrike issue</a></li><li><a title="Delta seeking damages from CrowdStrike, Microsoft" rel="nofollow" href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html">Delta seeking damages from CrowdStrike, Microsoft</a></li><li><a title="Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme" rel="nofollow" href="https://www.securityweek.com/wealthy-russian-with-kremlin-ties-gets-9-years-in-prison-for-hacking-and-insider-trading-scheme/">Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme</a></li><li><a title="Industroyer" rel="nofollow" href="https://en.wikipedia.org/wiki/Industroyer">Industroyer</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon</a></li><li><a title="LABScon Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers</a></li><li><a title="Livestream from DEFCON 32" rel="nofollow" href="https://bishopfox.com/defcon-32-livestream">Livestream from DEFCON 32</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 7</strong>:   In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms.</p>

<p>The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations.</p>

<p><strong>Hosts:</strong> Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode Transcript" rel="nofollow" href="https://docs.google.com/document/d/1Xbor_CopwaQiZpInKRXNnyf5CF80bInYP1Yvl_2-wQ0/edit?usp=sharing">Episode Transcript</a></li><li><a title="Microsoft VP David Weston on CrowdStrike issue" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2024/07/27/windows-security-best-practices-for-integrating-and-managing-security-tools/">Microsoft VP David Weston on CrowdStrike issue</a></li><li><a title="Delta seeking damages from CrowdStrike, Microsoft" rel="nofollow" href="https://www.cnbc.com/2024/07/29/delta-hires-david-boies-to-seek-damages-from-crowdstrike-microsoft-.html">Delta seeking damages from CrowdStrike, Microsoft</a></li><li><a title="Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme" rel="nofollow" href="https://www.securityweek.com/wealthy-russian-with-kremlin-ties-gets-9-years-in-prison-for-hacking-and-insider-trading-scheme/">Wealthy Russian With Kremlin Ties Gets 9 Years in Prison for Hacking and Insider Trading Scheme</a></li><li><a title="Industroyer" rel="nofollow" href="https://en.wikipedia.org/wiki/Industroyer">Industroyer</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon</a></li><li><a title="LABScon Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon Speakers</a></li><li><a title="Livestream from DEFCON 32" rel="nofollow" href="https://bishopfox.com/defcon-32-livestream">Livestream from DEFCON 32</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+WDzGVNPl</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+WDzGVNPl" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?</title>
      <link>http://securityconversations.fireside.fm/tbp-ep6</link>
      <guid isPermaLink="false">874c67ec-26cd-4395-8713-df1b58629041</guid>
      <pubDate>Fri, 26 Jul 2024 01:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/874c67ec-26cd-4395-8713-df1b58629041.mp3" length="71350827" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 6:  As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.

Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:16:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/874c67ec-26cd-4395-8713-df1b58629041/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>CrowdStrike, Windows, BSOD, detection update, testing, validation, EDR, detection, APT45, groups, IOCs, North Korea, NSO lawsuit, surveillance industry, exploits, zero-days</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 6</strong>:   As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft&#39;s responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel.</p>

<p>Other topics on the show include Mandiant&#39;s attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hospitals, KnowBe4 hiring a fake North Korean IT worker, and new developments in the NSO Group surveillance-ware lawsuit.</p>

<p><strong>Hosts:</strong> Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1ulo0dHr89aShLeHG4TFScq7wErMO7KvJdGX_7oCNlH4/edit?usp=sharing">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Official CrowdStrike preliminary post-mortem" rel="nofollow" href="https://www.crowdstrike.com/falcon-content-update-remediation-and-guidance-hub/">Official CrowdStrike preliminary post-mortem</a></li><li><a title="Microsoft VP David Weston on CrowdStrike outage" rel="nofollow" href="https://blogs.microsoft.com/blog/2024/07/20/helping-our-customers-through-the-crowdstrike-outage/">Microsoft VP David Weston on CrowdStrike outage</a></li><li><a title="Microsoft VP John Cable on the path forward" rel="nofollow" href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/windows-resiliency-best-practices-and-the-path-forward/ba-p/4201550">Microsoft VP John Cable on the path forward</a></li><li><a title="Matt Suiche: Bob and Alice in Kernel-land" rel="nofollow" href="https://www.msuiche.com/posts/bob-and-alice-in-kernel-land/">Matt Suiche: Bob and Alice in Kernel-land</a></li><li><a title="Re-learning Lessons from the CrowdStrike Outage" rel="nofollow" href="https://www.lutasecurity.com/post/re-learning-lessons-from-the-crowdstrike-outage">Re-learning Lessons from the CrowdStrike Outage</a></li><li><a title="Ep5: CrowdStrike&#39;s faulty update" rel="nofollow" href="https://securityconversations.com/episode/ep5-crowdstrikes-faulty-update-shuts-down-global-networks/">Ep5: CrowdStrike's faulty update</a></li><li><a title="Mandiant Report on North Korea&#39;s APT45" rel="nofollow" href="https://cloud.google.com/blog/topics/threat-intelligence/apt45-north-korea-digital-military-machine">Mandiant Report on North Korea's APT45</a></li><li><a title="CISA Advisory on North Korea APT45" rel="nofollow" href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-207a">CISA Advisory on North Korea APT45</a></li><li><a title="KnowBe4 Hires North Korean Fake IT Worker" rel="nofollow" href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">KnowBe4 Hires North Korean Fake IT Worker</a></li><li><a title="Israel’s attempt to sway NSO/WhatsApp spyware case" rel="nofollow" href="https://securitylab.amnesty.org/latest/2024/07/israels-attempt-to-sway-whatsapp-case-casts-doubt-on-its-ability-to-deal-with-nso-spyware/?ref=news.risky.biz">Israel’s attempt to sway NSO/WhatsApp spyware case</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+SrXL95yL</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+SrXL95yL" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep5: CrowdStrike's faulty update shuts down global networks</title>
      <link>http://securityconversations.fireside.fm/tbp-ep5</link>
      <guid isPermaLink="false">85b284cc-9ab4-4a38-8a4e-9d6439345bcb</guid>
      <pubDate>Fri, 19 Jul 2024 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/85b284cc-9ab4-4a38-8a4e-9d6439345bcb.mp3" length="54810148" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 5:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.

We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.

Plus, some news on upcoming keynote speakers at LabsCon 2024.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>59:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/85b284cc-9ab4-4a38-8a4e-9d6439345bcb/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 5</strong>:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.</p>

<p>We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.</p>

<p>Plus, some news on upcoming keynote speakers at LabsCon 2024.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p>]]>
      </description>
      <itunes:keywords>CrowdStrike, software update, blue screens, Microsoft 365 outage, AT&amp;T breach, EDR, ransomware, stolen data, cybersecurity, AT&amp;T data breach, FBI, password-protected phone, zero-click exploits, APT 41, NullBulge, LabsCon,</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 5</strong>:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.</p>

<p>We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.</p>

<p>Plus, some news on upcoming keynote speakers at LabsCon 2024.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (AI-generated, unedited)" rel="nofollow" href="https://docs.google.com/document/d/11C0JmY7o58yPUJs7jutahdmV1-ZI-fv6bL-QhoCW8ww/edit?usp=sharing">Transcript (AI-generated, unedited)</a></li><li><a title="CrowdStrike Statement on Falcon Content Update for Windows Hosts" rel="nofollow" href="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/">CrowdStrike Statement on Falcon Content Update for Windows Hosts</a></li><li><a title="Microsoft-CrowdStrike blackout FAQ" rel="nofollow" href="https://www.cnbc.com/2024/07/19/latest-live-updates-on-a-major-it-outage-spreading-worldwide.html">Microsoft-CrowdStrike blackout FAQ</a></li><li><a title="Bad CrowdStrike Update Linked to Major IT Outages Worldwide" rel="nofollow" href="https://www.securityweek.com/major-outages-worldwide-linked-to-bsod-caused-by-bad-crowdstrike-update/">Bad CrowdStrike Update Linked to Major IT Outages Worldwide</a></li><li><a title="CrowdStrike CEO George Kurtz statement on Twitter" rel="nofollow" href="https://x.com/george_kurtz/status/1814235001745027317?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">CrowdStrike CEO George Kurtz statement on Twitter</a></li><li><a title="AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records" rel="nofollow" href="https://archive.ph/hjbYB">AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records</a></li><li><a title="T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’" rel="nofollow" href="https://archive.ph/fClfV">T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 5</strong>:  Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms.</p>

<p>We also discuss the AT&amp;T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding targets.</p>

<p>Plus, some news on upcoming keynote speakers at LabsCon 2024.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</p><p>Links:</p><ul><li><a title="Transcript (AI-generated, unedited)" rel="nofollow" href="https://docs.google.com/document/d/11C0JmY7o58yPUJs7jutahdmV1-ZI-fv6bL-QhoCW8ww/edit?usp=sharing">Transcript (AI-generated, unedited)</a></li><li><a title="CrowdStrike Statement on Falcon Content Update for Windows Hosts" rel="nofollow" href="https://www.crowdstrike.com/blog/statement-on-falcon-content-update-for-windows-hosts/">CrowdStrike Statement on Falcon Content Update for Windows Hosts</a></li><li><a title="Microsoft-CrowdStrike blackout FAQ" rel="nofollow" href="https://www.cnbc.com/2024/07/19/latest-live-updates-on-a-major-it-outage-spreading-worldwide.html">Microsoft-CrowdStrike blackout FAQ</a></li><li><a title="Bad CrowdStrike Update Linked to Major IT Outages Worldwide" rel="nofollow" href="https://www.securityweek.com/major-outages-worldwide-linked-to-bsod-caused-by-bad-crowdstrike-update/">Bad CrowdStrike Update Linked to Major IT Outages Worldwide</a></li><li><a title="CrowdStrike CEO George Kurtz statement on Twitter" rel="nofollow" href="https://x.com/george_kurtz/status/1814235001745027317?s=46&amp;t=ePKy91eN-ionB9LpDaBXcA">CrowdStrike CEO George Kurtz statement on Twitter</a></li><li><a title="AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records" rel="nofollow" href="https://archive.ph/hjbYB">AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records</a></li><li><a title="T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’" rel="nofollow" href="https://archive.ph/fClfV">T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’</a></li><li><a title="LABScon 2024 Speakers" rel="nofollow" href="https://www.labscon.io/speakers/">LABScon 2024 Speakers</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+5d21al3G</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+5d21al3G" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep4: The AT&amp;T mega-breach, iPhone mercenary spyware, Microsoft zero-days</title>
      <link>http://securityconversations.fireside.fm/tbp-ep4</link>
      <guid isPermaLink="false">37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f</guid>
      <pubDate>Fri, 12 Jul 2024 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f.mp3" length="61000643" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 4:  Listen as the hosts delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away.

Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)</itunes:subtitle>
      <itunes:duration>1:11:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37354ca4-8a6b-41e0-b4d6-e9ad5545cd8f/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p>]]>
      </description>
      <itunes:keywords>AT&amp;T, Snowflake, Microsoft, CSRB, Apple, CISA</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Three Buddy Problem - Episode 4</strong>:  The boys delve into the massive AT&amp;T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets.  Plus, thoughts on Microsoft&#39;s zero-day disclosures and useless Patch Tuesday bulletins,  AI-powered disinformation campaigns, and the US government&#39;s malware sharing initiative fading away.</p>

<p>Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).</p><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/11WOP_5Rx-O52K8aD5utBqi6r26ZTcwF6ncjpXTAz0to/edit">Transcript (unedited, AI-generated)</a></li><li><a title="AT&amp;T SEC Filing on mega-breach" rel="nofollow" href="https://www.sec.gov/Archives/edgar/data/732717/000073271724000046/t-20240506.htm">AT&amp;T SEC Filing on mega-breach</a></li><li><a title="CNN: Nearly all AT&amp;T call and text records exposed in a massive breach" rel="nofollow" href="https://www.cnn.com/2024/07/12/business/att-customers-massive-breach/index.html">CNN: Nearly all AT&amp;T call and text records exposed in a massive breach</a></li><li><a title="Apple warns iPhone users in 98 countries of spyware" rel="nofollow" href="https://techcrunch.com/2024/07/10/apple-alerts-iphone-users-in-98-countries-to-mercenary-spyware-attacks/">Apple warns iPhone users in 98 countries of spyware</a></li><li><a title="India targets Apple over its phone hacking notifications" rel="nofollow" href="https://archive.ph/NMBPd">India targets Apple over its phone hacking notifications</a></li><li><a title="Hyper-V zero-day exploited in the wild" rel="nofollow" href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080">Hyper-V zero-day exploited in the wild</a></li><li><a title="LABScon Program Committee" rel="nofollow" href="https://www.labscon.io/#program-committee">LABScon Program Committee</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+9p89JdNC</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+9p89JdNC" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep3: Dave Aitel joins debate on nation-state hacking responsibilities</title>
      <link>http://securityconversations.fireside.fm/tbp-ep3</link>
      <guid isPermaLink="false">068888b9-32ca-4c20-b8f9-d38c6e24608f</guid>
      <pubDate>Fri, 05 Jul 2024 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/068888b9-32ca-4c20-b8f9-d38c6e24608f.mp3" length="58460157" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 3:  Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. 

We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. 

The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.

* Costin Raiu is on vacation.</itunes:subtitle>
      <itunes:duration>1:04:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/068888b9-32ca-4c20-b8f9-d38c6e24608f/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul>]]>
      </description>
      <itunes:keywords>Microsoft, CSRB, CISA, Triangulation, Chevron deference, Project Zero, Google</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 3</strong>: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA &#39;secure-by-design&#39; pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government&#39;s attempts at cybersecurity regulations. </p>

<p>We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future technology, the role of CISA and its accomplishments, the debate around offensive cyber operations and the responsibility of companies like Google in addressing vulnerabilities. </p>

<p>The need for clear separation between counterterrorism and espionage operations is highlighted, as well as the importance of understanding both defensive and offensive perspectives.</p>

<ul>
<li>Costin Raiu is on vacation.</li>
</ul><p>Links:</p><ul><li><a title="Transcript (unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/17AOWExBNOahaUvnpmusk3ED1n7SOYIUcN9cUTSSP5bc/edit">Transcript (unedited, AI-generated)</a></li><li><a title="Qualys: Remote Unauthenticated Code Execution in OpenSSH" rel="nofollow" href="https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server">Qualys: Remote Unauthenticated Code Execution in OpenSSH</a></li><li><a title="CSRB report on Microsoft hack" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-04/CSRB_Review_of_the_Summer_2023_MEO_Intrusion_Final_508c.pdf">CSRB report on Microsoft hack</a></li><li><a title="CISA secure-by-design pledge" rel="nofollow" href="https://www.cisa.gov/sites/default/files/2024-05/CISA%20Secure%20by%20Design%20Pledge_508c.pdf">CISA secure-by-design pledge</a></li><li><a title="CCC Talk: Operation Triangulation " rel="nofollow" href="https://www.youtube.com/watch?v=7VWNUUldBEE&amp;ab_channel=auth">CCC Talk: Operation Triangulation </a></li><li><a title="Lawfare: Responsible Cyber Offense" rel="nofollow" href="https://www.lawfaremedia.org/article/responsible-cyber-offense">Lawfare: Responsible Cyber Offense</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Follow Dave Aitel on Twitter" rel="nofollow" href="https://x.com/daveaitel">Follow Dave Aitel on Twitter</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Costin Raiu on Twitter</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+wRi5XuY3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+wRi5XuY3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep2: A deep-dive on disrupting and exposing nation-state malware ops</title>
      <link>http://securityconversations.fireside.fm/tbp-ep2</link>
      <guid isPermaLink="false">4a6fe671-fe7a-4699-ae08-fe99fd11f49f</guid>
      <pubDate>Sat, 29 Jun 2024 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4a6fe671-fe7a-4699-ae08-fe99fd11f49f.mp3" length="60890552" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The 'Three Buddy Problem' Podcast Episode 2:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware.

We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</itunes:subtitle>
      <itunes:duration>1:08:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4a6fe671-fe7a-4699-ae08-fe99fd11f49f/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p>]]>
      </description>
      <itunes:keywords>google project zero, disrupting nation-state operations, mercenary hacking, teamviewer breach, Polyfill supply chain</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>The &#39;Three Buddy Problem&#39; Podcast Episode 2</strong>:   Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. </p>

<p>A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of &#39;success stories&#39; from so-called benevolent malware.</p>

<p>We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io supply chain compromise.</p><p>Links:</p><ul><li><a title="Episode transcript (Unedited, AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1uXCCABf3ifD1EsOgqhRKryLcs3jLJYXkRKRAe6Jc9LE/edit#heading=h.us8s7483ojgo">Episode transcript (Unedited, AI-generated)</a></li><li><a title="Google: Stop Burning Counterterrorism Operations" rel="nofollow" href="https://poppopret.org/2024/06/24/google-stop-burning-counterterrorism-operations/">Google: Stop Burning Counterterrorism Operations</a></li><li><a title="Russian hackers sanctioned by European Council" rel="nofollow" href="https://therecord.media/six-russian-hackers-sanctioned-european-council-eu-ukraine">Russian hackers sanctioned by European Council</a></li><li><a title="TeamViewer statement on APT29 breach" rel="nofollow" href="https://www.teamviewer.com/en/resources/trust-center/statement/">TeamViewer statement on APT29 breach</a></li><li><a title="Polyfill supply chain attack" rel="nofollow" href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack</a></li><li><a title="Request a LABScon invite" rel="nofollow" href="https://www.labscon.io/request-an-invite/">Request a LABScon invite</a></li><li><a title="Follow Costin Raiu on Twitter" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu on Twitter</a></li><li><a title="Follow JAG-S on Twitter" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S on Twitter</a></li><li><a title="Follow Ryan Naraine on Twitter" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+r5m8Quio</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+r5m8Quio" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ep1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud Compute</title>
      <link>http://securityconversations.fireside.fm/new-show-ep-1</link>
      <guid isPermaLink="false">d0003b6f-d259-41d1-991b-18d68fc8c009</guid>
      <pubDate>Sat, 22 Jun 2024 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d0003b6f-d259-41d1-991b-18d68fc8c009.mp3" length="40341037" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game.  Oh, we also discuss the KL ban.</itunes:subtitle>
      <itunes:duration>46:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d0003b6f-d259-41d1-991b-18d68fc8c009/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p>]]>
      </description>
      <itunes:keywords>Microsoft, CSRB, Apple, AI</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Welcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week.  Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith&#39;s testimony and the lingering effects of the CSRB report, Apple&#39;s new Private Cloud Compute (PCC) infrastructure and Cupertino&#39;s long game.  Oh, we also talk about the KL ban.</p><p>Links:</p><ul><li><a title="Microsoft’s embarrassing Recall" rel="nofollow" href="https://www.theverge.com/2024/6/20/24182350/microsoft-windows-recall-launch-on-arm">Microsoft’s embarrassing Recall</a></li><li><a title="Brad Smith CSRB testimony" rel="nofollow" href="https://homeland.house.gov/wp-content/uploads/2024/06/2024-06-13-HRG-Testimony-Smith.pdf">Brad Smith CSRB testimony</a></li><li><a title="Inside Apple Private Cloud Compute" rel="nofollow" href="https://security.apple.com/blog/private-cloud-compute/">Inside Apple Private Cloud Compute</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Follow Costin Raiu (@craiu) / X" rel="nofollow" href="https://x.com/craiu">Follow Costin Raiu (@craiu) / X</a></li><li><a title="Follow JAG-S (@juanandres_gs) / X" rel="nofollow" href="https://x.com/juanandres_gs">Follow JAG-S (@juanandres_gs) / X</a></li><li><a title="Follow Ryan Naraine (@ryanaraine) / X" rel="nofollow" href="https://x.com/ryanaraine">Follow Ryan Naraine (@ryanaraine) / X</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+n_8wZlHV</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+n_8wZlHV" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Cris Neckar on the early days of securing Chrome, chasing browser exploits</title>
      <link>http://securityconversations.fireside.fm/cris-neckar-chrome-security-stories</link>
      <guid isPermaLink="false">8151cb78-e91b-4526-95cc-6ea1dd6ddec5</guid>
      <pubDate>Thu, 11 Apr 2024 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8151cb78-e91b-4526-95cc-6ea1dd6ddec5.mp3" length="52672988" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- XZ.fail backdoor detector  (https://xz.fail)

Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</itunes:subtitle>
      <itunes:duration>54:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8151cb78-e91b-4526-95cc-6ea1dd6ddec5/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p>]]>
      </description>
      <itunes:keywords>venture capital, investments, supply chain, Chrome, Pwn2Own</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p><p>Links:</p><ul><li><a title="Unedited transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading=h.ulpyi4qqiq06">Unedited transcript (AI-generated)</a></li><li><a title="Cris Neckar on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/crisneckar/">Cris Neckar on LinkedIn</a></li><li><a title="Cris Neckar Bio (Two Bear Capital)" rel="nofollow" href="https://www.twobearcapital.com/team/cris-neckar">Cris Neckar Bio (Two Bear Capital)</a></li><li><a title="Teenager hacks Google Chrome with three 0days" rel="nofollow" href="https://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/">Teenager hacks Google Chrome with three 0days</a></li><li><a title="Research on Trident zero-day flaws" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/trident-pegasus-technical-details">Research on Trident zero-day flaws</a></li><li><a title="Cris Neckar podcast transcript (Unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading">Cris Neckar podcast transcript (Unedited)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Cris Neckar is a veteran security researcher now working as a partner at Two Bear Capital.  In this episode, he reminisces on the early days of hacking at Neohapsis, his time on the Google Chrome security team, shenanigans at Pwn2Own/Pwnium, and the cat-and-mouse battle for browser exploit chains. We also discuss the zero-day exploit marketplace, the hype and promise of AI, and his mission to help highly technical founders bring products to market.</p><p>Links:</p><ul><li><a title="Unedited transcript (AI-generated)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading=h.ulpyi4qqiq06">Unedited transcript (AI-generated)</a></li><li><a title="Cris Neckar on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/crisneckar/">Cris Neckar on LinkedIn</a></li><li><a title="Cris Neckar Bio (Two Bear Capital)" rel="nofollow" href="https://www.twobearcapital.com/team/cris-neckar">Cris Neckar Bio (Two Bear Capital)</a></li><li><a title="Teenager hacks Google Chrome with three 0days" rel="nofollow" href="https://www.zdnet.com/article/teenager-hacks-google-chrome-with-three-0day-vulnerabilities/">Teenager hacks Google Chrome with three 0days</a></li><li><a title="Research on Trident zero-day flaws" rel="nofollow" href="https://www.lookout.com/threat-intelligence/article/trident-pegasus-technical-details">Research on Trident zero-day flaws</a></li><li><a title="Cris Neckar podcast transcript (Unedited)" rel="nofollow" href="https://docs.google.com/document/d/1Xhf2pVxE4Trb9TVbK2VEBP6zDDe25MAbPdiAeh501h0/edit#heading">Cris Neckar podcast transcript (Unedited)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+hlUzHaqK</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+hlUzHaqK" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Costin Raiu joins the XZ Utils backdoor investigation</title>
      <link>http://securityconversations.fireside.fm/costin-raiu-xz-backdoor</link>
      <guid isPermaLink="false">f664c77a-dbbc-41a0-b392-7b4cd7223523</guid>
      <pubDate>Fri, 05 Apr 2024 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f664c77a-dbbc-41a0-b392-7b4cd7223523.mp3" length="47530772" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- XZ.fail backdoor detector  (https://xz.fail)

Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why 'Tia Jan' is the handiwork of a cunning nation-state.

Based on all the clues available, Costin pinpoints three main suspects -- North Korea's Lazarus, China's APT41 or Russia's APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</itunes:subtitle>
      <itunes:duration>51:33</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f664c77a-dbbc-41a0-b392-7b4cd7223523/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p>]]>
      </description>
      <itunes:keywords>XZ Utils, APT, Stuxnet, SolarWinds, Lazarus, APT29</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p><p>Links:</p><ul><li><a title="Binarly XZ backdoor detector" rel="nofollow" href="https://xz.fail/">Binarly XZ backdoor detector</a></li><li><a title="XZ Utils Backdoor FAQ (by Dan Goodin)" rel="nofollow" href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">XZ Utils Backdoor FAQ (by Dan Goodin)</a></li><li><a title="CISA advisory on backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094">CISA advisory on backdoor</a></li><li><a title="The JiaT75 (Jia Tan) timeline" rel="nofollow" href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor">The JiaT75 (Jia Tan) timeline</a></li><li><a title="Unedited transcript" rel="nofollow" href="https://docs.google.com/document/d/1S2Fs3TJyA1SHfKOHXvZr9oFdWzG7HYCd9oa17sm02zM/edit">Unedited transcript</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>XZ.fail backdoor detector  (<a href="https://xz.fail" rel="nofollow">https://xz.fail</a>)</li>
</ul>

<p>Malware paleontologist Costin Raiu returns for an emergency episode on the XZ Utils software supply chain backdoor.  We dig into the timeline of the attack, the characteristics of the backdoor, affected Linux distributions, and the reasons why &#39;Tia Jan&#39; is the handiwork of a cunning nation-state.</p>

<p>Based on all the clues available, Costin pinpoints three main suspects -- North Korea&#39;s Lazarus, China&#39;s APT41 or Russia&#39;s APT29 -- and warns that there are more of these backdoors lurking in modern software supply chains.</p><p>Links:</p><ul><li><a title="Binarly XZ backdoor detector" rel="nofollow" href="https://xz.fail/">Binarly XZ backdoor detector</a></li><li><a title="XZ Utils Backdoor FAQ (by Dan Goodin)" rel="nofollow" href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">XZ Utils Backdoor FAQ (by Dan Goodin)</a></li><li><a title="CISA advisory on backdoor" rel="nofollow" href="https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094">CISA advisory on backdoor</a></li><li><a title="The JiaT75 (Jia Tan) timeline" rel="nofollow" href="https://boehs.org/node/everything-i-know-about-the-xz-backdoor">The JiaT75 (Jia Tan) timeline</a></li><li><a title="Unedited transcript" rel="nofollow" href="https://docs.google.com/document/d/1S2Fs3TJyA1SHfKOHXvZr9oFdWzG7HYCd9oa17sm02zM/edit">Unedited transcript</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+2xOAEshI</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+2xOAEshI" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Katie Moussouris on building a different cybersecurity businesses</title>
      <link>http://securityconversations.fireside.fm/katie-moussouris-workforce-csrb</link>
      <guid isPermaLink="false">99cde65c-13eb-4fb7-9d52-86d2fc8c4aec</guid>
      <pubDate>Fri, 19 Jan 2024 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/99cde65c-13eb-4fb7-9d52-86d2fc8c4aec.mp3" length="25154544" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Katie Moussouris founded Luta Security in 2016 and bootstrapped it into a profitable business with a culture of equity and healthy boundaries, proving that businesses can be profitable by putting people first. She is a pioneer in the world of bug bounties and vulnerability disclosure and serves in multiple advisory roles for the U.S. government, including the new CISA Cyber Safety Review Board (CSRB).

On this episode, Moussouris discusses Luta Security's new Workforce Platform profit-sharing initiative, the changing face of the job market, criticisms of the CSRB's lack of enforcement authority, and looming regulations around zero-day vulnerability data.</itunes:subtitle>
      <itunes:duration>29:50</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/99cde65c-13eb-4fb7-9d52-86d2fc8c4aec/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Katie Moussouris founded Luta Security in 2016 and bootstrapped it into a profitable business with a culture of equity and healthy boundaries. She is a pioneer in the world of bug bounties and vulnerability disclosure and serves in multiple advisory roles for the U.S. government, including the new CISA Cyber Safety Review Board (CSRB).</p>

<p>In this episode, Moussouris discusses Luta Security&#39;s new Workforce Platform profit-sharing initiative, the changing face of the job market, criticisms of the CSRB&#39;s lack of enforcement authority, and looming regulations around zero-day vulnerability data.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Katie Moussouris founded Luta Security in 2016 and bootstrapped it into a profitable business with a culture of equity and healthy boundaries. She is a pioneer in the world of bug bounties and vulnerability disclosure and serves in multiple advisory roles for the U.S. government, including the new CISA Cyber Safety Review Board (CSRB).</p>

<p>In this episode, Moussouris discusses Luta Security&#39;s new Workforce Platform profit-sharing initiative, the changing face of the job market, criticisms of the CSRB&#39;s lack of enforcement authority, and looming regulations around zero-day vulnerability data.</p><p>Links:</p><ul><li><a title="Luta Security Workforce Platform" rel="nofollow" href="https://www.lutasecurity.com/alpha-platform">Luta Security Workforce Platform</a></li><li><a title="Katie Moussouris on Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Katie_Moussouris">Katie Moussouris on Wikipedia</a></li><li><a title="Moussouris: Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="Katie Moussouris on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kmoussouris/">Katie Moussouris on LinkedIn</a></li><li><a title="Cyber Safety Review Board" rel="nofollow" href="https://www.cisa.gov/cyber-safety-review-board-csrb-members">Cyber Safety Review Board</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Katie Moussouris founded Luta Security in 2016 and bootstrapped it into a profitable business with a culture of equity and healthy boundaries. She is a pioneer in the world of bug bounties and vulnerability disclosure and serves in multiple advisory roles for the U.S. government, including the new CISA Cyber Safety Review Board (CSRB).</p>

<p>In this episode, Moussouris discusses Luta Security&#39;s new Workforce Platform profit-sharing initiative, the changing face of the job market, criticisms of the CSRB&#39;s lack of enforcement authority, and looming regulations around zero-day vulnerability data.</p><p>Links:</p><ul><li><a title="Luta Security Workforce Platform" rel="nofollow" href="https://www.lutasecurity.com/alpha-platform">Luta Security Workforce Platform</a></li><li><a title="Katie Moussouris on Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Katie_Moussouris">Katie Moussouris on Wikipedia</a></li><li><a title="Moussouris: Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="Katie Moussouris on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kmoussouris/">Katie Moussouris on LinkedIn</a></li><li><a title="Cyber Safety Review Board" rel="nofollow" href="https://www.cisa.gov/cyber-safety-review-board-csrb-members">Cyber Safety Review Board</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+IkNVzeLv</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+IkNVzeLv" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Costin Raiu: The GReAT exit interview</title>
      <link>http://securityconversations.fireside.fm/costin-raiu-great-exit-interview</link>
      <guid isPermaLink="false">b70d7b98-2823-490b-8b70-f3a051c45709</guid>
      <pubDate>Mon, 15 Jan 2024 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b70d7b98-2823-490b-8b70-f3a051c45709.mp3" length="90090088" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Costin Raiu has spent a lifetime in anti-malware research, working on some of the biggest nation-state APT cases in history, including Stuxnet, Duqu, Equation Group, Red October, Turla and Lazarus.   

In this exit interview, Costin digs into why he left the GReAT team after 13 years at the helm, ethical questions on exposing certain APT operations, changes in the nation-state malware attribution game, technically impressive APT attacks, and the 'dark spots' where future-thinking APTs are living.</itunes:subtitle>
      <itunes:duration>1:32:13</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b70d7b98-2823-490b-8b70-f3a051c45709/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Costin Raiu has spent a lifetime in anti-malware research, working on some of the biggest nation-state APT cases in history, including Stuxnet, Duqu, Equation Group, Red October, Turla and Lazarus.   </p>

<p>In this exit interview, Costin digs into why he left the GReAT team after 13 years at the helm, ethical questions on exposing certain APT operations, changes in the nation-state malware attribution game, technically impressive APT attacks, and the &#39;dark spots&#39; where future-thinking APTs are living.</p>]]>
      </description>
      <itunes:keywords>APT, GReAT, Stuxnet, Duqu, Red October</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Costin Raiu has spent a lifetime in anti-malware research, working on some of the biggest nation-state APT cases in history, including Stuxnet, Duqu, Equation Group, Red October, Turla and Lazarus.   </p>

<p>In this exit interview, Costin digs into why he left the GReAT team after 13 years at the helm, ethical questions on exposing certain APT operations, changes in the nation-state malware attribution game, technically impressive APT attacks, and the &#39;dark spots&#39; where future-thinking APTs are living.</p><p>Links:</p><ul><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="How to Protect Your Phone from Pegasus and Other APTs" rel="nofollow" href="https://www.darkreading.com/cyber-risk/how-to-protect-your-phone-from-pegasus-and-other-apts">How to Protect Your Phone from Pegasus and Other APTs</a></li><li><a title="Costin Raiu: 10 big &#39;unattributed&#39; APT mysteries" rel="nofollow" href="https://twitter.com/craiu/status/1573272440704319488">Costin Raiu: 10 big 'unattributed' APT mysteries</a></li><li><a title="Costin Raiu on the .gov mobile exploitation business" rel="nofollow" href="https://securityconversations.com/episode/costin-raiu-on-the-gov-mobile-exploitation-business/">Costin Raiu on the .gov mobile exploitation business</a></li><li><a title="WannaCry Ransomware Linked to North Korean Hackers" rel="nofollow" href="https://www.wired.com/2017/05/wannacry-ransomware-link-suspected-north-korean-hackers/">WannaCry Ransomware Linked to North Korean Hackers</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Costin Raiu has spent a lifetime in anti-malware research, working on some of the biggest nation-state APT cases in history, including Stuxnet, Duqu, Equation Group, Red October, Turla and Lazarus.   </p>

<p>In this exit interview, Costin digs into why he left the GReAT team after 13 years at the helm, ethical questions on exposing certain APT operations, changes in the nation-state malware attribution game, technically impressive APT attacks, and the &#39;dark spots&#39; where future-thinking APTs are living.</p><p>Links:</p><ul><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="How to Protect Your Phone from Pegasus and Other APTs" rel="nofollow" href="https://www.darkreading.com/cyber-risk/how-to-protect-your-phone-from-pegasus-and-other-apts">How to Protect Your Phone from Pegasus and Other APTs</a></li><li><a title="Costin Raiu: 10 big &#39;unattributed&#39; APT mysteries" rel="nofollow" href="https://twitter.com/craiu/status/1573272440704319488">Costin Raiu: 10 big 'unattributed' APT mysteries</a></li><li><a title="Costin Raiu on the .gov mobile exploitation business" rel="nofollow" href="https://securityconversations.com/episode/costin-raiu-on-the-gov-mobile-exploitation-business/">Costin Raiu on the .gov mobile exploitation business</a></li><li><a title="WannaCry Ransomware Linked to North Korean Hackers" rel="nofollow" href="https://www.wired.com/2017/05/wannacry-ransomware-link-suspected-north-korean-hackers/">WannaCry Ransomware Linked to North Korean Hackers</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+J6apW7PJ</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+J6apW7PJ" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers</title>
      <link>http://securityconversations.fireside.fm/danny-adamitis-volt-typhoon-botnet</link>
      <guid isPermaLink="false">73110ffd-bb15-40c4-924d-5bf7b89ed152</guid>
      <pubDate>Fri, 05 Jan 2024 09:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/73110ffd-bb15-40c4-924d-5bf7b89ed152.mp3" length="34693170" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team's recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.

Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</itunes:subtitle>
      <itunes:duration>34:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/73110ffd-bb15-40c4-924d-5bf7b89ed152/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p>]]>
      </description>
      <itunes:keywords>Volt Typoon, China, Critical Infrastructure, routers</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Danny Adamitis is a principal information security engineer at Black Lotus Labs, the threat research division within Lumen Technologies. On this episode of the show, we discuss his team&#39;s recent discovery of an impossible-to-kill botnet packed with end-of-life SOHO routers serving as a covert data transfer network for Volt Typhoon, a Chinese government-backed hacking group previously caught targeting US critical infrastructure.</p>

<p>Danny digs into the inner workings of the botnet, the global problem end-of-life devices becoming useful tools for malicious actors, and the things network defenders can do today to mitigate threats at this layer.</p><p>Links:</p><ul><li><a title="Danny Adamitis on Twitter" rel="nofollow" href="https://twitter.com/dadamitis?lang=en">Danny Adamitis on Twitter</a></li><li><a title="Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet" rel="nofollow" href="https://www.securityweek.com/chinese-apt-volt-typhoon-linked-to-unkillable-soho-router-botnet/">Chinese APT Volt Typhoon Linked to Unkillable SOHO Router Botnet</a></li><li><a title="Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure" rel="nofollow" href="https://www.securityweek.com/microsoft-catches-chinese-gov-hackers-in-guam-critical-infrastructure-orgs/">Microsoft Catches Chinese .Gov Hackers Targeting US Critical Infrastructure</a></li><li><a title="The KV-botnet Investigation" rel="nofollow" href="https://blog.lumen.com/routers-roasting-on-an-open-firewall-the-kv-botnet-investigation/">The KV-botnet Investigation</a></li><li><a title="ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks" rel="nofollow" href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a></li><li><a title="Daniel Adamitis on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/daniel-a-44198047/">Daniel Adamitis on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Wqx7tQh9</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Wqx7tQh9" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Allison Miller talks about CISO life, protecting identities at scale</title>
      <link>http://securityconversations.fireside.fm/allison-miller-cartomancy-labs</link>
      <guid isPermaLink="false">28dec282-d91f-4cce-9500-6459abf30cdf</guid>
      <pubDate>Thu, 21 Dec 2023 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/28dec282-d91f-4cce-9500-6459abf30cdf.mp3" length="30309172" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the supply chain security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Allison Miller is founder and CEO of Cartomancy Labs and former CISO and VP of Trust at Reddit. She has spent the past 20 years scaling teams and technology at Bank of America, Google, Electronic Arts, PayPal/eBay, and Visa International. 

In this conversation, we discuss the convergence of security with fraud prevention and anti-abuse, the challenges and complexities in IAM implementations, the post-pandemic labor market, the evolving role of CISOs and new realities around CISO exposure to personal liability, thoughts on the 'build vs buy' debate and the nuance and dilemma of paying ransomware demands. </itunes:subtitle>
      <itunes:duration>38:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/28dec282-d91f-4cce-9500-6459abf30cdf/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Allison Miller is founder and CEO of Cartomancy Labs and former CISO and VP of Trust at Reddit. She has spent the past 20 years scaling teams and technology at Bank of America, Google, Electronic Arts, PayPal/eBay, and Visa International. </p>

<p>In this conversation, we discuss the convergence of security with fraud prevention and anti-abuse, the challenges and complexities in IAM implementations, the post-pandemic labor market, the evolving role of CISOs and new realities around CISO exposure to personal liability, thoughts on the &#39;build vs buy&#39; debate and the nuance and dilemma of paying ransomware demands.</p>]]>
      </description>
      <itunes:keywords>CISO, Identity and Access, Fraud Prevention, CISO liability</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Allison Miller is founder and CEO of Cartomancy Labs and former CISO and VP of Trust at Reddit. She has spent the past 20 years scaling teams and technology at Bank of America, Google, Electronic Arts, PayPal/eBay, and Visa International. </p>

<p>In this conversation, we discuss the convergence of security with fraud prevention and anti-abuse, the challenges and complexities in IAM implementations, the post-pandemic labor market, the evolving role of CISOs and new realities around CISO exposure to personal liability, thoughts on the &#39;build vs buy&#39; debate and the nuance and dilemma of paying ransomware demands.</p><p>Links:</p><ul><li><a title="Allison Miller on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/allisonmiller/">Allison Miller on LinkedIn</a></li><li><a title="Cartomancy Labs" rel="nofollow" href="https://www.linkedin.com/company/cartomancy-labs/">Cartomancy Labs</a></li><li><a title="Security Leaders Spooked by SEC Lawsuit Against SolarWinds CISO" rel="nofollow" href="https://www.securityweek.com/cisos-spooked-by-sec-lawsuit-against-solarwinds-ciso/">Security Leaders Spooked by SEC Lawsuit Against SolarWinds CISO</a></li><li><a title="New SEC rule on breach disclosure (PDF)" rel="nofollow" href="https://www.sec.gov/files/rules/final/2023/33-11216.pdf">New SEC rule on breach disclosure (PDF)</a></li><li><a title="Follow Allison Miller on Twitter" rel="nofollow" href="https://twitter.com/selenakyle">Follow Allison Miller on Twitter</a></li><li><a title="Sponsor: Binarly Supply Chain Security Platform" rel="nofollow" href="https://binarly.io/capabilities/index.html">Sponsor: Binarly Supply Chain Security Platform</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly, the supply chain security experts (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Allison Miller is founder and CEO of Cartomancy Labs and former CISO and VP of Trust at Reddit. She has spent the past 20 years scaling teams and technology at Bank of America, Google, Electronic Arts, PayPal/eBay, and Visa International. </p>

<p>In this conversation, we discuss the convergence of security with fraud prevention and anti-abuse, the challenges and complexities in IAM implementations, the post-pandemic labor market, the evolving role of CISOs and new realities around CISO exposure to personal liability, thoughts on the &#39;build vs buy&#39; debate and the nuance and dilemma of paying ransomware demands.</p><p>Links:</p><ul><li><a title="Allison Miller on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/allisonmiller/">Allison Miller on LinkedIn</a></li><li><a title="Cartomancy Labs" rel="nofollow" href="https://www.linkedin.com/company/cartomancy-labs/">Cartomancy Labs</a></li><li><a title="Security Leaders Spooked by SEC Lawsuit Against SolarWinds CISO" rel="nofollow" href="https://www.securityweek.com/cisos-spooked-by-sec-lawsuit-against-solarwinds-ciso/">Security Leaders Spooked by SEC Lawsuit Against SolarWinds CISO</a></li><li><a title="New SEC rule on breach disclosure (PDF)" rel="nofollow" href="https://www.sec.gov/files/rules/final/2023/33-11216.pdf">New SEC rule on breach disclosure (PDF)</a></li><li><a title="Follow Allison Miller on Twitter" rel="nofollow" href="https://twitter.com/selenakyle">Follow Allison Miller on Twitter</a></li><li><a title="Sponsor: Binarly Supply Chain Security Platform" rel="nofollow" href="https://binarly.io/capabilities/index.html">Sponsor: Binarly Supply Chain Security Platform</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+JbodRi93</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+JbodRi93" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Rob Ragan on the excitement of AI solving security problems</title>
      <link>http://securityconversations.fireside.fm/rob-ragan-artificial-intelligence-future-of-security</link>
      <guid isPermaLink="false">5d290c85-90a8-4e41-8e9b-f8c953259be4</guid>
      <pubDate>Thu, 07 Dec 2023 07:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5d290c85-90a8-4e41-8e9b-f8c953259be4.mp3" length="41368098" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the leapfrog potential of AI models and their impact on various aspects of technology and  society.</itunes:subtitle>
      <itunes:duration>51:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5d290c85-90a8-4e41-8e9b-f8c953259be4/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul>]]>
      </description>
      <itunes:keywords>artificial intelligence, generative-ai, LLMs, bug bounties, automation</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rob Ragan, principal architect and security strategist at Bishop Fox, joins the show to share insights on scaling pen testing, the emergence of bug bounty programs, the value of attack surface management, and the role of AI in cybersecurity. We dig into the importance of proactive defense, the challenges of consolidating security tools, and the potential of AI in augmenting human intelligence. The conversation explores the potential of AI models and their impact on various aspects of technology and society and digs into the importance of improving model interaction by allowing more thoughtful and refined responses. </p>

<p>We also discuss how AI can be a superpower, enabling rapid prototyping and idea generation. The discussion concludes with considerations for safeguarding AI models, including transparency, explainability, and potential regulations.</p>

<p><strong>Takeaways:</strong></p>

<ul>
<li>Scaling pen testing can be challenging, and maintaining quality becomes difficult as the team grows. Bug bounty programs have been a net positive for businesses, providing valuable insights and incentivizing innovative research.</li>
<li>Attack surface management plays a crucial role in identifying vulnerabilities and continuously monitoring an organization&#39;s security posture.</li>
<li>Social engineering attacks, such as SIM swapping and phishing, require a multi-faceted defense strategy that includes technical controls, policies, and user education.</li>
<li>AI has the potential to augment human intelligence and improve efficiency and effectiveness in cybersecurity. Improving model interaction by allowing more thoughtful and refined responses can enhance the user experience. Algorithms can be used to delegate tasks and improve performance, leading to better results in complex tasks.</li>
<li>AI is an inflection point in technology, comparable to the internet and the industrial revolution. Can be game-changing to automate time-consuming tasks, freeing up human resources for more strategic work.</li>
<li>Autocomplete and code generation tools like Copilot can significantly speed up coding and reduce errors.  AI can be a superpower, enabling rapid prototyping, idea generation, and creative tasks.</li>
<li>Safeguarding AI models requires transparency, explainability, and consideration of potential biases. Regulations may be necessary to ensure responsible use of AI, but they should not stifle innovation. Global adoption of AI should be encouraged to prevent technological disparities between countries. </li>
</ul><p>Links:</p><ul><li><a title="Rob Ragan&#39;s Theoradical.ai" rel="nofollow" href="https://theoradical.ai/">Rob Ragan's Theoradical.ai</a></li><li><a title="Testing LLM Algorithms While AI Tests Us" rel="nofollow" href="https://slides.com/robragan/testing-llms">Testing LLM Algorithms While AI Tests Us</a> &mdash; Testing LLM Algorithms While AI Tests Us</li><li><a title="LLM Testing Findings Templates" rel="nofollow" href="https://github.com/BishopFox/llm-testing-findings/blob/main/README.md">LLM Testing Findings Templates</a> &mdash; This collection of open-source templates is designed to facilitate the reporting and documentation of vulnerabilities and opportunities for usability improvement in LLM integrations and applications.</li><li><a title="Rob Ragan on Twitter" rel="nofollow" href="https://twitter.com/sweepthatleg">Rob Ragan on Twitter</a></li><li><a title="Rob Ragan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/robragan/">Rob Ragan on LinkedIn</a></li><li><a title="Bishop Fox Labs" rel="nofollow" href="https://bishopfox.com/labs">Bishop Fox Labs</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+7zpcspgj</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+7zpcspgj" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Seth Spergel on venture capital bets in cybersecurity</title>
      <link>http://securityconversations.fireside.fm/seth-spergel-merlin-ventures</link>
      <guid isPermaLink="false">1f02640b-edf7-4549-8012-6764dcca018d</guid>
      <pubDate>Tue, 21 Nov 2023 10:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1f02640b-edf7-4549-8012-6764dcca018d.mp3" length="17151625" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</itunes:subtitle>
      <itunes:duration>28:56</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1f02640b-edf7-4549-8012-6764dcca018d/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</p>]]>
      </description>
      <itunes:keywords>Venture capital, Merlin Ventures, investments, Artifical Intelligence</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</p><p>Links:</p><ul><li><a title="Seth Spergel bio" rel="nofollow" href="https://merlin.vc/team/seth-spergel/">Seth Spergel bio</a> &mdash; Seth has more than 20 years of experience building, selling, and investing in software and startups. Prior to Merlin Ventures, Seth was VP for Infrastructure Technologies at In-Q-Tel, a strategic investment firm that invests in startups that meet the mission needs of government customers. </li><li><a title="Merlin Ventures portfolio" rel="nofollow" href="https://merlin.vc/portfolio/">Merlin Ventures portfolio</a></li><li><a title="Palo Alto buys Talon, Dig Security" rel="nofollow" href="https://www.securityweek.com/palo-alto-to-acquire-talon-intensifying-competition-in-cloud-data-security/">Palo Alto buys Talon, Dig Security</a> &mdash; Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.</li><li><a title="Episode Sponsor: Binarly" rel="nofollow" href="https://binarly.io/capabilities/index.html">Episode Sponsor: Binarly</a> &mdash; The Binarly REsearch team leads the industry in firmware vulnerability disclosure and advisories</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Seth Spergel is managing partner at Merlin Ventures, where he is responsible for identifying cutting-edge companies for Merlin to partner with and invest in. In this episode, Seth talks about helping startups target US federal markets, the current state of deal sizes and valuations, and the red-hot sectors in cybersecurity ripe for venture investment.</p><p>Links:</p><ul><li><a title="Seth Spergel bio" rel="nofollow" href="https://merlin.vc/team/seth-spergel/">Seth Spergel bio</a> &mdash; Seth has more than 20 years of experience building, selling, and investing in software and startups. Prior to Merlin Ventures, Seth was VP for Infrastructure Technologies at In-Q-Tel, a strategic investment firm that invests in startups that meet the mission needs of government customers. </li><li><a title="Merlin Ventures portfolio" rel="nofollow" href="https://merlin.vc/portfolio/">Merlin Ventures portfolio</a></li><li><a title="Palo Alto buys Talon, Dig Security" rel="nofollow" href="https://www.securityweek.com/palo-alto-to-acquire-talon-intensifying-competition-in-cloud-data-security/">Palo Alto buys Talon, Dig Security</a> &mdash; Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.</li><li><a title="Episode Sponsor: Binarly" rel="nofollow" href="https://binarly.io/capabilities/index.html">Episode Sponsor: Binarly</a> &mdash; The Binarly REsearch team leads the industry in firmware vulnerability disclosure and advisories</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+s7W6Xk0D</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+s7W6Xk0D" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dan Lorenc on fixing the 'crappy' CVE ecosystem </title>
      <link>http://securityconversations.fireside.fm/dan-lorenc-deciphers-cve-cvss-sbom-supply-chains</link>
      <guid isPermaLink="false">aa617e3f-5689-4e88-a3ea-69bf50679c6e</guid>
      <pubDate>Tue, 14 Nov 2023 06:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/aa617e3f-5689-4e88-a3ea-69bf50679c6e.mp3" length="40642471" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly, the firmware security experts (https://binarly.io)
- FwHunt (https://fwhunt.run)

Dan Lorenc is CEO and co-founder of Chainguard, a company that raised $116 million in less than two years to tackle open source supply chain security problems.  In this episode, Dan joins Ryan to chat about the demands of building a "growth mode" startup, massive funding rounds and VC expectations, fixing the "crappy" CVE and CVSS ecosystems, managing expectations around SBOMs, and how politicians and lobbyists are framing cybersecurity issues in strange ways.</itunes:subtitle>
      <itunes:duration>41:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/aa617e3f-5689-4e88-a3ea-69bf50679c6e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dan Lorenc is CEO and co-founder of Chainguard, a company that raised $116 million in less than two years to tackle open source supply chain security problems.  In this episode, Dan joins Ryan to chat about the demands of building a &quot;growth mode&quot; startup, massive funding rounds and VC expectations, fixing the &quot;crappy&quot; CVE and CVSS ecosystems, managing expectations around SBOMs, and how politicians and lobbyists are framing cybersecurity issues in strange ways.</p>]]>
      </description>
      <itunes:keywords>Chainguard, supply chain, SBOMs, CVE, Venture Capital</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dan Lorenc is CEO and co-founder of Chainguard, a company that raised $116 million in less than two years to tackle open source supply chain security problems.  In this episode, Dan joins Ryan to chat about the demands of building a &quot;growth mode&quot; startup, massive funding rounds and VC expectations, fixing the &quot;crappy&quot; CVE and CVSS ecosystems, managing expectations around SBOMs, and how politicians and lobbyists are framing cybersecurity issues in strange ways.</p><p>Links:</p><ul><li><a title="SBOMs - All the right ingredients, but something is still missing" rel="nofollow" href="https://p72.vc/perspectives/software-bills-of-material-sboms/">SBOMs - All the right ingredients, but something is still missing</a></li><li><a title="Open Source Development Threatened in Europe" rel="nofollow" href="https://thenewstack.io/open-source-development-threatened-in-europe/">Open Source Development Threatened in Europe</a></li><li><a title="Chainguard Images: Reduce your attack surface" rel="nofollow" href="https://www.chainguard.dev/chainguard-images">Chainguard Images: Reduce your attack surface</a></li><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Dan Lorenc on Twitter/X" rel="nofollow" href="https://twitter.com/lorenc_dan">Dan Lorenc on Twitter/X</a></li><li><a title="Chainguard Raises $61 Million Series B" rel="nofollow" href="https://www.chainguard.dev/unchained/series-b-funding">Chainguard Raises $61 Million Series B</a></li><li><a title="Binarly -- Firmware Supply Chain Security Platform" rel="nofollow" href="https://binarly.io/">Binarly -- Firmware Supply Chain Security Platform</a> &mdash; Binarly is the world's first automated firmware supply chain security platform. Using cutting-edge techniques, Binarly identifies both known and unknown vulnerabilities, misconfigurations, and malicious code in firmware and hardware components.</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dan Lorenc is CEO and co-founder of Chainguard, a company that raised $116 million in less than two years to tackle open source supply chain security problems.  In this episode, Dan joins Ryan to chat about the demands of building a &quot;growth mode&quot; startup, massive funding rounds and VC expectations, fixing the &quot;crappy&quot; CVE and CVSS ecosystems, managing expectations around SBOMs, and how politicians and lobbyists are framing cybersecurity issues in strange ways.</p><p>Links:</p><ul><li><a title="SBOMs - All the right ingredients, but something is still missing" rel="nofollow" href="https://p72.vc/perspectives/software-bills-of-material-sboms/">SBOMs - All the right ingredients, but something is still missing</a></li><li><a title="Open Source Development Threatened in Europe" rel="nofollow" href="https://thenewstack.io/open-source-development-threatened-in-europe/">Open Source Development Threatened in Europe</a></li><li><a title="Chainguard Images: Reduce your attack surface" rel="nofollow" href="https://www.chainguard.dev/chainguard-images">Chainguard Images: Reduce your attack surface</a></li><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Dan Lorenc on Twitter/X" rel="nofollow" href="https://twitter.com/lorenc_dan">Dan Lorenc on Twitter/X</a></li><li><a title="Chainguard Raises $61 Million Series B" rel="nofollow" href="https://www.chainguard.dev/unchained/series-b-funding">Chainguard Raises $61 Million Series B</a></li><li><a title="Binarly -- Firmware Supply Chain Security Platform" rel="nofollow" href="https://binarly.io/">Binarly -- Firmware Supply Chain Security Platform</a> &mdash; Binarly is the world's first automated firmware supply chain security platform. Using cutting-edge techniques, Binarly identifies both known and unknown vulnerabilities, misconfigurations, and malicious code in firmware and hardware components.</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+tNz0r0y2</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+tNz0r0y2" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Cisco Talos researcher Nick Biasini on chasing APTs, mercenary hackers</title>
      <link>http://securityconversations.fireside.fm/nick-biasini-cisco-talos</link>
      <guid isPermaLink="false">d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed</guid>
      <pubDate>Tue, 07 Nov 2023 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed.mp3" length="30416978" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</itunes:subtitle>
      <itunes:duration>31:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d35fcfc2-f5e9-4b06-bbda-9a59ed8fafed/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p>]]>
      </description>
      <itunes:keywords>Nation-state APTs, Cisco Talos, Ransomware, PSOAs</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p><p>Links:</p><ul><li><a title="Nick Biasini on Twitter" rel="nofollow" href="https://twitter.com/infosec_nick">Nick Biasini on Twitter</a></li><li><a title="Cisco Talos Library of Reports" rel="nofollow" href="https://talosintelligence.com/resources">Cisco Talos Library of Reports</a></li><li><a title="Nick Biasini on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/nick-biasini-00707950/">Nick Biasini on LinkedIn</a></li><li><a title="Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)" rel="nofollow" href="https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/">Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)</a></li><li><a title="US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa" rel="nofollow" href="https://www.securityweek.com/us-gov-mercenary-spyware-clampdown-hits-cytrox-intellexa/">US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Nick Biasini has been working in information security for nearly two decades. In his current role as head of outreach for Cisco Talos Intelligence Group, he leads a team of threat researchers tasked with tracking nation-state APTs, mercenary hacker groups and ransomware cybercriminals. In this episode, Biasini talks about the cryptic world of threat actor attribution, the rise of PSOAs (private sector offensive actors) and why network edge devices are a happy hunting ground for attackers.</p><p>Links:</p><ul><li><a title="Nick Biasini on Twitter" rel="nofollow" href="https://twitter.com/infosec_nick">Nick Biasini on Twitter</a></li><li><a title="Cisco Talos Library of Reports" rel="nofollow" href="https://talosintelligence.com/resources">Cisco Talos Library of Reports</a></li><li><a title="Nick Biasini on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/nick-biasini-00707950/">Nick Biasini on LinkedIn</a></li><li><a title="Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)" rel="nofollow" href="https://socradar.io/beyond-the-veil-of-surveillance-private-sector-offensive-actors-psoas/">Beyond the Veil of Surveillance: Private Sector Offensive Actors (PSOAs)</a></li><li><a title="US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa" rel="nofollow" href="https://www.securityweek.com/us-gov-mercenary-spyware-clampdown-hits-cytrox-intellexa/">US Gov Mercenary Spyware Clampdown Hits Cytrox, Intellexa</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+83Dz6wUi</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+83Dz6wUi" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Allison Nixon on disturbing elements in cybercriminal ecosystem</title>
      <link>http://securityconversations.fireside.fm/allison-nixon-unit-221b-cybercrime</link>
      <guid isPermaLink="false">5f9634cc-a169-42e1-8e20-a28c5480205f</guid>
      <pubDate>Wed, 01 Nov 2023 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5f9634cc-a169-42e1-8e20-a28c5480205f.mp3" length="42292017" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Allison Nixon is Chief Researcher at Unit 221B and a trailblazer in the world of cybercrime research. In this episode, we deep-drive into the shadowy dynamics of underground criminal communities, high-profile ransomware attacks, teenage hacking groups breaking into big companies, and the challenges of attribution and law enforcement. Allison sheds light on why companies continue to be vulnerable targets and what they're often missing in their cybersecurity strategies.</itunes:subtitle>
      <itunes:duration>48:39</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5f9634cc-a169-42e1-8e20-a28c5480205f/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Allison Nixon is Chief Researcher at Unit 221B and a trailblazer in the world of cybercrime research. In this episode, we deep-drive into the shadowy dynamics of underground criminal communities, high-profile ransomware attacks, teenage hacking groups breaking into big companies, and the challenges of attribution and law enforcement. Allison sheds light on why companies continue to be vulnerable targets and what they&#39;re often missing in their cybersecurity strategies.</p>]]>
      </description>
      <itunes:keywords>ransomware, Lapsu$, the-com, Scattered Spider</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Allison Nixon is Chief Researcher at Unit 221B and a trailblazer in the world of cybercrime research. In this episode, we deep-drive into the shadowy dynamics of underground criminal communities, high-profile ransomware attacks, teenage hacking groups breaking into big companies, and the challenges of attribution and law enforcement. Allison sheds light on why companies continue to be vulnerable targets and what they&#39;re often missing in their cybersecurity strategies.</p><p>Links:</p><ul><li><a title="Allison Nixon on Twitter" rel="nofollow" href="https://twitter.com/nixonnixoff">Allison Nixon on Twitter</a></li><li><a title="Allison Nixon - Unit 221B bio" rel="nofollow" href="https://unit221b.com/our-team">Allison Nixon - Unit 221B bio</a></li><li><a title="Las Vegas casino hackers rely on violent threats" rel="nofollow" href="https://cyberscoop.com/com-scattered-spider-tradecraft/">Las Vegas casino hackers rely on violent threats</a></li><li><a title="Crossing boundaries to facilitate extortion, encryption, and destruction" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/">Crossing boundaries to facilitate extortion, encryption, and destruction</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Allison Nixon is Chief Researcher at Unit 221B and a trailblazer in the world of cybercrime research. In this episode, we deep-drive into the shadowy dynamics of underground criminal communities, high-profile ransomware attacks, teenage hacking groups breaking into big companies, and the challenges of attribution and law enforcement. Allison sheds light on why companies continue to be vulnerable targets and what they&#39;re often missing in their cybersecurity strategies.</p><p>Links:</p><ul><li><a title="Allison Nixon on Twitter" rel="nofollow" href="https://twitter.com/nixonnixoff">Allison Nixon on Twitter</a></li><li><a title="Allison Nixon - Unit 221B bio" rel="nofollow" href="https://unit221b.com/our-team">Allison Nixon - Unit 221B bio</a></li><li><a title="Las Vegas casino hackers rely on violent threats" rel="nofollow" href="https://cyberscoop.com/com-scattered-spider-tradecraft/">Las Vegas casino hackers rely on violent threats</a></li><li><a title="Crossing boundaries to facilitate extortion, encryption, and destruction" rel="nofollow" href="https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/">Crossing boundaries to facilitate extortion, encryption, and destruction</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+gi_0wNhn</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+gi_0wNhn" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dakota Cary on China's weaponization of software vulnerabilities</title>
      <link>http://securityconversations.fireside.fm/dakota-cary-global-china-hub</link>
      <guid isPermaLink="false">11696fa7-d330-4346-b5f1-078d7542cccd</guid>
      <pubDate>Fri, 15 Sep 2023 13:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/11696fa7-d330-4346-b5f1-078d7542cccd.mp3" length="51975872" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. 

In this episode, Cary expands on a new report -- 'Sleight of Hand' -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC's weaponization of software vulnerabilities, nation state-backed threat actors in China and that infamous Bloomberg 'rice grain' spy chip story.</itunes:subtitle>
      <itunes:duration>55:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/11696fa7-d330-4346-b5f1-078d7542cccd/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p>]]>
      </description>
      <itunes:keywords>China, nation-state, APTs, Atlantic Council</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dakota Cary is a nonresident fellow at the Atlantic Council’s Global China Hub, conducting research on China’s efforts to develop its hacking capabilities, artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity-talent pipeline. </p>

<p>In this episode, Cary expands on a new report -- &#39;Sleight of Hand&#39; -- that delves into the changing legal landscape for vulnerability disclosure in China, the PRC&#39;s weaponization of software vulnerabilities, advanced threat actors in China and that infamous Bloomberg &#39;rice grain&#39; spy chip story.</p><p>Links:</p><ul><li><a title="Sleight of hand: How China weaponizes software vulnerabilities" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">Sleight of hand: How China weaponizes software vulnerabilities</a></li><li><a title="Dakota Cary on Twitter" rel="nofollow" href="https://twitter.com/DakotaInDC?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor">Dakota Cary on Twitter</a></li><li><a title="Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate" rel="nofollow" href="https://www.securityweek.com/moussouris-us-should-resist-urge-match-china-vuln-reporting-mandate/">Moussouris: U.S. Should Resist Urge to Match China Vuln Reporting Mandate</a></li><li><a title="CSRB Log4j incident report (PDF)" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB Log4j incident report (PDF)</a></li><li><a title="CISA China Cyber Threat Overview and Advisories" rel="nofollow" href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/china">CISA China Cyber Threat Overview and Advisories</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+kyGYcKOX</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+kyGYcKOX" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Abhishek Arya on Google's AI cybersecurity experiments</title>
      <link>http://securityconversations.fireside.fm/abhishek-arya-google-open-source-supply-chain</link>
      <guid isPermaLink="false">013e4610-5aeb-4cb3-89d1-509db8c25ffd</guid>
      <pubDate>Tue, 12 Sep 2023 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/013e4610-5aeb-4cb3-89d1-509db8c25ffd.mp3" length="31344253" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  

In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry's over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</itunes:subtitle>
      <itunes:duration>33:27</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/013e4610-5aeb-4cb3-89d1-509db8c25ffd/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  </p>

<p>In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry&#39;s over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</p>]]>
      </description>
      <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  </p>

<p>In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry&#39;s over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</p><p>Links:</p><ul><li><a title="Abhishek Arya on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/abhishek-arya-a565373/">Abhishek Arya on LinkedIn</a></li><li><a title="OSS-Fuzz: Continuous fuzzing for open source software" rel="nofollow" href="https://github.com/google/oss-fuzz/blob/master/README.md">OSS-Fuzz: Continuous fuzzing for open source software</a></li><li><a title="Google Brings AI Magic to Fuzz Testing" rel="nofollow" href="https://www.securityweek.com/google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results/">Google Brings AI Magic to Fuzz Testing</a></li><li><a title="AI-Powered Fuzzing: Breaking the Bug Hunting Barrier" rel="nofollow" href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">AI-Powered Fuzzing: Breaking the Bug Hunting Barrier</a></li><li><a title="AI Cyber Challenge" rel="nofollow" href="https://aicyberchallenge.com/">AI Cyber Challenge</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Abhishek Arya is director of engineering at Google, overseeing open source and supply chain security efforts that include OSS-Fuzz, SLSA, GUAC and OSV DB.  </p>

<p>In this episode, Arya talks about some early success experimenting with AI and LLMs on fuzzing and vulnerability management, the industry&#39;s over-pivoting on SBOMs, regulations and liability for software vendors, and the long road ahead for securing software supply chains.</p><p>Links:</p><ul><li><a title="Abhishek Arya on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/abhishek-arya-a565373/">Abhishek Arya on LinkedIn</a></li><li><a title="OSS-Fuzz: Continuous fuzzing for open source software" rel="nofollow" href="https://github.com/google/oss-fuzz/blob/master/README.md">OSS-Fuzz: Continuous fuzzing for open source software</a></li><li><a title="Google Brings AI Magic to Fuzz Testing" rel="nofollow" href="https://www.securityweek.com/google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results/">Google Brings AI Magic to Fuzz Testing</a></li><li><a title="AI-Powered Fuzzing: Breaking the Bug Hunting Barrier" rel="nofollow" href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">AI-Powered Fuzzing: Breaking the Bug Hunting Barrier</a></li><li><a title="AI Cyber Challenge" rel="nofollow" href="https://aicyberchallenge.com/">AI Cyber Challenge</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+3Re7Oow8</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+3Re7Oow8" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dr Sergey Bratus on the 'citizen science' of hacking</title>
      <link>http://securityconversations.fireside.fm/sergey-bratus-darpa-safedocs-ai-hacking</link>
      <guid isPermaLink="false">22e99482-8572-494f-9416-25773647d809</guid>
      <pubDate>Thu, 31 Aug 2023 06:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/22e99482-8572-494f-9416-25773647d809.mp3" length="34605660" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Dr Sergey Bratus is a Research Associate Professor of Computer Science at Dartmouth College and a program manager at DARPA. In this episode, he discusses his pioneering work on securing parsers and patching long-forgotten devices.  He also puts the AI hype into context and showers praise on the labor-of-love "citizen science" of hacking all the things.</itunes:subtitle>
      <itunes:duration>40:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/22e99482-8572-494f-9416-25773647d809/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dr Sergey Bratus is a Research Associate Professor of Computer Science at Dartmouth College and a program manager at DARPA. In this episode, he discusses his pioneering work on securing parsers and patching long-forgotten devices.  He also puts the AI hype into context and showers praise on the labor-of-love &quot;citizen science&quot; of hacking all the things.</p>]]>
      </description>
      <itunes:keywords>DARPA, SafeDocs, AMP, Dartmouth, PDF, parsers</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dr Sergey Bratus is a Research Associate Professor of Computer Science at Dartmouth College and a program manager at DARPA. In this episode, he discusses his pioneering work on securing parsers and patching long-forgotten devices.  He also puts the AI hype into context and showers praise on the labor-of-love &quot;citizen science&quot; of hacking all the things.</p><p>Links:</p><ul><li><a title="Sergey Bratus Bio" rel="nofollow" href="https://faculty-directory.dartmouth.edu/sergey-bratus">Sergey Bratus Bio</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Dr Sergey Bratus is a Research Associate Professor of Computer Science at Dartmouth College and a program manager at DARPA. In this episode, he discusses his pioneering work on securing parsers and patching long-forgotten devices.  He also puts the AI hype into context and showers praise on the labor-of-love &quot;citizen science&quot; of hacking all the things.</p><p>Links:</p><ul><li><a title="Sergey Bratus Bio" rel="nofollow" href="https://faculty-directory.dartmouth.edu/sergey-bratus">Sergey Bratus Bio</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+OMh07qC2</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+OMh07qC2" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>DARPA's Perri Adams on CTF hacking, new $20M AI Cyber Challenge</title>
      <link>http://securityconversations.fireside.fm/perri-adams-darpa-ai-cyber-challenge</link>
      <guid isPermaLink="false">7a6ea79b-20e5-402f-b50e-f2c1305e8569</guid>
      <pubDate>Sun, 20 Aug 2023 07:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7a6ea79b-20e5-402f-b50e-f2c1305e8569.mp3" length="25532690" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

DARPA program manager Perri Adams joins the conversation to chat about her love for CTF hacking competitions, the hunt for leapfrog security technologies in DARPA’s Information Innovation Office (I2O), and the goal of the new AI Cyber Challenge (AIxCC) offering $20 million in prizes to teams competing to develop AI-driven systems to automatically secure critical code.</itunes:subtitle>
      <itunes:duration>26:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7a6ea79b-20e5-402f-b50e-f2c1305e8569/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>DARPA program manager Perri Adams joins the conversation to chat about her love for CTF hacking competitions, the hunt for leapfrog security technologies in DARPA’s Information Innovation Office (I2O), and the goal of the new AI Cyber Challenge (AIxCC) offering $20 million in prizes to teams competing to develop AI-driven systems to automatically secure critical code.</p>]]>
      </description>
      <itunes:keywords>DARPA, AIxCC, AI Cyber Challenge, RPISEC, DEF CON CTF</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>DARPA program manager Perri Adams joins the conversation to chat about her love for CTF hacking competitions, the hunt for leapfrog security technologies in DARPA’s Information Innovation Office (I2O), and the goal of the new AI Cyber Challenge (AIxCC) offering $20 million in prizes to teams competing to develop AI-driven systems to automatically secure critical code.</p><p>Links:</p><ul><li><a title="DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software" rel="nofollow" href="https://www.darpa.mil/news-events/2023-08-09">DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software</a></li><li><a title="AIxCC - AI Cyber Challenge" rel="nofollow" href="https://aicyberchallenge.com/">AIxCC - AI Cyber Challenge</a></li><li><a title="Follow Perri Adams on Twitter " rel="nofollow" href="https://twitter.com/perribus">Follow Perri Adams on Twitter </a></li><li><a title="Google Brings AI Magic to Fuzz Testing" rel="nofollow" href="https://www.securityweek.com/google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results/">Google Brings AI Magic to Fuzz Testing</a></li><li><a title="AI-Powered Fuzzing: Breaking the Bug Hunting Barrier" rel="nofollow" href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">AI-Powered Fuzzing: Breaking the Bug Hunting Barrier</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>DARPA program manager Perri Adams joins the conversation to chat about her love for CTF hacking competitions, the hunt for leapfrog security technologies in DARPA’s Information Innovation Office (I2O), and the goal of the new AI Cyber Challenge (AIxCC) offering $20 million in prizes to teams competing to develop AI-driven systems to automatically secure critical code.</p><p>Links:</p><ul><li><a title="DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software" rel="nofollow" href="https://www.darpa.mil/news-events/2023-08-09">DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software</a></li><li><a title="AIxCC - AI Cyber Challenge" rel="nofollow" href="https://aicyberchallenge.com/">AIxCC - AI Cyber Challenge</a></li><li><a title="Follow Perri Adams on Twitter " rel="nofollow" href="https://twitter.com/perribus">Follow Perri Adams on Twitter </a></li><li><a title="Google Brings AI Magic to Fuzz Testing" rel="nofollow" href="https://www.securityweek.com/google-brings-ai-magic-to-fuzz-testing-with-eye-opening-results/">Google Brings AI Magic to Fuzz Testing</a></li><li><a title="AI-Powered Fuzzing: Breaking the Bug Hunting Barrier" rel="nofollow" href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">AI-Powered Fuzzing: Breaking the Bug Hunting Barrier</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+JrkxJUrM</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+JrkxJUrM" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ryan Hurst on tech innovation and unsolved problems in security</title>
      <link>http://securityconversations.fireside.fm/ryan-hurst-peculiar-ventures</link>
      <guid isPermaLink="false">6fb48532-6cea-4136-b891-de4095a5f1fd</guid>
      <pubDate>Wed, 16 Aug 2023 07:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fb48532-6cea-4136-b891-de4095a5f1fd.mp3" length="35217292" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft's ongoing cloud security hiccups.</itunes:subtitle>
      <itunes:duration>42:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fb48532-6cea-4136-b891-de4095a5f1fd/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p>]]>
      </description>
      <itunes:keywords>encryption, key management, microsoft, google, BGP, AI, startups</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Peculiar Ventures chief executive Ryan Hurst joins the show to talk about a career that spanned 20 years at Microsoft and Google, his work building the plumbing for encryption on the web, unsolved problems in BGP security, the hype and promise of AI, and Microsoft&#39;s ongoing cloud security hiccups.</p><p>Links:</p><ul><li><a title="Projects - Peculiar Ventures" rel="nofollow" href="https://peculiarventures.com/projects">Projects - Peculiar Ventures</a></li><li><a title="Ryan Hurst on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/ryanmhurst/">Ryan Hurst on LinkedIn</a></li><li><a title="Binarly  - AI-powered firmware security" rel="nofollow" href="https://binarly.io/capabilities">Binarly  - AI-powered firmware security</a></li><li><a title="SandboxAQ" rel="nofollow" href="https://www.sandboxaq.com/">SandboxAQ</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+gDpPkojQ</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+gDpPkojQ" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Jason Chan on Microsoft's security problems, layoffs and startups</title>
      <link>http://securityconversations.fireside.fm/jason-chan-bessemer-venture-partners</link>
      <guid isPermaLink="false">c38cc994-c217-4b50-b5bb-07900a1bee04</guid>
      <pubDate>Mon, 07 Aug 2023 07:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c38cc994-c217-4b50-b5bb-07900a1bee04.mp3" length="19285621" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Bessemer Venture Partner's Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft's prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</itunes:subtitle>
      <itunes:duration>27:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c38cc994-c217-4b50-b5bb-07900a1bee04/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p>]]>
      </description>
      <itunes:keywords>Microsoft, entrepreneurship, generative ai, layoffs, VC funding, open source software, CISO, transparency</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p><p>Links:</p><ul><li><a title="Jason Chan, VP, Information Security, Netflix" rel="nofollow" href="https://securityconversations.com/episode/jason-chan-vp-information-security-netflix/">Jason Chan, VP, Information Security, Netflix</a></li><li><a title="Jason Chan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jasonbchan/">Jason Chan on LinkedIn</a></li><li><a title="Follow Jason on Twitter / X" rel="nofollow" href="https://twitter.com/chanjbs">Follow Jason on Twitter / X</a></li><li><a title="Jason Chan - Bessemer Venture Partners" rel="nofollow" href="https://www.bvp.com/team/jason-chan">Jason Chan - Bessemer Venture Partners</a> &mdash; Jason Chan is an operating advisor at Bessemer where he brings over twenty years of experience in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices. Most recently, Jason built and led the information security team at Netflix for over a decade. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting. </li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Bessemer Venture Partner&#39;s Jason Chan returns to the show for a frank discussion on the state of cyber, including thoughts on Microsoft&#39;s prominent security failures, the meaning of layoffs hitting security teams, the excitement around AI, and the long road ahead.  The former Netflix security chief also talks about merging of the IT and security functions and the importance of cybersecurity proving its value to the business.</p><p>Links:</p><ul><li><a title="Jason Chan, VP, Information Security, Netflix" rel="nofollow" href="https://securityconversations.com/episode/jason-chan-vp-information-security-netflix/">Jason Chan, VP, Information Security, Netflix</a></li><li><a title="Jason Chan on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jasonbchan/">Jason Chan on LinkedIn</a></li><li><a title="Follow Jason on Twitter / X" rel="nofollow" href="https://twitter.com/chanjbs">Follow Jason on Twitter / X</a></li><li><a title="Jason Chan - Bessemer Venture Partners" rel="nofollow" href="https://www.bvp.com/team/jason-chan">Jason Chan - Bessemer Venture Partners</a> &mdash; Jason Chan is an operating advisor at Bessemer where he brings over twenty years of experience in cybersecurity and is especially passionate about large-scale systems, cloud security, and improving security in modern software development practices. Most recently, Jason built and led the information security team at Netflix for over a decade. His team at Netflix was known for its contributions to the security community, including over 30 open-source security releases and dozens of conference presentations. He also previously led the security team at VMware and spent most of his earlier career in security consulting. </li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+nzdCm4uC</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+nzdCm4uC" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>GitHub security chief Mike Hanley on secure coding, AI and SBOMs</title>
      <link>http://securityconversations.fireside.fm/mike-hanley-github</link>
      <guid isPermaLink="false">7532f1bd-4ebc-404a-9553-2f3339cc005f</guid>
      <pubDate>Wed, 02 Aug 2023 07:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7532f1bd-4ebc-404a-9553-2f3339cc005f.mp3" length="43779417" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</itunes:subtitle>
      <itunes:duration>40:29</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7532f1bd-4ebc-404a-9553-2f3339cc005f/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</p>]]>
      </description>
      <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</p><p>Links:</p><ul><li><a title="Michael Hanley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/michael-hanley-b6508913/">Michael Hanley on LinkedIn</a></li><li><a title="GitHub Security" rel="nofollow" href="https://github.com/security">GitHub Security</a></li><li><a title="GitHub Copilot AI pair programmer" rel="nofollow" href="https://github.com/features/copilot">GitHub Copilot AI pair programmer</a></li><li><a title="Big Tech Vendors Object to US Gov SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate/">Big Tech Vendors Object to US Gov SBOM Mandate</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>GitHub security chief Mike Hanley joins the show to discuss merging the CSO and SVP/Engineering roles, securing data and code in an organization under constant attack, the thrilling promise of AI to the future of secure code, the dangers of equating SBOMs to supply chain security, and new SEC reporting rules for CISOs.</p><p>Links:</p><ul><li><a title="Michael Hanley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/michael-hanley-b6508913/">Michael Hanley on LinkedIn</a></li><li><a title="GitHub Security" rel="nofollow" href="https://github.com/security">GitHub Security</a></li><li><a title="GitHub Copilot AI pair programmer" rel="nofollow" href="https://github.com/features/copilot">GitHub Copilot AI pair programmer</a></li><li><a title="Big Tech Vendors Object to US Gov SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate/">Big Tech Vendors Object to US Gov SBOM Mandate</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+k0mC3pEb</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+k0mC3pEb" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Jason Shockey, Chief Information Security Officer, Cenlar FSB</title>
      <link>http://securityconversations.fireside.fm/jason-shockey-ciso-cenlar-fsb</link>
      <guid isPermaLink="false">1c4c139f-1d8a-4f40-9cd2-f317b02723e3</guid>
      <pubDate>Wed, 26 Jul 2023 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1c4c139f-1d8a-4f40-9cd2-f317b02723e3.mp3" length="29816428" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Cenlar FSB security chief Jason Shockey joins the show to discuss the task of securing a financial institution, pivoting from a career in the military to the private sector, the current state of the job market, managing risk from APTs, and the mission of his My Cyberpath project.</itunes:subtitle>
      <itunes:duration>33:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1c4c139f-1d8a-4f40-9cd2-f317b02723e3/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Cenlar FSB security chief Jason Shockey joins the show to discuss the task of securing a financial institution, pivoting from a career in the military to the private sector, the current state of the job market, managing risk from APTs, and the mission of his My Cyberpath project.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Cenlar FSB security chief Jason Shockey joins the show to discuss the task of securing a financial institution, pivoting from a career in the military to the private sector, the current state of the job market, managing risk from APTs, and the mission of his My Cyberpath project.</p><p>Links:</p><ul><li><a title="Jason Shockey on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jason-shockey/">Jason Shockey on LinkedIn</a></li><li><a title="My Cyberpath" rel="nofollow" href="https://www.mycyberpath.com/">My Cyberpath</a></li><li><a title="Jason Shockey joins Cenlar FSB" rel="nofollow" href="https://www.cenlar.com/about-cenlar/cenlar-news/cenlar-appoints-jason-shockey-to-chief-information-security-officer">Jason Shockey joins Cenlar FSB</a></li><li><a title="NIST Cybersecurity Framework" rel="nofollow" href="https://www.nist.gov/cyberframework">NIST Cybersecurity Framework</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Cenlar FSB security chief Jason Shockey joins the show to discuss the task of securing a financial institution, pivoting from a career in the military to the private sector, the current state of the job market, managing risk from APTs, and the mission of his My Cyberpath project.</p><p>Links:</p><ul><li><a title="Jason Shockey on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/jason-shockey/">Jason Shockey on LinkedIn</a></li><li><a title="My Cyberpath" rel="nofollow" href="https://www.mycyberpath.com/">My Cyberpath</a></li><li><a title="Jason Shockey joins Cenlar FSB" rel="nofollow" href="https://www.cenlar.com/about-cenlar/cenlar-news/cenlar-appoints-jason-shockey-to-chief-information-security-officer">Jason Shockey joins Cenlar FSB</a></li><li><a title="NIST Cybersecurity Framework" rel="nofollow" href="https://www.nist.gov/cyberframework">NIST Cybersecurity Framework</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+uA9N53-6</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+uA9N53-6" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Federico Kirschbaum on a life in the Argentina hacking scene</title>
      <link>http://securityconversations.fireside.fm/federico-kirschbaum-faraday-argentina-hacking</link>
      <guid isPermaLink="false">b66102f9-41e2-40e3-981c-48d2187a490d</guid>
      <pubDate>Wed, 19 Jul 2023 06:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b66102f9-41e2-40e3-981c-48d2187a490d.mp3" length="32506033" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Faraday chief executive Federico 'Fede' Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</itunes:subtitle>
      <itunes:duration>42:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b66102f9-41e2-40e3-981c-48d2187a490d/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Faraday chief executive Federico &#39;Fede&#39; Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</p>]]>
      </description>
      <itunes:keywords>zero-day, exploits, argentina, ekoparty, core security</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Faraday chief executive Federico &#39;Fede&#39; Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</p><p>Links:</p><ul><li><a title="Faraday at Black Hat 2023" rel="nofollow" href="https://faradaysec.com/our-tools-go-to-black-hat/">Faraday at Black Hat 2023</a></li><li><a title="Fede on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/fedek/">Fede on LinkedIn</a></li><li><a title="Federico Kirschbaum on Twitter" rel="nofollow" href="https://twitter.com/fede_k">Federico Kirschbaum on Twitter</a></li><li><a title="Ekoparty" rel="nofollow" href="https://ekoparty.org/">Ekoparty</a></li><li><a title="Padding Oracles Everywhere (Rizzo/Duong)" rel="nofollow" href="https://vimeo.com/15454510">Padding Oracles Everywhere (Rizzo/Duong)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Faraday chief executive Federico &#39;Fede&#39; Kirschbaum joins the show to talk about building a startup in the vulnerability management space, the intricacies of the Argentinian hacking culture, stories of exploit writers and mercenary hackers, and the overwhelming U.S.-centric view of the cybersecurity industry.</p><p>Links:</p><ul><li><a title="Faraday at Black Hat 2023" rel="nofollow" href="https://faradaysec.com/our-tools-go-to-black-hat/">Faraday at Black Hat 2023</a></li><li><a title="Fede on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/fedek/">Fede on LinkedIn</a></li><li><a title="Federico Kirschbaum on Twitter" rel="nofollow" href="https://twitter.com/fede_k">Federico Kirschbaum on Twitter</a></li><li><a title="Ekoparty" rel="nofollow" href="https://ekoparty.org/">Ekoparty</a></li><li><a title="Padding Oracles Everywhere (Rizzo/Duong)" rel="nofollow" href="https://vimeo.com/15454510">Padding Oracles Everywhere (Rizzo/Duong)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+dgmEvXRj</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+dgmEvXRj" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Kymberlee Price reflects on life at the MSRC, hacker/vendor engagement, bug bounties</title>
      <link>http://securityconversations.fireside.fm/kymberlee-price</link>
      <guid isPermaLink="false">ba435301-e21a-48fa-86e5-f60fac79d8c7</guid>
      <pubDate>Wed, 12 Jul 2023 09:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ba435301-e21a-48fa-86e5-f60fac79d8c7.mp3" length="45477037" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</itunes:subtitle>
      <itunes:duration>48:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/ba435301-e21a-48fa-86e5-f60fac79d8c7/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p>]]>
      </description>
      <itunes:keywords>microsoft, msrc, bug bounties, product security, appsec</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Product security executive Kymberlee Price joins the show to gab about life in the trenches at the Microsoft Security Response Center (MSRC), the challenges of maintaining healthy hacker/vendor relationships, the harsh realities of bug-bounty programs, and thoughts on the cybersecurity job market.</p><p>Links:</p><ul><li><a title="Kymberlee Price on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/kymberleeprice/">Kymberlee Price on LinkedIn</a></li><li><a title="BlueHat Seattle Closing Remarks - YouTube" rel="nofollow" href="https://www.youtube.com/watch?v=fDoejozUz2w&amp;ab_channel=MicrosoftSecurityResponseCenter%28MSRC%29">BlueHat Seattle Closing Remarks - YouTube</a></li><li><a title="Keynote: Defenders Assemble - Kymberlee Price" rel="nofollow" href="https://www.youtube.com/watch?v=OG-YbSwN9VA&amp;ab_channel=AppSecPacificNorthwest">Keynote: Defenders Assemble - Kymberlee Price</a></li><li><a title="BlueHat | Microsoft" rel="nofollow" href="https://www.microsoft.com/bluehat/">BlueHat | Microsoft</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+9QgYhV14</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+9QgYhV14" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>OpenSSF GM Omkhar Arasaratnam on open-source software security</title>
      <link>http://securityconversations.fireside.fm/omkhar-arasaratnam-open-source-security-foundation</link>
      <guid isPermaLink="false">3d8d10bc-8c8d-4829-affb-597b12b849f3</guid>
      <pubDate>Wed, 05 Jul 2023 06:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3d8d10bc-8c8d-4829-affb-597b12b849f3.mp3" length="28989150" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

New General Manager of the Open Source Security Foundation (OpenSSF) Omkhar Arasaratnam joins the podcast for a candid conversation on the challenges surrounding open-source software security, lessons from the Log4j crisis, the value of SBOMs, and the U.S. government efforts at securing America's software supply chains.</itunes:subtitle>
      <itunes:duration>36:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3d8d10bc-8c8d-4829-affb-597b12b849f3/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>New General Manager of the Open Source Security Foundation (OpenSSF) Omkhar Arasaratnam joins Ryan for a candid conversation on the challenges surrounding open-source software security, lessons from the Log4j crisis, the value of SBOMs, and the U.S. government efforts at securing America&#39;s software supply chains.</p>]]>
      </description>
      <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>New General Manager of the Open Source Security Foundation (OpenSSF) Omkhar Arasaratnam joins Ryan for a candid conversation on the challenges surrounding open-source software security, lessons from the Log4j crisis, the value of SBOMs, and the U.S. government efforts at securing America&#39;s software supply chains.</p><p>Links:</p><ul><li><a title="OpenSSF Welcomes New General Manager" rel="nofollow" href="https://openssf.org/press-release/2023/05/10/openssf-welcomes-new-members-veteran-cybersecurity-expert-as-general-manager-and-new-funding/">OpenSSF Welcomes New General Manager</a></li><li><a title="OpenSSF Alpha-Omega" rel="nofollow" href="https://openssf.org/community/alpha-omega/">OpenSSF Alpha-Omega</a></li><li><a title="CSRB report on Log4j" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB report on Log4j</a></li><li><a title="Big Tech Object to US Gov SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate/">Big Tech Object to US Gov SBOM Mandate</a></li><li><a title="Omkhar Arasaratnam on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/omkhar/">Omkhar Arasaratnam on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>New General Manager of the Open Source Security Foundation (OpenSSF) Omkhar Arasaratnam joins Ryan for a candid conversation on the challenges surrounding open-source software security, lessons from the Log4j crisis, the value of SBOMs, and the U.S. government efforts at securing America&#39;s software supply chains.</p><p>Links:</p><ul><li><a title="OpenSSF Welcomes New General Manager" rel="nofollow" href="https://openssf.org/press-release/2023/05/10/openssf-welcomes-new-members-veteran-cybersecurity-expert-as-general-manager-and-new-funding/">OpenSSF Welcomes New General Manager</a></li><li><a title="OpenSSF Alpha-Omega" rel="nofollow" href="https://openssf.org/community/alpha-omega/">OpenSSF Alpha-Omega</a></li><li><a title="CSRB report on Log4j" rel="nofollow" href="https://www.cisa.gov/sites/default/files/publications/CSRB-Report-on-Log4-July-11-2022_508.pdf">CSRB report on Log4j</a></li><li><a title="Big Tech Object to US Gov SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/big-tech-vendors-object-us-gov-sbom-mandate/">Big Tech Object to US Gov SBOM Mandate</a></li><li><a title="Omkhar Arasaratnam on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/omkhar/">Omkhar Arasaratnam on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+WTXuDweh</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+WTXuDweh" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Serial entrepreneur Rishi Bhargava on building another cybersecurity company</title>
      <link>http://securityconversations.fireside.fm/rishi-bhargava-descope</link>
      <guid isPermaLink="false">1209f95e-c427-482b-9ca9-7588a29fedbe</guid>
      <pubDate>Mon, 10 Apr 2023 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1209f95e-c427-482b-9ca9-7588a29fedbe.mp3" length="27304029" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Rishi Bhargava and the team of entrepreneurs behind Demisto’s $560 million exit are back at it with a new startup building technology in the  customer identity market.  The new company, called Descope, raised an abnormally large $53 million seed-stage funding round with ambitious plans to take on rivals big and small in the customer identity and authentication space.

On this episode of the podcast, Bhargava joins Ryan to talk about the VC funding landscape, the confusing 'identity' category, the responsibilities of vendors in the identity ecosystem, the emergence of Microsoft and Google as big security players, and some thoughts on the Israeli startup scene.</itunes:subtitle>
      <itunes:duration>32:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1209f95e-c427-482b-9ca9-7588a29fedbe/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rishi Bhargava and the team of entrepreneurs behind Demisto’s $560 million exit are back at it with a new startup building technology in the  customer identity market.  The new company, called Descope, raised an abnormally large $53 million seed-stage funding round with ambitious plans to take on rivals big and small in the customer identity and authentication space.</p>

<p>On this episode of the podcast, Bhargava joins Ryan to talk about the VC funding landscape, the confusing &#39;identity&#39; category, the responsibilities of vendors in the identity ecosystem, the emergence of Microsoft and Google as big security players, and some thoughts on the Israeli startup scene.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rishi Bhargava and the team of entrepreneurs behind Demisto’s $560 million exit are back at it with a new startup building technology in the  customer identity market.  The new company, called Descope, raised an abnormally large $53 million seed-stage funding round with ambitious plans to take on rivals big and small in the customer identity and authentication space.</p>

<p>On this episode of the podcast, Bhargava joins Ryan to talk about the VC funding landscape, the confusing &#39;identity&#39; category, the responsibilities of vendors in the identity ecosystem, the emergence of Microsoft and Google as big security players, and some thoughts on the Israeli startup scene.</p><p>Links:</p><ul><li><a title="Rishi Bhargava on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/bhargavarishi/">Rishi Bhargava on LinkedIn</a></li><li><a title="Descope Targets Identity Market with Massive $53M Seed Round" rel="nofollow" href="https://www.securityweek.com/descope-targets-customer-identity-market-with-massive-53m-seed-round/">Descope Targets Identity Market with Massive $53M Seed Round</a></li><li><a title="Palo Alto Networks to acquire Demisto for $560M " rel="nofollow" href="https://techcrunch.com/2019/02/19/palo-alto-networks-to-acquire-demisto-for-560m/">Palo Alto Networks to acquire Demisto for $560M </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Rishi Bhargava and the team of entrepreneurs behind Demisto’s $560 million exit are back at it with a new startup building technology in the  customer identity market.  The new company, called Descope, raised an abnormally large $53 million seed-stage funding round with ambitious plans to take on rivals big and small in the customer identity and authentication space.</p>

<p>On this episode of the podcast, Bhargava joins Ryan to talk about the VC funding landscape, the confusing &#39;identity&#39; category, the responsibilities of vendors in the identity ecosystem, the emergence of Microsoft and Google as big security players, and some thoughts on the Israeli startup scene.</p><p>Links:</p><ul><li><a title="Rishi Bhargava on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/bhargavarishi/">Rishi Bhargava on LinkedIn</a></li><li><a title="Descope Targets Identity Market with Massive $53M Seed Round" rel="nofollow" href="https://www.securityweek.com/descope-targets-customer-identity-market-with-massive-53m-seed-round/">Descope Targets Identity Market with Massive $53M Seed Round</a></li><li><a title="Palo Alto Networks to acquire Demisto for $560M " rel="nofollow" href="https://techcrunch.com/2019/02/19/palo-alto-networks-to-acquire-demisto-for-560m/">Palo Alto Networks to acquire Demisto for $560M </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+hrIsNuOu</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+hrIsNuOu" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Claude Mandy on CISO priorities, data security principles</title>
      <link>http://securityconversations.fireside.fm/claude-mandy-data-security-posture-management</link>
      <guid isPermaLink="false">00323ad0-4a33-4873-951e-5c3d06fff940</guid>
      <pubDate>Mon, 06 Mar 2023 07:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/00323ad0-4a33-4873-951e-5c3d06fff940.mp3" length="26942052" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Symmetry Systems executive Claude Mandy joins the show to discuss a career in the security trenches, life as a CISO during the WannaCry crisis, and first principles around data security. We dig into the emerging Data Security Posture Management (DSPM) category and how it extends the Zero Trust philosophy to hybrid cloud data stores.</itunes:subtitle>
      <itunes:duration>35:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/00323ad0-4a33-4873-951e-5c3d06fff940/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Symmetry Systems executive Claude Mandy joins the show to discuss a career in the security trenches, life as a CISO during the WannaCry crisis, and first principles around data security. We dig into the emerging Data Security Posture Management (DSPM) category and how it extends the Zero Trust philosophy to hybrid cloud data stores.</p>]]>
      </description>
      <itunes:keywords>data security, dspm, data privacy, data guard</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Symmetry Systems executive Claude Mandy joins the show to discuss a career in the security trenches, life as a CISO during the WannaCry crisis, and first principles around data security. We dig into the emerging Data Security Posture Management (DSPM) category and how it extends the Zero Trust philosophy to hybrid cloud data stores.</p><p>Links:</p><ul><li><a title="Claude Mandy on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/claudemandy/">Claude Mandy on LinkedIn</a></li><li><a title="What is Data Security Posture Management (DSPM)?" rel="nofollow" href="https://www.symmetry-systems.com/blog/what-is-data-security-posture-management">What is Data Security Posture Management (DSPM)?</a></li><li><a title="The DataGuard Solution" rel="nofollow" href="https://www.symmetry-systems.com/product">The DataGuard Solution</a></li><li><a title="Follow Claude Mandy on Twitter" rel="nofollow" href="https://twitter.com/ClaudeMandy">Follow Claude Mandy on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Symmetry Systems executive Claude Mandy joins the show to discuss a career in the security trenches, life as a CISO during the WannaCry crisis, and first principles around data security. We dig into the emerging Data Security Posture Management (DSPM) category and how it extends the Zero Trust philosophy to hybrid cloud data stores.</p><p>Links:</p><ul><li><a title="Claude Mandy on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/claudemandy/">Claude Mandy on LinkedIn</a></li><li><a title="What is Data Security Posture Management (DSPM)?" rel="nofollow" href="https://www.symmetry-systems.com/blog/what-is-data-security-posture-management">What is Data Security Posture Management (DSPM)?</a></li><li><a title="The DataGuard Solution" rel="nofollow" href="https://www.symmetry-systems.com/product">The DataGuard Solution</a></li><li><a title="Follow Claude Mandy on Twitter" rel="nofollow" href="https://twitter.com/ClaudeMandy">Follow Claude Mandy on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+zMEzIS8g</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+zMEzIS8g" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Sidra Ahmed Lefort dishes on VC investments and cyber uncertainties</title>
      <link>http://securityconversations.fireside.fm/sidra-ahmed-lefort-munich-re-ventures</link>
      <guid isPermaLink="false">517e5949-6bfd-4225-9a75-c3d75ebf7d4c</guid>
      <pubDate>Wed, 15 Feb 2023 08:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/517e5949-6bfd-4225-9a75-c3d75ebf7d4c.mp3" length="27740001" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Munich Re Ventures investment principal Sidra Ahmed Lefort joins Ryan for a frank discussion on the state of VC funding in cybersecurity, the rise (and coming fall?) of 'unicorns', the massive early-stage funding rounds and what they mean, layoffs and contractions, and the areas in security still ripe for innovation.</itunes:subtitle>
      <itunes:duration>31:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/517e5949-6bfd-4225-9a75-c3d75ebf7d4c/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Munich Re Ventures investment principal Sidra Ahmed Lefort joins Ryan Naraine for a frank discussion on the state of VC funding in cybersecurity, the rise (and coming correction) in the land of security &#39;unicorns&#39;, the massive early-stage funding rounds and what they mean, layoffs and contractions, and the places in security still ripe for innovation.</p>]]>
      </description>
      <itunes:keywords>venture capital, investments, data security</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Munich Re Ventures investment principal Sidra Ahmed Lefort joins Ryan Naraine for a frank discussion on the state of VC funding in cybersecurity, the rise (and coming correction) in the land of security &#39;unicorns&#39;, the massive early-stage funding rounds and what they mean, layoffs and contractions, and the places in security still ripe for innovation.</p><p>Links:</p><ul><li><a title="Sidra Ahmed Lefort on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/sidra-ahmed-lefort/">Sidra Ahmed Lefort on LinkedIn</a></li><li><a title="Portfolio | Munich Re Ventures" rel="nofollow" href="https://www.munichre.com/mrv/en/portfolio.html">Portfolio | Munich Re Ventures</a></li><li><a title="What&#39;s Going on With Cybersecurity VC Investments?" rel="nofollow" href="https://www.securityweek.com/whats-going-cybersecurity-vc-investments/">What's Going on With Cybersecurity VC Investments?</a></li><li><a title="Video: VC View - Trends in Cybersecurity Innovation" rel="nofollow" href="https://vimeo.com/755174743">Video: VC View - Trends in Cybersecurity Innovation</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Munich Re Ventures investment principal Sidra Ahmed Lefort joins Ryan Naraine for a frank discussion on the state of VC funding in cybersecurity, the rise (and coming correction) in the land of security &#39;unicorns&#39;, the massive early-stage funding rounds and what they mean, layoffs and contractions, and the places in security still ripe for innovation.</p><p>Links:</p><ul><li><a title="Sidra Ahmed Lefort on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/sidra-ahmed-lefort/">Sidra Ahmed Lefort on LinkedIn</a></li><li><a title="Portfolio | Munich Re Ventures" rel="nofollow" href="https://www.munichre.com/mrv/en/portfolio.html">Portfolio | Munich Re Ventures</a></li><li><a title="What&#39;s Going on With Cybersecurity VC Investments?" rel="nofollow" href="https://www.securityweek.com/whats-going-cybersecurity-vc-investments/">What's Going on With Cybersecurity VC Investments?</a></li><li><a title="Video: VC View - Trends in Cybersecurity Innovation" rel="nofollow" href="https://vimeo.com/755174743">Video: VC View - Trends in Cybersecurity Innovation</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+n-K5JWkF</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+n-K5JWkF" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Paul Roberts on wins and losses in the 'right to repair' battle</title>
      <link>http://securityconversations.fireside.fm/paul-roberts-right-to-repair</link>
      <guid isPermaLink="false">95747fe6-4e2a-4243-a050-6d4ef55e27ac</guid>
      <pubDate>Thu, 19 Jan 2023 07:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/95747fe6-4e2a-4243-a050-6d4ef55e27ac.mp3" length="68531445" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

SecuRepairs.org co-founder Paul Roberts joins the show to discuss his passion for the right to repair consumer electronic devices, the big-ticket lobbyists working to undermine the movement, and how changing consumer spending patterns are helping to rack up regulatory wins. </itunes:subtitle>
      <itunes:duration>47:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/95747fe6-4e2a-4243-a050-6d4ef55e27ac/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>SecuRepairs.org co-founder Paul Roberts joins the show to discuss his passion for the right to repair consumer electronic devices, the big-ticket lobbyists working to undermine the movement, and how changing consumer spending patterns are helping to rack up regulatory wins.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>SecuRepairs.org co-founder Paul Roberts joins the show to discuss his passion for the right to repair consumer electronic devices, the big-ticket lobbyists working to undermine the movement, and how changing consumer spending patterns are helping to rack up regulatory wins.</p><p>Links:</p><ul><li><a title="SecuRepairs Mission" rel="nofollow" href="https://securepairs.org/home/">SecuRepairs Mission</a></li><li><a title="Paul Roberts, Editor-in-Chief, Security Ledger" rel="nofollow" href="https://securityconversations.com/episode/paul-roberts-editor-in-chief-security-ledger/">Paul Roberts, Editor-in-Chief, Security Ledger</a> &mdash; Paul Roberts, Editor-in-Chief, Security Ledger</li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li><li><a title="Fight to Repair Substack" rel="nofollow" href="https://fighttorepair.substack.com/">Fight to Repair Substack</a></li><li><a title="Tesla is a Vocal Opponent of the Right to Repair. Now we know why." rel="nofollow" href="https://fighttorepair.substack.com/p/teslas-a-vocal-opponent-of-the-right">Tesla is a Vocal Opponent of the Right to Repair. Now we know why.</a> &mdash; Tesla is a Vocal Opponent of the Right to Repair. Now we know why.</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>SecuRepairs.org co-founder Paul Roberts joins the show to discuss his passion for the right to repair consumer electronic devices, the big-ticket lobbyists working to undermine the movement, and how changing consumer spending patterns are helping to rack up regulatory wins.</p><p>Links:</p><ul><li><a title="SecuRepairs Mission" rel="nofollow" href="https://securepairs.org/home/">SecuRepairs Mission</a></li><li><a title="Paul Roberts, Editor-in-Chief, Security Ledger" rel="nofollow" href="https://securityconversations.com/episode/paul-roberts-editor-in-chief-security-ledger/">Paul Roberts, Editor-in-Chief, Security Ledger</a> &mdash; Paul Roberts, Editor-in-Chief, Security Ledger</li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li><li><a title="Fight to Repair Substack" rel="nofollow" href="https://fighttorepair.substack.com/">Fight to Repair Substack</a></li><li><a title="Tesla is a Vocal Opponent of the Right to Repair. Now we know why." rel="nofollow" href="https://fighttorepair.substack.com/p/teslas-a-vocal-opponent-of-the-right">Tesla is a Vocal Opponent of the Right to Repair. Now we know why.</a> &mdash; Tesla is a Vocal Opponent of the Right to Repair. Now we know why.</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+3vMsNdIA</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+3vMsNdIA" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Katie Moussouris on where bug bounties went wrong</title>
      <link>http://securityconversations.fireside.fm/katie-moussouris-where-bug-bounties-went-wrong</link>
      <guid isPermaLink="false">33d9d510-6496-4c3d-b118-e77fe9f9d710</guid>
      <pubDate>Thu, 08 Dec 2022 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/33d9d510-6496-4c3d-b118-e77fe9f9d710.mp3" length="28878724" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Luta Security founder and chief executive Katie Moussouris joins the show to dish on the bug-bounty ecosystem, the abuse of hacker labor, and the common mistakes made by even the most mature security programs.  A security industry pioneer, Moussouris argues for better use of bug bounty metrics to drive decisions and a heavy focus on reducing duplicate vulnerability submissions.</itunes:subtitle>
      <itunes:duration>33:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/33d9d510-6496-4c3d-b118-e77fe9f9d710/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Luta Security founder and chief executive Katie Moussouris joins the show to dish on the bug-bounty ecosystem, the abuse of hacker labor, and the common mistakes made by even the most mature security programs.  A security industry pioneer, Moussouris argues for better use of bug bounty metrics to drive decisions and a heavy focus on reducing duplicate vulnerability submissions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Luta Security founder and chief executive Katie Moussouris joins the show to dish on the bug-bounty ecosystem, the abuse of hacker labor, and the common mistakes made by even the most mature security programs.  A security industry pioneer, Moussouris argues for better use of bug bounty metrics to drive decisions and a heavy focus on reducing duplicate vulnerability submissions.</p><p>Links:</p><ul><li><a title="Katie Moussouris - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Katie_Moussouris">Katie Moussouris - Wikipedia</a></li><li><a title="Katie Moussouris on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris on Twitter</a></li><li><a title="Luta Security&#39;s Vulnerability Coordination Maturity Model" rel="nofollow" href="https://www.lutasecurity.com/vcmm">Luta Security's Vulnerability Coordination Maturity Model</a></li><li><a title="Referral Bounty | Luta Security" rel="nofollow" href="https://www.lutasecurity.com/referralbounty">Referral Bounty | Luta Security</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Luta Security founder and chief executive Katie Moussouris joins the show to dish on the bug-bounty ecosystem, the abuse of hacker labor, and the common mistakes made by even the most mature security programs.  A security industry pioneer, Moussouris argues for better use of bug bounty metrics to drive decisions and a heavy focus on reducing duplicate vulnerability submissions.</p><p>Links:</p><ul><li><a title="Katie Moussouris - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Katie_Moussouris">Katie Moussouris - Wikipedia</a></li><li><a title="Katie Moussouris on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris on Twitter</a></li><li><a title="Luta Security&#39;s Vulnerability Coordination Maturity Model" rel="nofollow" href="https://www.lutasecurity.com/vcmm">Luta Security's Vulnerability Coordination Maturity Model</a></li><li><a title="Referral Bounty | Luta Security" rel="nofollow" href="https://www.lutasecurity.com/referralbounty">Referral Bounty | Luta Security</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+XTqqbkWi</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+XTqqbkWi" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Robinhood CSO Caleb Sima on a career in the security trenches</title>
      <link>http://securityconversations.fireside.fm/caleb-sima-cso-robinhood</link>
      <guid isPermaLink="false">5e5c677b-2d28-448a-a72a-02495822d151</guid>
      <pubDate>Tue, 08 Nov 2022 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5e5c677b-2d28-448a-a72a-02495822d151.mp3" length="23037842" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 

- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Caleb Sima is a cybersecurity lifer now responsible for security at Robinhood, a mobile stock trading platform.   Caleb joins Ryan on the show to discuss the early hacking scene in Atlanta, building SPI Dynamics in a webapp security powerhouse, the evolution of attack surfaces, the CISO's changing priorities, and more...</itunes:subtitle>
      <itunes:duration>30:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5e5c677b-2d28-448a-a72a-02495822d151/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Caleb Sima is a cybersecurity lifer now responsible for security at Robinhood, a mobile stock trading platform.   Caleb joins Ryan on the show to discuss the early hacking scene in Atlanta, building SPI Dynamics in a webapp security powerhouse, the evolution of attack surfaces, the CISO&#39;s changing priorities, and more...</p>]]>
      </description>
      <itunes:keywords>CISO, robinhood, mobile stock trading, webapp security, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Caleb Sima is a cybersecurity lifer now responsible for security at Robinhood, a mobile stock trading platform.   Caleb joins Ryan on the show to discuss the early hacking scene in Atlanta, building SPI Dynamics in a webapp security powerhouse, the evolution of attack surfaces, the CISO&#39;s changing priorities, and more...</p><p>Links:</p><ul><li><a title="Caleb Sima on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/calebsima/">Caleb Sima on LinkedIn</a></li><li><a title="HP Snaps up SPI Dynamics" rel="nofollow" href="https://www.networkworld.com/article/2291884/hp-aims-to-snatch-up-spi-dynamics.html">HP Snaps up SPI Dynamics</a></li><li><a title="Caleb Sima (@csima) on Twitter" rel="nofollow" href="https://twitter.com/csima?lang=en">Caleb Sima (@csima) on Twitter</a></li><li><a title="Robinhood Bio" rel="nofollow" href="https://investors.robinhood.com/governance/board-of-directors/person-details/default.aspx?ItemId=f7e9c07f-2d9a-4f0c-a069-b7824598ac8f">Robinhood Bio</a></li><li><a title="First 90 Days In the CISO Chair" rel="nofollow" href="https://www.youtube.com/watch?v=aO2fQE4zHHw&amp;ab_channel=RSAConference">First 90 Days In the CISO Chair</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Caleb Sima is a cybersecurity lifer now responsible for security at Robinhood, a mobile stock trading platform.   Caleb joins Ryan on the show to discuss the early hacking scene in Atlanta, building SPI Dynamics in a webapp security powerhouse, the evolution of attack surfaces, the CISO&#39;s changing priorities, and more...</p><p>Links:</p><ul><li><a title="Caleb Sima on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/calebsima/">Caleb Sima on LinkedIn</a></li><li><a title="HP Snaps up SPI Dynamics" rel="nofollow" href="https://www.networkworld.com/article/2291884/hp-aims-to-snatch-up-spi-dynamics.html">HP Snaps up SPI Dynamics</a></li><li><a title="Caleb Sima (@csima) on Twitter" rel="nofollow" href="https://twitter.com/csima?lang=en">Caleb Sima (@csima) on Twitter</a></li><li><a title="Robinhood Bio" rel="nofollow" href="https://investors.robinhood.com/governance/board-of-directors/person-details/default.aspx?ItemId=f7e9c07f-2d9a-4f0c-a069-b7824598ac8f">Robinhood Bio</a></li><li><a title="First 90 Days In the CISO Chair" rel="nofollow" href="https://www.youtube.com/watch?v=aO2fQE4zHHw&amp;ab_channel=RSAConference">First 90 Days In the CISO Chair</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+-xdSyFwz</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+-xdSyFwz" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Charlie Miller on hacking iPhones, Macbooks, Jeep and Self-Driving Cars</title>
      <link>http://securityconversations.fireside.fm/charlie-miller-hacking-iphones-self-driving-cars</link>
      <guid isPermaLink="false">c59b2c9f-f374-403d-b8dc-684cac518d43</guid>
      <pubDate>Tue, 18 Oct 2022 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c59b2c9f-f374-403d-b8dc-684cac518d43.mp3" length="52629491" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsors: 
- Binarly (https://binarly.io)
- FwHunt (https://fwhunt.run)

Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the 'No More Free Bugs' campaign, the Jeep hack that led to a recall and his current work securing Cruise's self-driving fleet.</itunes:subtitle>
      <itunes:duration>59:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c59b2c9f-f374-403d-b8dc-684cac518d43/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the &#39;No More Free Bugs&#39; campaign, the Jeep hack that led to a recall and his current work securing Cruise&#39;s self-driving fleet. Plus, an interesting take on iOS Lockdown Mode.</p>]]>
      </description>
      <itunes:keywords>zero-day, exploits, apple, iphone, macbook, jeep, self-driving cars, browsers, pwn2own, exploit sales</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the &#39;No More Free Bugs&#39; campaign, the Jeep hack that led to a recall and his current work securing Cruise&#39;s self-driving fleet. Plus, an interesting take on iOS Lockdown Mode.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><strong>Episode sponsors:</strong></p>

<ul>
<li>Binarly (<a href="https://binarly.io" rel="nofollow">https://binarly.io</a>)</li>
<li>FwHunt (<a href="https://fwhunt.run" rel="nofollow">https://fwhunt.run</a>)</li>
</ul>

<p>Famed hacker Charlie Miller joins Ryan on the podcast to discuss a career in vulnerability research and software exploitation. Charlie talks about hacking iPhones and Macbooks at Pwn2Own, the &#39;No More Free Bugs&#39; campaign, the Jeep hack that led to a recall and his current work securing Cruise&#39;s self-driving fleet. Plus, an interesting take on iOS Lockdown Mode.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+-Rv06uYm</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+-Rv06uYm" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>JAG-S on big-game malware hunting and a very mysterious APT</title>
      <link>http://securityconversations.fireside.fm/juan-andres-guerrero-saade</link>
      <guid isPermaLink="false">eefa9c91-fd32-43f6-bd09-7ddedda38914</guid>
      <pubDate>Mon, 17 Oct 2022 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/eefa9c91-fd32-43f6-bd09-7ddedda38914.mp3" length="41028733" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>* Episode sponsors: [Binarly](https://binarly.io/) and [FwHunt](https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.

SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</itunes:subtitle>
      <itunes:duration>52:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/eefa9c91-fd32-43f6-bd09-7ddedda38914/cover.jpg?v=1"/>
      <description>
        <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p>]]>
      </description>
      <itunes:keywords>nation-state APTs, metador, sentinellabs, labscon, malware campaigns, cyberwar, cyber espionage, attribution</itunes:keywords>
      <content:encoded>
        <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p><p>Links:</p><ul><li><a title="Report: The Mystery of Metador" rel="nofollow" href="https://assets.sentinelone.com/sentinellabs22/metador">Report: The Mystery of Metador</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://twitter.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Researchers Crowdsourcing Effort to Identify Mysterious Metador APT" rel="nofollow" href="https://www.securityweek.com/researchers-crowdsourcing-effort-identify-mysterious-metador-apt">Researchers Crowdsourcing Effort to Identify Mysterious Metador APT</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.</p><p>Links:</p><ul><li><a title="Report: The Mystery of Metador" rel="nofollow" href="https://assets.sentinelone.com/sentinellabs22/metador">Report: The Mystery of Metador</a></li><li><a title="J. A. Guerrero-Saade on Twitter" rel="nofollow" href="https://twitter.com/juanandres_gs">J. A. Guerrero-Saade on Twitter</a></li><li><a title="LABScon - Security Research in Real Time" rel="nofollow" href="https://www.labscon.io/">LABScon - Security Research in Real Time</a></li><li><a title="Researchers Crowdsourcing Effort to Identify Mysterious Metador APT" rel="nofollow" href="https://www.securityweek.com/researchers-crowdsourcing-effort-identify-mysterious-metador-apt">Researchers Crowdsourcing Effort to Identify Mysterious Metador APT</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+VqMHcMd8</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+VqMHcMd8" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Chainguard's Dan Lorenc gets real on software supply chain problems</title>
      <link>http://securityconversations.fireside.fm/dan-lorenc-chainguard-supply-chain</link>
      <guid isPermaLink="false">04e22eb6-dc8d-4dae-af5b-44f4d4aca81d</guid>
      <pubDate>Thu, 13 Oct 2022 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/04e22eb6-dc8d-4dae-af5b-44f4d4aca81d.mp3" length="36469411" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>* Episode sponsors: [Binarly](https://binarly.io/) and [FwHunt](https://fwhunt.run/) - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.

Dan Lorenc and team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government's efforts will speed up technology innovation.</itunes:subtitle>
      <itunes:duration>47:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/04e22eb6-dc8d-4dae-af5b-44f4d4aca81d/cover.jpg?v=1"/>
      <description>
        <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p>]]>
      </description>
      <itunes:keywords>supply chain, open source software, sbom, log4j, codecov, solarwinds, sunburst, apt, credential theft, npm, typosquatting, code quality, shift-left</itunes:keywords>
      <content:encoded>
        <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p><p>Links:</p><ul><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Chainguard Enforce" rel="nofollow" href="https://www.chainguard.dev/chainguard-enforce">Chainguard Enforce</a></li><li><a title="Sounil Yu on SBOMs, software supply chain security" rel="nofollow" href="https://securityconversations.com/episode/sounil-yu-on-sboms-software-supply-chain-security/">Sounil Yu on SBOMs, software supply chain security</a></li><li><a title="Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">Extending SBOMs to the firmware layer</a></li><li><a title="Cybersecurity Leaders Scramble to Decipher SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/cybersecurity-leaders-scramble-decipher-sbom-mandate">Cybersecurity Leaders Scramble to Decipher SBOM Mandate</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<ul>
<li>Episode sponsors: <a href="https://binarly.io/" rel="nofollow">Binarly</a> and <a href="https://fwhunt.run/" rel="nofollow">FwHunt</a> - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence.</li>
</ul>

<p>Dan Lorenc and a team or ex-Googlers raised $55 million in early-stage funding to build technology to secure software supply chains. On this episode of the show, Dan joins Ryan to talk about the different faces of the supply chain problem, the security gaps that will never go away, the decision to raise an unusually large early-stage funding round, and how the U.S. government&#39;s efforts will speed up technology innovation. </p><p>Links:</p><ul><li><a title="Dan Lorenc on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/danlorenc/">Dan Lorenc on LinkedIn</a></li><li><a title="Chainguard Enforce" rel="nofollow" href="https://www.chainguard.dev/chainguard-enforce">Chainguard Enforce</a></li><li><a title="Sounil Yu on SBOMs, software supply chain security" rel="nofollow" href="https://securityconversations.com/episode/sounil-yu-on-sboms-software-supply-chain-security/">Sounil Yu on SBOMs, software supply chain security</a></li><li><a title="Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">Extending SBOMs to the firmware layer</a></li><li><a title="Cybersecurity Leaders Scramble to Decipher SBOM Mandate" rel="nofollow" href="https://www.securityweek.com/cybersecurity-leaders-scramble-decipher-sbom-mandate">Cybersecurity Leaders Scramble to Decipher SBOM Mandate</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+_sKNliw0</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+_sKNliw0" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Vinnie Liu discusses a life in the offensive security trenches</title>
      <link>http://securityconversations.fireside.fm/vinnie-liu-bishop-fox</link>
      <guid isPermaLink="false">7a9eb978-4725-4bcf-8c04-525df6c2bcff</guid>
      <pubDate>Sun, 07 Aug 2022 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/7a9eb978-4725-4bcf-8c04-525df6c2bcff.mp3" length="162616279" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a 'growth mode' investment, cybersecurity's people problem, and much more...</itunes:subtitle>
      <itunes:duration>1:07:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/7a9eb978-4725-4bcf-8c04-525df6c2bcff/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p>]]>
      </description>
      <itunes:keywords>red team, blue team, offense vs defense, simulated hacking attacks</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p><p>Links:</p><ul><li><a title="Vinnie Liu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/vinnieliu/">Vinnie Liu on LinkedIn</a></li><li><a title="Vinnie Liu at MS BlueHat v8" rel="nofollow" href="https://www.youtube.com/watch?v=WC7kpauRr9s&amp;ab_channel=BishopFox">Vinnie Liu at MS BlueHat v8</a></li><li><a title="Anti-Drone Tools Tested: From Shotguns To Superdrones" rel="nofollow" href="https://www.wired.com/story/watch-anti-drone-weapons-test/">Anti-Drone Tools Tested: From Shotguns To Superdrones</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>A conversation with Bishop Fox chief executive Vinnie Liu on the origins and evolution of the pentest services business, the emerging continuous attack surface management space, raising $75m as a &#39;growth mode&#39; investment, cybersecurity&#39;s people problem, and much more...</p><p>Links:</p><ul><li><a title="Vinnie Liu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/vinnieliu/">Vinnie Liu on LinkedIn</a></li><li><a title="Vinnie Liu at MS BlueHat v8" rel="nofollow" href="https://www.youtube.com/watch?v=WC7kpauRr9s&amp;ab_channel=BishopFox">Vinnie Liu at MS BlueHat v8</a></li><li><a title="Anti-Drone Tools Tested: From Shotguns To Superdrones" rel="nofollow" href="https://www.wired.com/story/watch-anti-drone-weapons-test/">Anti-Drone Tools Tested: From Shotguns To Superdrones</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+vSt_jSLD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+vSt_jSLD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Down memory lane with Snort and Sourcefire creator Marty Roesch</title>
      <link>http://securityconversations.fireside.fm/marty-roesch-snort-to-netography</link>
      <guid isPermaLink="false">496e9c57-c664-4955-817f-3885678f1c43</guid>
      <pubDate>Mon, 25 Jul 2022 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/496e9c57-c664-4955-817f-3885678f1c43.mp3" length="55669642" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Network security pioneer Marty Roesch takes listeners on a trip down memory lane, sharing stories from the creation of Snort back in the 1990s, the startup journey of building Sourcefire into an IDS/IPS powerhouse and selling the company for $2 billion, the U.S. government killing a Check Point acquisition, and his newest adventure as chief executive at Netography.</itunes:subtitle>
      <itunes:duration>1:07:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/496e9c57-c664-4955-817f-3885678f1c43/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>Network security pioneer Marty Roesch takes listeners on a trip down memory lane, sharing stories from the creation of Snort back in the 1990s, the startup journey of building Sourcefire into an IDS/IPS powerhouse and selling the company for $2 billion, the U.S. government killing a Check Point acquisition, and his newest adventure as chief executive at Netography.</p>]]>
      </description>
      <itunes:keywords>network security, ips, ids, investments and exits, sourcefire, snort, marty roesch, netography, entrepreneurship, cybersecurity business</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Network security pioneer Marty Roesch takes listeners on a trip down memory lane, sharing stories from the creation of Snort back in the 1990s, the startup journey of building Sourcefire into an IDS/IPS powerhouse and selling the company for $2 billion, the U.S. government killing a Check Point acquisition, and his newest adventure as chief executive at Netography.</p><p>Links:</p><ul><li><a title="Martin Roesch on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maroesch/">Martin Roesch on LinkedIn</a></li><li><a title="Martin Roesch - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Martin_Roesch">Martin Roesch - Wikipedia</a></li><li><a title="Martin Roesch on Twitter" rel="nofollow" href="https://twitter.com/mroesch">Martin Roesch on Twitter</a></li><li><a title="The early days of Snort" rel="nofollow" href="https://packetstormsecurity.com/sniffers/snort/page10/">The early days of Snort</a></li><li><a title="Cisco Banks On Sourcefire And Snort For Its Security Future" rel="nofollow" href="https://www.darkreading.com/perimeter/cisco-banks-on-sourcefire-and-snort-for-its-security-future">Cisco Banks On Sourcefire And Snort For Its Security Future</a></li><li><a title="Check Point Aborts Sourcefire Acquisition" rel="nofollow" href="https://www.eweek.com/security/check-point-aborts-sourcefire-acquisition/">Check Point Aborts Sourcefire Acquisition</a></li><li><a title="Martin Roesch joins Netography as CEO" rel="nofollow" href="https://netography.com/snort-inventor-and-sourcefire-founder-martin-roesch-joins-netography-as-ceo/">Martin Roesch joins Netography as CEO</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Network security pioneer Marty Roesch takes listeners on a trip down memory lane, sharing stories from the creation of Snort back in the 1990s, the startup journey of building Sourcefire into an IDS/IPS powerhouse and selling the company for $2 billion, the U.S. government killing a Check Point acquisition, and his newest adventure as chief executive at Netography.</p><p>Links:</p><ul><li><a title="Martin Roesch on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maroesch/">Martin Roesch on LinkedIn</a></li><li><a title="Martin Roesch - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/Martin_Roesch">Martin Roesch - Wikipedia</a></li><li><a title="Martin Roesch on Twitter" rel="nofollow" href="https://twitter.com/mroesch">Martin Roesch on Twitter</a></li><li><a title="The early days of Snort" rel="nofollow" href="https://packetstormsecurity.com/sniffers/snort/page10/">The early days of Snort</a></li><li><a title="Cisco Banks On Sourcefire And Snort For Its Security Future" rel="nofollow" href="https://www.darkreading.com/perimeter/cisco-banks-on-sourcefire-and-snort-for-its-security-future">Cisco Banks On Sourcefire And Snort For Its Security Future</a></li><li><a title="Check Point Aborts Sourcefire Acquisition" rel="nofollow" href="https://www.eweek.com/security/check-point-aborts-sourcefire-acquisition/">Check Point Aborts Sourcefire Acquisition</a></li><li><a title="Martin Roesch joins Netography as CEO" rel="nofollow" href="https://netography.com/snort-inventor-and-sourcefire-founder-martin-roesch-joins-netography-as-ceo/">Martin Roesch joins Netography as CEO</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+10l0Z-IH</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+10l0Z-IH" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Subbu Rama, co-founder and CEO, BalkanID</title>
      <link>http://securityconversations.fireside.fm/subbu-rama-balkan-id</link>
      <guid isPermaLink="false">a7042944-dfc0-4106-81b0-ded42d786570</guid>
      <pubDate>Wed, 01 Jun 2022 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a7042944-dfc0-4106-81b0-ded42d786570.mp3" length="19120903" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Serial entrepreneur Subbu Rama joins the show to talk about building a cybersecurity business, addressing the problem of entitlement sprawl and raising seed funding for intelligent access governance technology.</itunes:subtitle>
      <itunes:duration>34:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a7042944-dfc0-4106-81b0-ded42d786570/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Serial entrepreneur Subbu Rama joins the show to talk about building a cybersecurity business, addressing the problem of entitlement sprawl and raising seed funding for intelligent access governance technology.</p>]]>
      </description>
      <itunes:keywords>funding, iga, balkanid, saas, public cloud</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Serial entrepreneur Subbu Rama joins the show to talk about building a cybersecurity business, addressing the problem of entitlement sprawl and raising seed funding for intelligent access governance technology.</p><p>Links:</p><ul><li><a title="BalkanID Platform Architecture" rel="nofollow" href="https://www.balkan.id/platform">BalkanID Platform Architecture</a></li><li><a title="Subbu Rama on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/subburama/">Subbu Rama on LinkedIn</a></li><li><a title="Subbu Rama on Twitter" rel="nofollow" href="https://twitter.com/Subburama">Subbu Rama on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Serial entrepreneur Subbu Rama joins the show to talk about building a cybersecurity business, addressing the problem of entitlement sprawl and raising seed funding for intelligent access governance technology.</p><p>Links:</p><ul><li><a title="BalkanID Platform Architecture" rel="nofollow" href="https://www.balkan.id/platform">BalkanID Platform Architecture</a></li><li><a title="Subbu Rama on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/subburama/">Subbu Rama on LinkedIn</a></li><li><a title="Subbu Rama on Twitter" rel="nofollow" href="https://twitter.com/Subburama">Subbu Rama on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ZG-WkoZV</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ZG-WkoZV" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Project Zero's Maddie Stone on the surge in zero-day discoveries</title>
      <link>http://securityconversations.fireside.fm/maddie-stone-project-zero</link>
      <guid isPermaLink="false">97c47b7c-f218-4b1b-a4ae-1322852da212</guid>
      <pubDate>Tue, 10 May 2022 12:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97c47b7c-f218-4b1b-a4ae-1322852da212.mp3" length="30298830" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Maddie Stone is a security researcher in Google's Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</itunes:subtitle>
      <itunes:duration>42:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97c47b7c-f218-4b1b-a4ae-1322852da212/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p>]]>
      </description>
      <itunes:keywords>zero-day, exploits, project zero, google, memory safety, transparency, disclosure</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Maddie Stone is a security researcher in Google&#39;s Project Zero team. Over the last few years, she has publicly tracked the discovery and disclosure of zero-day malware attacks seen in the wild.  On this episode, Maddie joins Ryan to chat about three years of zero-day exploitation data, the nuances around 0day disclosures, the never-ending struggle to mitigate memory corruption attacks and the need for transparency among affected vendors.</p><p>Links:</p><ul><li><a title="A Year in Review of 0-days Used In-the-Wild in 2021" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/04/the-more-you-know-more-you-know-you.html">A Year in Review of 0-days Used In-the-Wild in 2021</a></li><li><a title="Maddie Stone on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/maddie-stone-192a6544/">Maddie Stone on LinkedIn</a></li><li><a title="0day &quot;In the Wild&quot; Spreadsheet" rel="nofollow" href="https://docs.google.com/spreadsheets/d/1lkNJ0uQwbeC1ZTRrxdtuPLCIl7mlUreoKfSIgajnSyY/edit#gid=0">0day "In the Wild" Spreadsheet</a></li><li><a title="Maddie Stone on Twitter" rel="nofollow" href="https://twitter.com/maddiestone">Maddie Stone on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+s2e3PByX</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+s2e3PByX" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Prof. Mohit Tiwari on the future of securing data at scale</title>
      <link>http://securityconversations.fireside.fm/mohit-tiwari-symmetry-systems</link>
      <guid isPermaLink="false">799a8835-058d-409d-b378-6f5f3e13c46e</guid>
      <pubDate>Fri, 06 May 2022 00:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/799a8835-058d-409d-b378-6f5f3e13c46e.mp3" length="34562435" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Symmetry Systems co-founder Mohit Tiwari has been studying data security and control flow access for more than a decade.  On this episode of the podcast, he discusses his transition from academia to data security entrepreneurship, first principles around the data security and privacy, the exploding DSPM (data security posture management) space, and the mission to solve one of cybersecurity's biggest problems.</itunes:subtitle>
      <itunes:duration>46:01</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/799a8835-058d-409d-b378-6f5f3e13c46e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Symmetry Systems co-founder Mohit Tiwari has been studying data security and control flow access for more than a decade.  On this episode of the podcast, he discusses his transition from academia to data security entrepreneurship, first principles around the data security and privacy, the exploding DSPM (data security posture management) space, and the mission to solve one of cybersecurity&#39;s biggest problems.</p>]]>
      </description>
      <itunes:keywords>data security, dspm, data privacy, data guard</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Symmetry Systems co-founder Mohit Tiwari has been studying data security and control flow access for more than a decade.  On this episode of the podcast, he discusses his transition from academia to data security entrepreneurship, first principles around the data security and privacy, the exploding DSPM (data security posture management) space, and the mission to solve one of cybersecurity&#39;s biggest problems.</p><p>Links:</p><ul><li><a title="Mohit Tiwari | University of Texas at Austin" rel="nofollow" href="https://www.ece.utexas.edu/people/faculty/mohit-tiwari">Mohit Tiwari | University of Texas at Austin</a></li><li><a title="Mohit Tiwari on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mohit-tiwari8/">Mohit Tiwari on LinkedIn</a></li><li><a title="Follow Mohit on Twitter" rel="nofollow" href="https://mobile.twitter.com/mt_lattices">Follow Mohit on Twitter</a></li><li><a title="Symmetry Systems DataGuard" rel="nofollow" href="https://www.symmetry-systems.com/product">Symmetry Systems DataGuard</a></li><li><a title="Why is DSOS an unsolved problem?" rel="nofollow" href="https://www.symmetry-systems.com/problem-dsos">Why is DSOS an unsolved problem?</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Symmetry Systems co-founder Mohit Tiwari has been studying data security and control flow access for more than a decade.  On this episode of the podcast, he discusses his transition from academia to data security entrepreneurship, first principles around the data security and privacy, the exploding DSPM (data security posture management) space, and the mission to solve one of cybersecurity&#39;s biggest problems.</p><p>Links:</p><ul><li><a title="Mohit Tiwari | University of Texas at Austin" rel="nofollow" href="https://www.ece.utexas.edu/people/faculty/mohit-tiwari">Mohit Tiwari | University of Texas at Austin</a></li><li><a title="Mohit Tiwari on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mohit-tiwari8/">Mohit Tiwari on LinkedIn</a></li><li><a title="Follow Mohit on Twitter" rel="nofollow" href="https://mobile.twitter.com/mt_lattices">Follow Mohit on Twitter</a></li><li><a title="Symmetry Systems DataGuard" rel="nofollow" href="https://www.symmetry-systems.com/product">Symmetry Systems DataGuard</a></li><li><a title="Why is DSOS an unsolved problem?" rel="nofollow" href="https://www.symmetry-systems.com/problem-dsos">Why is DSOS an unsolved problem?</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+L4cP1HjA</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+L4cP1HjA" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Google's Shane Huntley on zero-days and the nation-state threat landscape</title>
      <link>http://securityconversations.fireside.fm/shane-huntley-google-tag</link>
      <guid isPermaLink="false">fb354ea5-acaf-443d-a97d-373e1adc92b0</guid>
      <pubDate>Mon, 04 Apr 2022 06:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fb354ea5-acaf-443d-a97d-373e1adc92b0.mp3" length="79196359" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Director at Google's Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</itunes:subtitle>
      <itunes:duration>40:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fb354ea5-acaf-443d-a97d-373e1adc92b0/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p>]]>
      </description>
      <itunes:keywords>google, zero-day, nation-state, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Director at Google&#39;s Threat Analysis Group (TAG) Shane Huntley joins the show and talks about lessons from the 2009 Aurora attacks, the surge in zero-day discoveries, the usefulness of IOCs, North Korean APT operations, private sector mercenary hackers, the expanding nation-state threat actor map, and much more...</p><p>Links:</p><ul><li><a title="Shane Huntley on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/shanehuntley/">Shane Huntley on LinkedIn</a></li><li><a title="Twitter: @ShaneHuntley" rel="nofollow" href="https://mobile.twitter.com/shanehuntley">Twitter: @ShaneHuntley</a></li><li><a title="Project Zero: FORCEDENTRY Sandbox Escape" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/03/forcedentry-sandbox-escape.html">Project Zero: FORCEDENTRY Sandbox Escape</a></li><li><a title="Google and Operation Aurora " rel="nofollow" href="https://en.wikipedia.org/wiki/Operation_Aurora">Google and Operation Aurora </a></li><li><a title="A walk through Google Project Zero metrics" rel="nofollow" href="https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html">A walk through Google Project Zero metrics</a></li><li><a title="Project Zero: 0day &quot;In the Wild&quot; Database" rel="nofollow" href="https://googleprojectzero.blogspot.com/p/0day.html">Project Zero: 0day "In the Wild" Database</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+8WNastAo</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+8WNastAo" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Lamont Orange, CISO, Netskope</title>
      <link>http://securityconversations.fireside.fm/lamont-orange-ciso-netskope</link>
      <guid isPermaLink="false">12d22943-4ba7-4d5b-82db-f731cea697ef</guid>
      <pubDate>Mon, 21 Mar 2022 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/12d22943-4ba7-4d5b-82db-f731cea697ef.mp3" length="22732322" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Netskope security chief Lamont Orange joins the show to chat about the changing role of the Chief Information Security Officer (CISO), managing security as a business enabler, the cybersecurity skills shortage, and his own unique approach to security leadership.</itunes:subtitle>
      <itunes:duration>26:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/12d22943-4ba7-4d5b-82db-f731cea697ef/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Netskope security chief Lamont Orange joins the show to chat about the changing role of the Chief Information Security Officer (CISO), managing security as a business enabler, the cybersecurity skills shortage, and his own unique approach to security leadership.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Netskope security chief Lamont Orange joins the show to chat about the changing role of the Chief Information Security Officer (CISO), managing security as a business enabler, the cybersecurity skills shortage, and his own unique approach to security leadership.</p><p>Links:</p><ul><li><a title="Lamont Orange: A CISO&#39;s Point of View on Log4j" rel="nofollow" href="https://www.netskope.com/blog/a-cisos-point-of-view-on-log4j">Lamont Orange: A CISO's Point of View on Log4j</a></li><li><a title="Five minutes with Lamont Orange" rel="nofollow" href="https://www.securitymagazine.com/articles/95493-minutes-with-lamont-orange---fostering-a-security-first-culture-with-sase-adoption">Five minutes with Lamont Orange</a></li><li><a title="Lamont Orange columns on DarkReading" rel="nofollow" href="https://www.darkreading.com/author/lamont-orange">Lamont Orange columns on DarkReading</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Netskope security chief Lamont Orange joins the show to chat about the changing role of the Chief Information Security Officer (CISO), managing security as a business enabler, the cybersecurity skills shortage, and his own unique approach to security leadership.</p><p>Links:</p><ul><li><a title="Lamont Orange: A CISO&#39;s Point of View on Log4j" rel="nofollow" href="https://www.netskope.com/blog/a-cisos-point-of-view-on-log4j">Lamont Orange: A CISO's Point of View on Log4j</a></li><li><a title="Five minutes with Lamont Orange" rel="nofollow" href="https://www.securitymagazine.com/articles/95493-minutes-with-lamont-orange---fostering-a-security-first-culture-with-sase-adoption">Five minutes with Lamont Orange</a></li><li><a title="Lamont Orange columns on DarkReading" rel="nofollow" href="https://www.darkreading.com/author/lamont-orange">Lamont Orange columns on DarkReading</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+aVRfKQPs</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+aVRfKQPs" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Haroon Meer on the business of cybersecurity </title>
      <link>http://securityconversations.fireside.fm/haroon-meer-thinkst</link>
      <guid isPermaLink="false">1e1458ae-78d3-445a-8b8a-42cee0397f6c</guid>
      <pubDate>Sat, 19 Mar 2022 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1e1458ae-78d3-445a-8b8a-42cee0397f6c.mp3" length="58885756" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Thinkst founder and CEO Haroon Meer joins Ryan Naraine on the show to talk about building a successful cybersecurity company without venture capital investment, fast-moving attack surfaces and the never-ending battle to mitigate memory corruption issues.</itunes:subtitle>
      <itunes:duration>1:15:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1e1458ae-78d3-445a-8b8a-42cee0397f6c/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Thinkst founder and CEO Haroon Meer joins Ryan Naraine on the show to talk about building a successful cybersecurity company without venture capital investment, fast-moving attack surfaces and the never-ending battle to mitigate memory corruption issues.</p>]]>
      </description>
      <itunes:keywords>thinkst, canaries, breach detection, startup, venture capital, entrepreneurship, memory corruption, ransomware, attack surfaces</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Thinkst founder and CEO Haroon Meer joins Ryan Naraine on the show to talk about building a successful cybersecurity company without venture capital investment, fast-moving attack surfaces and the never-ending battle to mitigate memory corruption issues.</p><p>Links:</p><ul><li><a title="Haroon Meer on Twitter" rel="nofollow" href="https://twitter.com/haroonmeer">Haroon Meer on Twitter</a></li><li><a title="Thinkst: We bootstrapped to $11 million in ARR" rel="nofollow" href="https://blog.thinkst.com/2021/03/we-bootstrapped-to-11-million-in-arr.html">Thinkst: We bootstrapped to $11 million in ARR</a></li><li><a title="Memory Corruption and Hacker Folklore" rel="nofollow" href="https://blog.thinkst.com/2010/05/memory-corruption-and-hacker-folklore.html">Memory Corruption and Hacker Folklore</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/">Thinkst Canary</a></li><li><a title="Podcast: Haroon Meer, Thinkst Applied Research" rel="nofollow" href="https://securityconversations.com/episode/haroon-meer-ceo-thinkst-applied-research/">Podcast: Haroon Meer, Thinkst Applied Research</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Thinkst founder and CEO Haroon Meer joins Ryan Naraine on the show to talk about building a successful cybersecurity company without venture capital investment, fast-moving attack surfaces and the never-ending battle to mitigate memory corruption issues.</p><p>Links:</p><ul><li><a title="Haroon Meer on Twitter" rel="nofollow" href="https://twitter.com/haroonmeer">Haroon Meer on Twitter</a></li><li><a title="Thinkst: We bootstrapped to $11 million in ARR" rel="nofollow" href="https://blog.thinkst.com/2021/03/we-bootstrapped-to-11-million-in-arr.html">Thinkst: We bootstrapped to $11 million in ARR</a></li><li><a title="Memory Corruption and Hacker Folklore" rel="nofollow" href="https://blog.thinkst.com/2010/05/memory-corruption-and-hacker-folklore.html">Memory Corruption and Hacker Folklore</a></li><li><a title="Thinkst Canary" rel="nofollow" href="https://canary.tools/">Thinkst Canary</a></li><li><a title="Podcast: Haroon Meer, Thinkst Applied Research" rel="nofollow" href="https://securityconversations.com/episode/haroon-meer-ceo-thinkst-applied-research/">Podcast: Haroon Meer, Thinkst Applied Research</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+pNt5BU0J</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+pNt5BU0J" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Tony Pepper, co-founder and CEO, Egress</title>
      <link>http://securityconversations.fireside.fm/tony-pepper-egress</link>
      <guid isPermaLink="false">d26fa37e-4956-44ec-922d-de42c4ebf58f</guid>
      <pubDate>Tue, 22 Feb 2022 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d26fa37e-4956-44ec-922d-de42c4ebf58f.mp3" length="22890355" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company's bet on securing the future of messaging in the enterprise.</itunes:subtitle>
      <itunes:duration>19:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d26fa37e-4956-44ec-922d-de42c4ebf58f/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company&#39;s bet on securing the future of messaging in the enterprise.</p>]]>
      </description>
      <itunes:keywords>email security, messaging, teams, slack, whatsapp, email</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company&#39;s bet on securing the future of messaging in the enterprise.</p><p>Links:</p><ul><li><a title="About Egress" rel="nofollow" href="https://www.egress.com/about">About Egress</a></li><li><a title="Tony Pepper on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tony-pepper-023298">Tony Pepper on LinkedIn</a></li><li><a title="InfoSecurity Interview: Tony Pepper " rel="nofollow" href="https://www.infosecurity-magazine.com/interviews/tony-pepper-egress-acquisition/">InfoSecurity Interview: Tony Pepper </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Chief executive officer at Egress Tony Pepper joins the show to talk about entrepreneurship in the fast-paced age of modern computing, the state of e-mail security, and his company&#39;s bet on securing the future of messaging in the enterprise.</p><p>Links:</p><ul><li><a title="About Egress" rel="nofollow" href="https://www.egress.com/about">About Egress</a></li><li><a title="Tony Pepper on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tony-pepper-023298">Tony Pepper on LinkedIn</a></li><li><a title="InfoSecurity Interview: Tony Pepper " rel="nofollow" href="https://www.infosecurity-magazine.com/interviews/tony-pepper-egress-acquisition/">InfoSecurity Interview: Tony Pepper </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+UNYWIgDm</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+UNYWIgDm" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Microsoft's Justin Campbell on offensive security research</title>
      <link>http://securityconversations.fireside.fm/justin-campbell-microsoft</link>
      <guid isPermaLink="false">367c5dd6-8956-42a5-b804-887991a31ff3</guid>
      <pubDate>Sat, 08 Jan 2022 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/367c5dd6-8956-42a5-b804-887991a31ff3.mp3" length="23909293" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team's discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving 'shift-left' mindset and Redmond's ongoing work to reduce attack surfaces.</itunes:subtitle>
      <itunes:duration>27:16</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/367c5dd6-8956-42a5-b804-887991a31ff3/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p>]]>
      </description>
      <itunes:keywords>microsoft, windows, memory safety, shift-left, secure coding, zero-days</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Justin Campbell leads Microsoft’s Offensive Research and Security Engineering (MORSE) team. He joins the show to talk about his team&#39;s discovery of a SolarWinds in-the-wild zero-day, the never-ending stream of memory safety vulnerabilities, the evolving &#39;shift-left&#39; mindset and Redmond&#39;s ongoing work to reduce attack surfaces.</p><p>Links:</p><ul><li><a title="Microsoft Flags SolarWinds Serv-U 0-day exploit" rel="nofollow" href="https://www.microsoft.com/security/blog/2021/07/13/microsoft-discovers-threat-actor-targeting-solarwinds-serv-u-software-with-0-day-exploit/">Microsoft Flags SolarWinds Serv-U 0-day exploit</a></li><li><a title="SolarWinds Serv-U RCE advisory" rel="nofollow" href="https://www.solarwinds.com/trust-center/security-advisories/cve-2021-35211">SolarWinds Serv-U RCE advisory</a></li><li><a title="In-the-wild zero-day counter" rel="nofollow" href="https://www.zero-day.cz/">In-the-wild zero-day counter</a></li><li><a title="Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation" rel="nofollow" href="https://www.securityweek.com/microsoft-hacked-solarwinds-ftp-software-lacked-basic-anti-exploit-mitigation">Hacked SolarWinds Software Lacked Basic Anti-Exploit Mitigation</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+CuE9-gGi</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+CuE9-gGi" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Costin Raiu on the .gov mobile exploitation business</title>
      <link>http://securityconversations.fireside.fm/costin-raiu-mobile-exploitation</link>
      <guid isPermaLink="false">e7355605-c0fe-41c9-b55d-6f2775d8cc86</guid>
      <pubDate>Thu, 23 Dec 2021 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e7355605-c0fe-41c9-b55d-6f2775d8cc86.mp3" length="39704215" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Global director of Kaspersky's GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</itunes:subtitle>
      <itunes:duration>41:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e7355605-c0fe-41c9-b55d-6f2775d8cc86/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p>]]>
      </description>
      <itunes:keywords>zero-day, exploits, PSOAs, iOS malware, NSO Pegasus, Apple, Android</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p><p>Links:</p><ul><li><a title="Google Says NSO Pegasus Zero-Click &#39;Most Technically Sophisticated Exploit Ever Seen&#39;" rel="nofollow" href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen">Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit</a></li><li><a title="The Million Dollar Dissident: NSO Group&#39;s iPhone Zero-Days" rel="nofollow" href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">The Million Dollar Dissident: NSO Group's iPhone Zero-Days</a></li><li><a title="Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor" rel="nofollow" href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor</a></li><li><a title="Proliferation of Cyber Capabilities in International Arms Markets" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/">Proliferation of Cyber Capabilities in International Arms Markets</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Global director of Kaspersky&#39;s GReAT research team Costin Raiu returns to the show for an indepth discussion on the mobile surveillance business, the technically impressive FORCEDENTRY iOS exploit, the ethical questions facing exploit developers and the role of venture capitalists in the mobile malware ecosystem.</p><p>Links:</p><ul><li><a title="Google Says NSO Pegasus Zero-Click &#39;Most Technically Sophisticated Exploit Ever Seen&#39;" rel="nofollow" href="https://www.securityweek.com/google-says-nso-pegasus-zero-click-most-technically-sophisticated-exploit-ever-seen">Google Says NSO Pegasus Zero-Click 'Most Technically Sophisticated Exploit Ever Seen'</a></li><li><a title="Project Zero: A deep dive into an NSO zero-click iMessage exploit" rel="nofollow" href="https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html">Project Zero: A deep dive into an NSO zero-click iMessage exploit</a></li><li><a title="The Million Dollar Dissident: NSO Group&#39;s iPhone Zero-Days" rel="nofollow" href="https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/">The Million Dollar Dissident: NSO Group's iPhone Zero-Days</a></li><li><a title="Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor" rel="nofollow" href="https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/">Pegasus vs. Predator: Doubly-Infected iPhone Reveals Cytrox Mercenary Vendor</a></li><li><a title="Proliferation of Cyber Capabilities in International Arms Markets" rel="nofollow" href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/surveillance-technology-at-the-fair/">Proliferation of Cyber Capabilities in International Arms Markets</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+INZi8e5c</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+INZi8e5c" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Amanda Gorton, co-founder and CEO, Corellium</title>
      <link>http://securityconversations.fireside.fm/amanda-gorton-corellium</link>
      <guid isPermaLink="false">718dc2f2-0bd5-4d83-a950-cd8fc0f60b12</guid>
      <pubDate>Mon, 20 Dec 2021 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/718dc2f2-0bd5-4d83-a950-cd8fc0f60b12.mp3" length="44159937" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Corellium co-founder and chief executive Amanda Gorton joins the show to talk about raising $25 million in Series A funding, the market fit for device modeling and software virtualization products, the trials and tribulations of startup life, and the nuances of operating in the world of offensive security research.</itunes:subtitle>
      <itunes:duration>46:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/718dc2f2-0bd5-4d83-a950-cd8fc0f60b12/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Corellium co-founder and chief executive Amanda Gorton joins the show to talk about raising $25 million in Series A funding, the market fit for device modeling and software virtualization products, the trials and tribulations of startup life, and the nuances of operating in the world of offensive security research.</p>]]>
      </description>
      <itunes:keywords>corellium, startup, ios, emulation, virtualization</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Corellium co-founder and chief executive Amanda Gorton joins the show to talk about raising $25 million in Series A funding, the market fit for device modeling and software virtualization products, the trials and tribulations of startup life, and the nuances of operating in the world of offensive security research.</p><p>Links:</p><ul><li><a title="Corellium Secures $25M Series A Round" rel="nofollow" href="https://www.businesswire.com/news/home/20211216005045/en/Corellium-Secures-25M-Series-A-Round-Led-by-Paladin-Capital-Group-with-Participation-from-Cisco-Investments">Corellium Secures $25M Series A Round</a></li><li><a title="Corellium Lands $25 Million Investment for Virtualization Tech" rel="nofollow" href="https://www.securityweek.com/corellium-lands-25-million-investment-virtualization-tech">Corellium Lands $25 Million Investment for Virtualization Tech</a></li><li><a title="Corellium for Journalists" rel="nofollow" href="https://www.corellium.com/journalists">Corellium for Journalists</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Corellium co-founder and chief executive Amanda Gorton joins the show to talk about raising $25 million in Series A funding, the market fit for device modeling and software virtualization products, the trials and tribulations of startup life, and the nuances of operating in the world of offensive security research.</p><p>Links:</p><ul><li><a title="Corellium Secures $25M Series A Round" rel="nofollow" href="https://www.businesswire.com/news/home/20211216005045/en/Corellium-Secures-25M-Series-A-Round-Led-by-Paladin-Capital-Group-with-Participation-from-Cisco-Investments">Corellium Secures $25M Series A Round</a></li><li><a title="Corellium Lands $25 Million Investment for Virtualization Tech" rel="nofollow" href="https://www.securityweek.com/corellium-lands-25-million-investment-virtualization-tech">Corellium Lands $25 Million Investment for Virtualization Tech</a></li><li><a title="Corellium for Journalists" rel="nofollow" href="https://www.corellium.com/journalists">Corellium for Journalists</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+AUOm7qE2</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+AUOm7qE2" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Intel's Venky Venkateswaran on hardware-enabled security</title>
      <link>http://securityconversations.fireside.fm/venky-venkateswaran-intel</link>
      <guid isPermaLink="false">a0a3b03b-d1b1-4fb9-8735-8a6636b693fd</guid>
      <pubDate>Thu, 09 Sep 2021 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a0a3b03b-d1b1-4fb9-8735-8a6636b693fd.mp3" length="31052415" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Venky Venkateswaran works on client security and roadmap planning at Intel Corp.  On this episode of the podcast, Venky joins Ryan to talk about a reported surge in firmware attacks, Intel's ongoing investments in cybersecurity, the importance of transparency and open documentation, and the company's push to fight ransomware with its flagship TDT (Threat Detection Technology).</itunes:subtitle>
      <itunes:duration>35:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a0a3b03b-d1b1-4fb9-8735-8a6636b693fd/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Venky Venkateswaran works on client security and roadmap planning at Intel Corp.  On this episode of the podcast, Venky joins Ryan to talk about a reported surge in firmware attacks, Intel&#39;s ongoing investments in cybersecurity, the importance of transparency and open documentation, and the company&#39;s push to fight ransomware with its flagship TDT (Threat Detection Technology).</p>]]>
      </description>
      <itunes:keywords>intel, hardware, firmware, client security,  ransomware, threat detection, CET, memory safety</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Venky Venkateswaran works on client security and roadmap planning at Intel Corp.  On this episode of the podcast, Venky joins Ryan to talk about a reported surge in firmware attacks, Intel&#39;s ongoing investments in cybersecurity, the importance of transparency and open documentation, and the company&#39;s push to fight ransomware with its flagship TDT (Threat Detection Technology).</p><p>Links:</p><ul><li><a title="&gt; Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">&gt; Extending SBOMs to the firmware layer</a></li><li><a title="&gt; Hardware Based Security for Business (Intel)" rel="nofollow" href="https://www.intel.com/content/www/us/en/business/enterprise-computers/hardware-security.html">&gt; Hardware Based Security for Business (Intel)</a></li><li><a title="&gt; Alex Matrosov on the state of firmware security" rel="nofollow" href="https://securityconversations.com/episode/alex-matrosov-on-the-state-of-security-at-the-firmware-layer/">&gt; Alex Matrosov on the state of firmware security</a></li><li><a title="&gt; Microsoft Launches JIT-Free &#39;Super Duper Secure Mode&#39; Edge Browser Experiment" rel="nofollow" href="https://www.securityweek.com/microsoft-launches-jit-free-super-duper-secure-mode-edge-browser-experiment">&gt; Microsoft Launches JIT-Free 'Super Duper Secure Mode' Edge Browser Experiment</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Venky Venkateswaran works on client security and roadmap planning at Intel Corp.  On this episode of the podcast, Venky joins Ryan to talk about a reported surge in firmware attacks, Intel&#39;s ongoing investments in cybersecurity, the importance of transparency and open documentation, and the company&#39;s push to fight ransomware with its flagship TDT (Threat Detection Technology).</p><p>Links:</p><ul><li><a title="&gt; Extending SBOMs to the firmware layer" rel="nofollow" href="https://securityconversations.com/extending-sboms-to-the-firmware-layer/">&gt; Extending SBOMs to the firmware layer</a></li><li><a title="&gt; Hardware Based Security for Business (Intel)" rel="nofollow" href="https://www.intel.com/content/www/us/en/business/enterprise-computers/hardware-security.html">&gt; Hardware Based Security for Business (Intel)</a></li><li><a title="&gt; Alex Matrosov on the state of firmware security" rel="nofollow" href="https://securityconversations.com/episode/alex-matrosov-on-the-state-of-security-at-the-firmware-layer/">&gt; Alex Matrosov on the state of firmware security</a></li><li><a title="&gt; Microsoft Launches JIT-Free &#39;Super Duper Secure Mode&#39; Edge Browser Experiment" rel="nofollow" href="https://www.securityweek.com/microsoft-launches-jit-free-super-duper-secure-mode-edge-browser-experiment">&gt; Microsoft Launches JIT-Free 'Super Duper Secure Mode' Edge Browser Experiment</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+PYx4JIsj</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+PYx4JIsj" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Sounil Yu on SBOMs, software supply chain security</title>
      <link>http://securityconversations.fireside.fm/sounil-yu-sboms-supply-chain-security</link>
      <guid isPermaLink="false">ca890116-c6d7-4107-8c9d-b4b64ed28927</guid>
      <pubDate>Tue, 13 Jul 2021 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ca890116-c6d7-4107-8c9d-b4b64ed28927.mp3" length="58362999" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsored by SecurityWeek.com

JupiterOne CISO Sounil Yu joins the show to sift through the noise and explain the value of SBOMs (software bill of materials), the U.S. government's response to software supply chain security gaps, and what every buyer and seller should be doing to prepare for major changes in the ecosystem.</itunes:subtitle>
      <itunes:duration>48:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/ca890116-c6d7-4107-8c9d-b4b64ed28927/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Episode sponsored by SecurityWeek.com</p>

<p>JupiterOne CISO Sounil Yu joins the show to sift through the noise and explain the value of SBOMs (software bill of materials), the U.S. government&#39;s response to software supply chain security gaps, and what every buyer and seller should be doing to prepare for major changes in the ecosystem.</p>]]>
      </description>
      <itunes:keywords>sbom, supply chain, open-source</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Episode sponsored by SecurityWeek.com</p>

<p>JupiterOne CISO Sounil Yu joins the show to sift through the noise and explain the value of SBOMs (software bill of materials), the U.S. government&#39;s response to software supply chain security gaps, and what every buyer and seller should be doing to prepare for major changes in the ecosystem.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Episode sponsored by SecurityWeek.com</p>

<p>JupiterOne CISO Sounil Yu joins the show to sift through the noise and explain the value of SBOMs (software bill of materials), the U.S. government&#39;s response to software supply chain security gaps, and what every buyer and seller should be doing to prepare for major changes in the ecosystem.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ovU6VHEV</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ovU6VHEV" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Algirde Pipikaite, Centre for Cybersecurity, World Economic Forum</title>
      <link>http://securityconversations.fireside.fm/algirde-pipikaite-world-economic-forum</link>
      <guid isPermaLink="false">af2bae60-6a2d-49d3-856d-5cabb850cfc1</guid>
      <pubDate>Tue, 06 Jul 2021 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/af2bae60-6a2d-49d3-856d-5cabb850cfc1.mp3" length="26866644" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Episode sponsored by MongoDB.com.

Algirde Pipikaite, the project lead of the Governance and Policy team at the Center for Cybersecurity at the World Economic Forum, joins the podcast to discuss her work to bridge the gap between cybersecurity experts and decision makers.   We chat about communicating risk to different audiences, cybersecurity as a business enabler, and the need for more global private-public collaboration.
Algirde Pipikaite, the project lead of the Governance and Policy team at the Center for Cybersecurity at the World Economic Forum, joins the podcast to discuss her work to bridge the gap between cybersecurity experts and decision makers at the highest levels to reinforce the importance of cybersecurity as a key strategic priority.</itunes:subtitle>
      <itunes:duration>40:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/af2bae60-6a2d-49d3-856d-5cabb850cfc1/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Episode sponsored by MongoDB.com.</p>

<p>Algirde Pipikaite, the project lead of the Governance and Policy team at the Center for Cybersecurity at the World Economic Forum, joins the podcast to discuss her work to bridge the gap between cybersecurity experts and decision makers.   We chat about communicating risk to different audiences, cybersecurity as a business enabler, and the need for more global private-public collaboration.</p>]]>
      </description>
      <itunes:keywords>ciso, risk management, Davos</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Episode sponsored by MongoDB.com.</p>

<p>Algirde Pipikaite, the project lead of the Governance and Policy team at the Center for Cybersecurity at the World Economic Forum, joins the podcast to discuss her work to bridge the gap between cybersecurity experts and decision makers.   We chat about communicating risk to different audiences, cybersecurity as a business enabler, and the need for more global private-public collaboration.</p><p>Links:</p><ul><li><a title="Algirde Pipikaite Profile" rel="nofollow" href="https://www.weforum.org/agenda/authors/algirde-pipikaite">Algirde Pipikaite Profile</a></li><li><a title="Developing the Future of Policy for Cybersecurity" rel="nofollow" href="https://www.hks.harvard.edu/educational-programs/executive-education/executive-education-alumni/executive-education-alumni-13">Developing the Future of Policy for Cybersecurity</a></li><li><a title="CNBC: Cyberattacks on the rise amid coronavirus crisis, WEF expert says" rel="nofollow" href="https://www.cnbc.com/video/2020/05/22/cyberattacks-on-the-rise-amid-coronavirus-crisis-wef-expert-says.html">CNBC: Cyberattacks on the rise amid coronavirus crisis, WEF expert says</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Episode sponsored by MongoDB.com.</p>

<p>Algirde Pipikaite, the project lead of the Governance and Policy team at the Center for Cybersecurity at the World Economic Forum, joins the podcast to discuss her work to bridge the gap between cybersecurity experts and decision makers.   We chat about communicating risk to different audiences, cybersecurity as a business enabler, and the need for more global private-public collaboration.</p><p>Links:</p><ul><li><a title="Algirde Pipikaite Profile" rel="nofollow" href="https://www.weforum.org/agenda/authors/algirde-pipikaite">Algirde Pipikaite Profile</a></li><li><a title="Developing the Future of Policy for Cybersecurity" rel="nofollow" href="https://www.hks.harvard.edu/educational-programs/executive-education/executive-education-alumni/executive-education-alumni-13">Developing the Future of Policy for Cybersecurity</a></li><li><a title="CNBC: Cyberattacks on the rise amid coronavirus crisis, WEF expert says" rel="nofollow" href="https://www.cnbc.com/video/2020/05/22/cyberattacks-on-the-rise-amid-coronavirus-crisis-wef-expert-says.html">CNBC: Cyberattacks on the rise amid coronavirus crisis, WEF expert says</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+GWU4ouf2</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+GWU4ouf2" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Josh Schwartz on red-teaming and proactive security engineering</title>
      <link>http://securityconversations.fireside.fm/josh-schwartz-verizon-media-yahoo</link>
      <guid isPermaLink="false">1aefd66d-be45-405a-a030-d0e2d9a9e51e</guid>
      <pubDate>Fri, 18 Jun 2021 10:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1aefd66d-be45-405a-a030-d0e2d9a9e51e.mp3" length="30521046" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Josh Schwartz, aka FuzzyNop, oversees offensive security, product engineering, and security engagement functions at Verizon Media (soon to be Yahoo).   He shares insights on red-teaming, overcoming the adversarial relationship between red/blue teams. chasing the "feeling" of being secure, and why there's a need for more empathy in cybersecurity. 

(Episode sponsored by Eclypsium)</itunes:subtitle>
      <itunes:duration>37:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1aefd66d-be45-405a-a030-d0e2d9a9e51e/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Josh Schwartz, aka FuzzyNop, oversees offensive security, product engineering, and security engagement functions at Verizon Media (soon to be Yahoo).   He shares insights on red-teaming, overcoming the adversarial relationship between red/blue teams. chasing the &quot;feeling&quot; of being secure, and why there&#39;s a need for more empathy in cybersecurity. </p>

<p>(<a href="https://eclypsium.com" rel="nofollow">Episode sponsored by Eclypsium</a>)</p>]]>
      </description>
      <itunes:keywords>red team, blue team, offense vs defense, simulated hacking attacks</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Josh Schwartz, aka FuzzyNop, oversees offensive security, product engineering, and security engagement functions at Verizon Media (soon to be Yahoo).   He shares insights on red-teaming, overcoming the adversarial relationship between red/blue teams. chasing the &quot;feeling&quot; of being secure, and why there&#39;s a need for more empathy in cybersecurity. </p>

<p>(<a href="https://eclypsium.com" rel="nofollow">Episode sponsored by Eclypsium</a>)</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Josh Schwartz, aka FuzzyNop, oversees offensive security, product engineering, and security engagement functions at Verizon Media (soon to be Yahoo).   He shares insights on red-teaming, overcoming the adversarial relationship between red/blue teams. chasing the &quot;feeling&quot; of being secure, and why there&#39;s a need for more empathy in cybersecurity. </p>

<p>(<a href="https://eclypsium.com" rel="nofollow">Episode sponsored by Eclypsium</a>)</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+6QZON9tU</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+6QZON9tU" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Michael Laventure, threat detection and response, Netflix</title>
      <link>http://securityconversations.fireside.fm/michael-laventure-netflix-threat-intel</link>
      <guid isPermaLink="false">96f77b2a-f94c-4b25-9870-8652ddaffaa0</guid>
      <pubDate>Thu, 10 Jun 2021 08:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/96f77b2a-f94c-4b25-9870-8652ddaffaa0.mp3" length="23563004" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to "do security better."   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</itunes:subtitle>
      <itunes:duration>30:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/96f77b2a-f94c-4b25-9870-8652ddaffaa0/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to &quot;do security better.&quot;   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</p>]]>
      </description>
      <itunes:keywords>threat-intel, threat-hunting, supply chain</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to &quot;do security better.&quot;   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Netflix threat detection and response practitioner Michael Laventure joins the show to talk about a simple goal to &quot;do security better.&quot;   We discuss a transition from .gov security work to the fast pace of Silicon Valley, the culture clashes that can make life difficult, the value of threat-intelligence to a modern security program, and why we should all be optimistic about the future of cybersecurity.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Oqs0IAHO</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Oqs0IAHO" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Google's Heather Adkins on defenders playing the long game</title>
      <link>http://securityconversations.fireside.fm/heather-adkins-google-security</link>
      <guid isPermaLink="false">97a0eeb7-c6f6-4757-9cf5-bbd21380223f</guid>
      <pubDate>Wed, 26 May 2021 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/97a0eeb7-c6f6-4757-9cf5-bbd21380223f.mp3" length="32532700" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the "long-game," the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</itunes:subtitle>
      <itunes:duration>38:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/97a0eeb7-c6f6-4757-9cf5-bbd21380223f/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
      </description>
      <itunes:keywords>google, zero-trust, chrome</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Founding-member of the Google security team Heather Adkins joins the conversation to stress the importance of defenders playing the &quot;long-game,&quot; the need for meaningful culture-change among security leaders, the expansion of zero-trust beyond identities and devices, and some thoughts on the future of electronic voting.</p>

<p><strong>Sponsored by Eclypsium:</strong><br>
Eclypsium ships an enterprise device platform that provides visibility and mitigation for malicious activity all the way down to the firmware and hardware level. Think of it as one platform to discover, inventory, assess risk, patch, and detect compromises and supply chain breaches across your entire fleet of devices.  <a href="https://eclypsium.com" rel="nofollow">Request a demo at Eclypsium.com</a>.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+kMI0cwx3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+kMI0cwx3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Collin Greene, head of product security, Facebook</title>
      <link>http://securityconversations.fireside.fm/collin-greene-facebook-product-security</link>
      <guid isPermaLink="false">5ca053c8-a041-4288-add6-49c3c7f84bbd</guid>
      <pubDate>Tue, 25 May 2021 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5ca053c8-a041-4288-add6-49c3c7f84bbd.mp3" length="55918822" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why "shift-left" should be the priority for every defender.</itunes:subtitle>
      <itunes:duration>1:01:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5ca053c8-a041-4288-add6-49c3c7f84bbd/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p>]]>
      </description>
      <itunes:keywords>bug bounties, pen-testing, security assessments, web app security, product security, facebook</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p><p>Links:</p><ul><li><a title="Six Buckets of Product Security" rel="nofollow" href="http://collingreene.com/6_buckets_of_prodsec.html">Six Buckets of Product Security</a></li><li><a title="Outcomes &gt; Bugs" rel="nofollow" href="http://collingreene.com/outcomes_over_bugs.html">Outcomes &gt; Bugs</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Facebook product security leader Collin Greene joins the show to discuss philosophies around securing code at scale, the pros and cons of relying on bug-bounty programs, the humbling lessons from being on the wrong side of a malicious hack, and why &quot;shift-left&quot; should be the priority for every defender.</p><p>Links:</p><ul><li><a title="Six Buckets of Product Security" rel="nofollow" href="http://collingreene.com/6_buckets_of_prodsec.html">Six Buckets of Product Security</a></li><li><a title="Outcomes &gt; Bugs" rel="nofollow" href="http://collingreene.com/outcomes_over_bugs.html">Outcomes &gt; Bugs</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+xuN_Tzta</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+xuN_Tzta" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Alex Matrosov on the state of security at the firmware layer</title>
      <link>http://securityconversations.fireside.fm/alex-matrosov-firmware-security</link>
      <guid isPermaLink="false">b93843f4-0c2b-4482-b8aa-c39e2fb7c02a</guid>
      <pubDate>Sun, 23 May 2021 11:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b93843f4-0c2b-4482-b8aa-c39e2fb7c02a.mp3" length="44900087" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Former head of offensive security research at NVIDIA Alex Matrosov joins the show to talk about the state of security at the firmware layer, the need for specialized reverse engineering skills, the limits of bug-bounty programs for hardware research, and the future of advanced malware analysis.</itunes:subtitle>
      <itunes:duration>58:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b93843f4-0c2b-4482-b8aa-c39e2fb7c02a/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Former head of offensive security research at NVIDIA Alex Matrosov joins the show to talk about the state of security at the firmware layer, the need for specialized reverse engineering skills, the limits of bug-bounty programs for hardware research, and the future of advanced malware analysis.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Former head of offensive security research at NVIDIA Alex Matrosov joins the show to talk about the state of security at the firmware layer, the need for specialized reverse engineering skills, the limits of bug-bounty programs for hardware research, and the future of advanced malware analysis.</p><p>Links:</p><ul><li><a title="Alex Matrosov on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/matrosov/">Alex Matrosov on LinkedIn</a></li><li><a title="Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy" rel="nofollow" href="https://www.slideshare.net/matrosov/modern-bootkit-trends-bypassing-kernelmode-signing-policy">Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy</a></li><li><a title="Bootkit threats: In-depth reverse engineering &amp; defense" rel="nofollow" href="https://www.slideshare.net/matrosov/bootkit-threats-indepth-reverse-engineering-defense">Bootkit threats: In-depth reverse engineering &amp; defense</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Former head of offensive security research at NVIDIA Alex Matrosov joins the show to talk about the state of security at the firmware layer, the need for specialized reverse engineering skills, the limits of bug-bounty programs for hardware research, and the future of advanced malware analysis.</p><p>Links:</p><ul><li><a title="Alex Matrosov on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/matrosov/">Alex Matrosov on LinkedIn</a></li><li><a title="Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy" rel="nofollow" href="https://www.slideshare.net/matrosov/modern-bootkit-trends-bypassing-kernelmode-signing-policy">Modern Bootkit Trends: Bypassing Kernel-Mode Signing Policy</a></li><li><a title="Bootkit threats: In-depth reverse engineering &amp; defense" rel="nofollow" href="https://www.slideshare.net/matrosov/bootkit-threats-indepth-reverse-engineering-defense">Bootkit threats: In-depth reverse engineering &amp; defense</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ad8rnWa3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ad8rnWa3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Charles Nwatu, Security Technology &amp; Risk, Netflix</title>
      <link>http://securityconversations.fireside.fm/charles-nwatu-netflix</link>
      <guid isPermaLink="false">17902758-1dc9-4e4c-83cc-bbc3f9271eb4</guid>
      <pubDate>Tue, 11 May 2021 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/17902758-1dc9-4e4c-83cc-bbc3f9271eb4.mp3" length="27630724" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Charles Nwatu is an engineering manager in Netflix's Security, Technology Assurance &amp; Risk organization.  He joins Ryan on the show to talk about a career pivot from U.S. gov service into cybersecurity in Silicon Valley, the exciting parts of compliance and risk management, and why newcomers should consider jobs in SOCs to kickstart security careers.</itunes:subtitle>
      <itunes:duration>30:25</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/17902758-1dc9-4e4c-83cc-bbc3f9271eb4/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Charles Nwatu is an engineering manager in Netflix&#39;s Security, Technology Assurance &amp; Risk organization.  He joins Ryan on the show to talk about a career pivot from U.S. gov service into cybersecurity in Silicon Valley, the exciting parts of compliance and risk management, and why newcomers should consider jobs in SOCs to kickstart security careers.</p>]]>
      </description>
      <itunes:keywords>security, privacy, compliance, risk management, cybersecurity, business continuity, career guidance</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Charles Nwatu is an engineering manager in Netflix&#39;s Security, Technology Assurance &amp; Risk organization.  He joins Ryan on the show to talk about a career pivot from U.S. gov service into cybersecurity in Silicon Valley, the exciting parts of compliance and risk management, and why newcomers should consider jobs in SOCs to kickstart security careers.</p><p>Links:</p><ul><li><a title="Charles Nwatu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/cnwatu/">Charles Nwatu on LinkedIn</a> &mdash; Corporate Security &amp; Security, Technology Assurance &amp; Risk, Netflix</li><li><a title="How Netflix’s Charles Nwatu Turned His Desire to Help People Into a Career in Information Security" rel="nofollow" href="https://peopleofcolorintech.com/interview/how-netflixs-charles-nwatu-turned-his-desire-to-help-people-into-a-career-in-information-security/">How Netflix’s Charles Nwatu Turned His Desire to Help People Into a Career in Information Security</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Charles Nwatu is an engineering manager in Netflix&#39;s Security, Technology Assurance &amp; Risk organization.  He joins Ryan on the show to talk about a career pivot from U.S. gov service into cybersecurity in Silicon Valley, the exciting parts of compliance and risk management, and why newcomers should consider jobs in SOCs to kickstart security careers.</p><p>Links:</p><ul><li><a title="Charles Nwatu on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/cnwatu/">Charles Nwatu on LinkedIn</a> &mdash; Corporate Security &amp; Security, Technology Assurance &amp; Risk, Netflix</li><li><a title="How Netflix’s Charles Nwatu Turned His Desire to Help People Into a Career in Information Security" rel="nofollow" href="https://peopleofcolorintech.com/interview/how-netflixs-charles-nwatu-turned-his-desire-to-help-people-into-a-career-in-information-security/">How Netflix’s Charles Nwatu Turned His Desire to Help People Into a Career in Information Security</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+tDaicVPS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+tDaicVPS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Doug Madory on the mysterious AS8003 global routing story</title>
      <link>http://securityconversations.fireside.fm/doug-madory-mystery-as8003</link>
      <guid isPermaLink="false">3e7cdf29-565f-4a2b-bac6-de85ff8e7c2a</guid>
      <pubDate>Thu, 29 Apr 2021 08:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3e7cdf29-565f-4a2b-bac6-de85ff8e7c2a.mp3" length="22227722" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Director of Internet Analyis at Kentik, Doug Madory, joins the podcast to shed light on the mysterious appearance of unused IPv4 space belonging to the US Department of Defense: the strange connection to a Florida company now managing the world's largest honeypot; the odd Inauguration Day timing of this discovery;, and why enterprise network defenders should pay very close attention.</itunes:subtitle>
      <itunes:duration>29:20</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3e7cdf29-565f-4a2b-bac6-de85ff8e7c2a/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Director of Internet Analyis at Kentik, Doug Madory, joins the podcast to shed light on the mysterious appearance of unused IPv4 space belonging to the US Department of Defense: the strange connection to a Florida company now managing the world&#39;s largest honeypot; the odd Inauguration Day timing of this discovery;, and why enterprise network defenders should pay very close attention.</p>]]>
      </description>
      <itunes:keywords>as8003, global routing, internet backbone, ipv4, BGP hijacking</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Director of Internet Analyis at Kentik, Doug Madory, joins the podcast to shed light on the mysterious appearance of unused IPv4 space belonging to the US Department of Defense: the strange connection to a Florida company now managing the world&#39;s largest honeypot; the odd Inauguration Day timing of this discovery;, and why enterprise network defenders should pay very close attention.</p><p>Links:</p><ul><li><a title="The Mystery of AS8003" rel="nofollow" href="https://www.kentik.com/blog/the-mystery-of-as8003/">The Mystery of AS8003</a> &mdash; On January 20, 2021, a great mystery appeared in the internet’s global routing table. An entity that hadn’t been heard from in over a decade began announcing large swaths of formerly unused IPv4 address space belonging to the U.S. Department of Defense. </li><li><a title="Pentagon explains odd transfer of 175 million IP addresses to obscure company | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2021/04/pentagon-explains-odd-transfer-of-175-million-ip-addresses-to-obscure-company/">Pentagon explains odd transfer of 175 million IP addresses to obscure company | Ars Technica</a> &mdash; "Did someone at the Defense Department sell off part of the military's vast collection of sought-after IP addresses as Trump left office? Had the Pentagon finally acted on demands to unload the billions of dollars worth of IP address space the military has been sitting on, largely unused, for decades?"</li><li><a title="AS8003 GRS-DOD" rel="nofollow" href="https://bgp.he.net/AS8003#_whois">AS8003 GRS-DOD</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Director of Internet Analyis at Kentik, Doug Madory, joins the podcast to shed light on the mysterious appearance of unused IPv4 space belonging to the US Department of Defense: the strange connection to a Florida company now managing the world&#39;s largest honeypot; the odd Inauguration Day timing of this discovery;, and why enterprise network defenders should pay very close attention.</p><p>Links:</p><ul><li><a title="The Mystery of AS8003" rel="nofollow" href="https://www.kentik.com/blog/the-mystery-of-as8003/">The Mystery of AS8003</a> &mdash; On January 20, 2021, a great mystery appeared in the internet’s global routing table. An entity that hadn’t been heard from in over a decade began announcing large swaths of formerly unused IPv4 address space belonging to the U.S. Department of Defense. </li><li><a title="Pentagon explains odd transfer of 175 million IP addresses to obscure company | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2021/04/pentagon-explains-odd-transfer-of-175-million-ip-addresses-to-obscure-company/">Pentagon explains odd transfer of 175 million IP addresses to obscure company | Ars Technica</a> &mdash; "Did someone at the Defense Department sell off part of the military's vast collection of sought-after IP addresses as Trump left office? Had the Pentagon finally acted on demands to unload the billions of dollars worth of IP address space the military has been sitting on, largely unused, for decades?"</li><li><a title="AS8003 GRS-DOD" rel="nofollow" href="https://bgp.he.net/AS8003#_whois">AS8003 GRS-DOD</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+zKsmmHY9</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+zKsmmHY9" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Crossbeam CISO Chris Castaldo on securing the start-up</title>
      <link>http://securityconversations.fireside.fm/chris-castaldo-ciso-crossbeam</link>
      <guid isPermaLink="false">36c84816-ee62-408e-a68d-a928e4fb720c</guid>
      <pubDate>Fri, 23 Apr 2021 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/36c84816-ee62-408e-a68d-a928e4fb720c.mp3" length="28911630" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Chris Castaldo has a fascinating career in cybersecurity.  A U.S. army veteran who dabbled in tech during the early 2000s dot-com boom before settling on security, Castaldo is now CISO at Crossbeam and a decision-maker with a bird's eye view into how the should be protected.  

Castaldo joins Ryan on the show to talk about his new book on securing the startup, why he's the rare CISO that loves security vendor briefings and demos, and his vision of the CISO's top priorities.</itunes:subtitle>
      <itunes:duration>32:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/36c84816-ee62-408e-a68d-a928e4fb720c/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p><a href="https://eclypsium.com" rel="nofollow">Sponsored by Eclypsium</a></p>

<p>Chris Castaldo has a fascinating career in cybersecurity.  A U.S. army veteran who dabbled in tech during the early 2000s dot-com boom before settling on security, Castaldo is now CISO at Crossbeam and a decision-maker with a bird&#39;s eye view into how the should be protected.  </p>

<p>Castaldo joins Ryan on the show to talk about his new book on securing the startup, why he&#39;s the rare CISO that loves security vendor briefings and demos, and his vision of the CISO&#39;s top priorities.</p>]]>
      </description>
      <itunes:keywords>security, privacy, compliance, startup, career guidance</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><a href="https://eclypsium.com" rel="nofollow">Sponsored by Eclypsium</a></p>

<p>Chris Castaldo has a fascinating career in cybersecurity.  A U.S. army veteran who dabbled in tech during the early 2000s dot-com boom before settling on security, Castaldo is now CISO at Crossbeam and a decision-maker with a bird&#39;s eye view into how the should be protected.  </p>

<p>Castaldo joins Ryan on the show to talk about his new book on securing the startup, why he&#39;s the rare CISO that loves security vendor briefings and demos, and his vision of the CISO&#39;s top priorities.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><a href="https://eclypsium.com" rel="nofollow">Sponsored by Eclypsium</a></p>

<p>Chris Castaldo has a fascinating career in cybersecurity.  A U.S. army veteran who dabbled in tech during the early 2000s dot-com boom before settling on security, Castaldo is now CISO at Crossbeam and a decision-maker with a bird&#39;s eye view into how the should be protected.  </p>

<p>Castaldo joins Ryan on the show to talk about his new book on securing the startup, why he&#39;s the rare CISO that loves security vendor briefings and demos, and his vision of the CISO&#39;s top priorities.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+kJWmDlGW</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+kJWmDlGW" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Shubs Shah on finding riches (and lessons) from bug bounty hacking</title>
      <link>http://securityconversations.fireside.fm/shuhbam-shah-assetnote</link>
      <guid isPermaLink="false">8ca9fe4a-f12f-401f-80d8-f42f8c1e7504</guid>
      <pubDate>Tue, 20 Apr 2021 11:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/8ca9fe4a-f12f-401f-80d8-f42f8c1e7504.mp3" length="38562676" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle> Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</itunes:subtitle>
      <itunes:duration>52:49</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/8ca9fe4a-f12f-401f-80d8-f42f8c1e7504/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p>]]>
      </description>
      <itunes:keywords>bug bounties, pen-testing, security assessments, web app security, continuous testing, h2c smuggling</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p><p>Links:</p><ul><li><a title="Assetnote" rel="nofollow" href="https://assetnote.io">Assetnote</a></li><li><a title="Shubs Shah: Hacking on Bug Bounties for Four Years" rel="nofollow" href="https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/">Shubs Shah: Hacking on Bug Bounties for Four Years</a></li><li><a title="High frequency security: 120 days, 120 bugs" rel="nofollow" href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">High frequency security: 120 days, 120 bugs</a></li><li><a title="h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)" rel="nofollow" href="https://labs.bishopfox.com/tech-blog/h2c-smuggling-request-smuggling-via-http/2-cleartext-h2c">h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)</a></li><li><a title="H2C Smuggling in the Wild" rel="nofollow" href="https://blog.assetnote.io/2021/03/18/h2c-smuggling/">H2C Smuggling in the Wild</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Shubham Shah is a brilliant hacker who quit his pen-testing job to hack for cash in bug-bounty programs.  He quickly mastered the game of automating automating pre-breach reconnaissance and zero in on common webapp programming and configuration errors.   Shubs, now co-founder at Assetnote, joined Ryan on the show to talk about  the stressful life of a fulltime bug-bounty hunter, advancements in web app security defense, and how automation is completely rewriting the bug-discovery business.</p><p>Links:</p><ul><li><a title="Assetnote" rel="nofollow" href="https://assetnote.io">Assetnote</a></li><li><a title="Shubs Shah: Hacking on Bug Bounties for Four Years" rel="nofollow" href="https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/">Shubs Shah: Hacking on Bug Bounties for Four Years</a></li><li><a title="High frequency security: 120 days, 120 bugs" rel="nofollow" href="https://shubs.io/high-frequency-security-bug-hunting-120-days-120-bugs/">High frequency security: 120 days, 120 bugs</a></li><li><a title="h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)" rel="nofollow" href="https://labs.bishopfox.com/tech-blog/h2c-smuggling-request-smuggling-via-http/2-cleartext-h2c">h2c Smuggling: Request Smuggling Via HTTP/2 Cleartext (h2c)</a></li><li><a title="H2C Smuggling in the Wild" rel="nofollow" href="https://blog.assetnote.io/2021/03/18/h2c-smuggling/">H2C Smuggling in the Wild</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+-f4NCBUO</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+-f4NCBUO" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Fahmida Rashid, Executive Editor, VentureBeat</title>
      <link>http://securityconversations.fireside.fm/fahmida-rashid-venturebeat</link>
      <guid isPermaLink="false">e3d22755-cc83-43aa-b67d-8003ad468a6b</guid>
      <pubDate>Fri, 09 Apr 2021 10:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e3d22755-cc83-43aa-b67d-8003ad468a6b.mp3" length="31693302" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Newly appointed Executive Editor at VentureBeat Fahmida Rashid joins the show to talk about her introduction to computer networking in school, her winding path into cybersecurity journalism, the security stories worth telling, the venture capital ecosystem, and the surge in unicorn cybersecurity startups.</itunes:subtitle>
      <itunes:duration>37:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e3d22755-cc83-43aa-b67d-8003ad468a6b/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Newly appointed Executive Editor at VentureBeat Fahmida Rashid joins the show to talk about her introduction to computer networking in school, her winding path into cybersecurity journalism, the security stories worth telling, the venture capital ecosystem, and the surge in unicorn cybersecurity startups.</p>]]>
      </description>
      <itunes:keywords>journalism, story-telling, writing, news gathering, venture capital, investments</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Newly appointed Executive Editor at VentureBeat Fahmida Rashid joins the show to talk about her introduction to computer networking in school, her winding path into cybersecurity journalism, the security stories worth telling, the venture capital ecosystem, and the surge in unicorn cybersecurity startups.</p><p>Links:</p><ul><li><a title="Follow Fahmida on Twitter" rel="nofollow" href="https://twitter.com/FYRashid">Follow Fahmida on Twitter</a></li><li><a title="Fahmida Rashid on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/fyrashid/">Fahmida Rashid on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Newly appointed Executive Editor at VentureBeat Fahmida Rashid joins the show to talk about her introduction to computer networking in school, her winding path into cybersecurity journalism, the security stories worth telling, the venture capital ecosystem, and the surge in unicorn cybersecurity startups.</p><p>Links:</p><ul><li><a title="Follow Fahmida on Twitter" rel="nofollow" href="https://twitter.com/FYRashid">Follow Fahmida on Twitter</a></li><li><a title="Fahmida Rashid on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/fyrashid/">Fahmida Rashid on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+3kXYnS8T</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+3kXYnS8T" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Microsoft's David Weston on the surge in firmware attacks</title>
      <link>http://securityconversations.fireside.fm/david-weston-microsoft-windows</link>
      <guid isPermaLink="false">9589ad97-fc83-458f-8781-44ce8eb8bbf3</guid>
      <pubDate>Tue, 06 Apr 2021 11:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9589ad97-fc83-458f-8781-44ce8eb8bbf3.mp3" length="35474013" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Microsoft's David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   

As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the 'invisible' layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</itunes:subtitle>
      <itunes:duration>33:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9589ad97-fc83-458f-8781-44ce8eb8bbf3/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Microsoft&#39;s David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   </p>

<p>As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the &#39;invisible&#39; layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</p>]]>
      </description>
      <itunes:keywords>microsoft, firmware, uefi, bios, windows os, eclypsium, IOT, security updates</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Microsoft&#39;s David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   </p>

<p>As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the &#39;invisible&#39; layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Microsoft&#39;s David Weston joins Ryan on the show to discuss a new report that shows 83% of organizations have  been hit by a firmware attack in the last two years.   </p>

<p>As businesses continue to under-invest in resources to prevent firmware attacks, Weston warns about the inevitability of advanced attacks at the &#39;invisible&#39; layer,  the absence of skills and tools to find malicious activity in firmware, the nightmare of navigating the patching treadmill, and exciting tech innovation in the space.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+0j8-M0Al</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+0j8-M0Al" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Lena Smart, CISO, MongoDB</title>
      <link>http://securityconversations.fireside.fm/lena-smart-ciso-mongodb</link>
      <guid isPermaLink="false">ccdec073-caf0-49bc-80f3-42edab3a1c04</guid>
      <pubDate>Fri, 02 Apr 2021 04:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ccdec073-caf0-49bc-80f3-42edab3a1c04.mp3" length="44804932" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>At  age16, Lena Smart finished high school and went into the workforce.   At the time, a university degree and advanced education was not available to her in a single-parent household in Scotland.  Today, she is CISO of MongoDB, a $16 billion company with thousands of employees around the world and is leading the discussion on education and talent-identification in cybersecurity.

Lena joins Ryan on the show to tell stories from her childhood, the decisions that carved a path for a successful career in security, the anguish of imposter syndrome, the joys of building a modern security program, and impressive tech innovation moving the security needle.</itunes:subtitle>
      <itunes:duration>54:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/ccdec073-caf0-49bc-80f3-42edab3a1c04/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>At  age 16, Lena Smart finished high school and went into the workforce.   At the time, a university degree and advanced education were not available to her in a single-parent household in Scotland.  Today, she is CISO of MongoDB, a $16 billion company with thousands of employees around the world and she is a leading voice on education and talent-identification in cybersecurity.</p>

<p>Lena joins Ryan on the show to tell stories from her childhood, the decisions that carved a path for a successful career in security, the anguish of imposter syndrome, the joys of building a modern security program, and impressive tech innovation moving the security needle.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>At  age 16, Lena Smart finished high school and went into the workforce.   At the time, a university degree and advanced education were not available to her in a single-parent household in Scotland.  Today, she is CISO of MongoDB, a $16 billion company with thousands of employees around the world and she is a leading voice on education and talent-identification in cybersecurity.</p>

<p>Lena joins Ryan on the show to tell stories from her childhood, the decisions that carved a path for a successful career in security, the anguish of imposter syndrome, the joys of building a modern security program, and impressive tech innovation moving the security needle.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>At  age 16, Lena Smart finished high school and went into the workforce.   At the time, a university degree and advanced education were not available to her in a single-parent household in Scotland.  Today, she is CISO of MongoDB, a $16 billion company with thousands of employees around the world and she is a leading voice on education and talent-identification in cybersecurity.</p>

<p>Lena joins Ryan on the show to tell stories from her childhood, the decisions that carved a path for a successful career in security, the anguish of imposter syndrome, the joys of building a modern security program, and impressive tech innovation moving the security needle.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+isadXJwH</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+isadXJwH" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Patrick Howell O'Neill, Cybersecurity Editor, MIT Technology Review</title>
      <link>http://securityconversations.fireside.fm/patrick-howell-oneill-mit-tech-review</link>
      <guid isPermaLink="false">02fc5a7f-d41b-434f-a25d-5f6c0a046dbc</guid>
      <pubDate>Tue, 30 Mar 2021 01:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc.mp3" length="24838523" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle> 
Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss his latest scoop on Google Project Zero's visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple's iOS becoming a hot target and the controversies surrounding all of these conversations.  [Follow Patrick on Twitter](https://twitter.com/howelloneill).</itunes:subtitle>
      <itunes:duration>25:52</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/02fc5a7f-d41b-434f-a25d-5f6c0a046dbc/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
      </description>
      <itunes:keywords>journalism, story-telling, google, project zero, APT, nation-state malware, attribution</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Patrick Howell O’Neill is the cybersecurity senior editor for MIT Technology Review.   In this out-of-band episode of the show, Patrick joins Ryan to discuss <a href="https://securityconversations.com/on-disrupting-gov-malware-attacks/" rel="nofollow">his latest scoop</a> on Google Project Zero&#39;s visibility into malware used in a Western .gov counter-terrorism operation, the tricky nature of attributing nation-state backed attacks, Apple&#39;s iOS becoming a hot target and the controversies surrounding all of these conversations.  <a href="https://twitter.com/howelloneill" rel="nofollow">Follow Patrick on Twitter</a>.</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+VUTJju8g</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+VUTJju8g" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Nico Waisman, Head of Privacy &amp; Security, Lyft</title>
      <link>http://securityconversations.fireside.fm/nico-waisman-lyft</link>
      <guid isPermaLink="false">85a47563-94ed-43f9-964c-fed6c6e20eff</guid>
      <pubDate>Fri, 26 Mar 2021 12:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/85a47563-94ed-43f9-964c-fed6c6e20eff.mp3" length="42763209" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>After a 20-year career working in the offensive security reseach trenches, security industry pioneer Nico Waisman made the transition to defense to head up privacy and security efforts at ride-sharing firm Lyft.   Waisman joins Ryan Naraine on the show to talk about early hacking in Argentina, the contributions of non-Americans to the security industry, and much much more...</itunes:subtitle>
      <itunes:duration>56:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/85a47563-94ed-43f9-964c-fed6c6e20eff/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>After a 20-year career working in the offensive security reseach trenches, security industry pioneer Nico Waisman made the transition to defense to head up privacy and security efforts at ride-sharing firm Lyft.   Waisman joins Ryan Naraine on the show to talk about early hacking in Argentina, the contributions of non-Americans to the security industry, and much much more...</p>]]>
      </description>
      <itunes:keywords>ciso, third-party risk, risk management, offensive security, zero-days</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>After a 20-year career working in the offensive security reseach trenches, security industry pioneer Nico Waisman made the transition to defense to head up privacy and security efforts at ride-sharing firm Lyft.   Waisman joins Ryan Naraine on the show to talk about early hacking in Argentina, the contributions of non-Americans to the security industry, and much much more...</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>After a 20-year career working in the offensive security reseach trenches, security industry pioneer Nico Waisman made the transition to defense to head up privacy and security efforts at ride-sharing firm Lyft.   Waisman joins Ryan Naraine on the show to talk about early hacking in Argentina, the contributions of non-Americans to the security industry, and much much more...</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+5b4RcExK</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+5b4RcExK" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ron Brash on the water plant hacks and the state of ICS security</title>
      <link>http://securityconversations.fireside.fm/ron-brash-verve-industrial-protection</link>
      <guid isPermaLink="false">68388f69-fd95-4df0-9083-00587ea8f41c</guid>
      <pubDate>Thu, 11 Mar 2021 13:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/68388f69-fd95-4df0-9083-00587ea8f41c.mp3" length="45472533" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle> Ron Brash joins Ryan on the show talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defender, and the things we should worry -- and not worry -- about.    Ron  is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management.  </itunes:subtitle>
      <itunes:duration>50:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/68388f69-fd95-4df0-9083-00587ea8f41c/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>Ron Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry -- and not worry -- about.  </p>

<p>Ron  is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management.  </p>]]>
      </description>
      <itunes:keywords>ics, scada, ransomware, red team, blue team, critical infrastructure</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Ron Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry -- and not worry -- about.  </p>

<p>Ron  is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management.  </p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Ron Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry -- and not worry -- about.  </p>

<p>Ron  is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management.  </p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+xREkCJY5</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+xREkCJY5" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Throwback: Zero-day exploit broker Chaouki Bekrar</title>
      <link>http://securityconversations.fireside.fm/chaouki-bekrar</link>
      <guid isPermaLink="false">6cc88aa8-eacc-4bb0-a992-c0172b5915ea</guid>
      <pubDate>Wed, 03 Mar 2021 01:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6cc88aa8-eacc-4bb0-a992-c0172b5915ea.mp3" length="21298595" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I'm glad to be able to retain this interview for historical purposes. 

The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar's team of hackers demo'd a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  

Please excuse the audio quality and background noise.</itunes:subtitle>
      <itunes:duration>24:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6cc88aa8-eacc-4bb0-a992-c0172b5915ea/cover.jpg?v=1"/>
      <description>
        <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
      </description>
      <itunes:keywords>zero-day, exploits, pwn2own, zerodium, vupen, exploit brokers</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>This is the republication of an interview first conducted in March 2013 with then-VUPEN chief executive Chauki Bekrar.   The audio file was lost in several podcast platform transfers and I&#39;m glad to be able to retain this interview for historical purposes. </p>

<p>The recording was conducted in the hallways of the CanSecWest Pwn2Own hacking contest in 2013 where Bekrar&#39;s team of hackers demo&#39;d a zero-day attack against Microsoft Internet Explorer 10 on Windows 8, an exploit that bypassed all mitigations including the browser sandbox.  We chat about the controversies surrounding the sale of zero-day vulnerabilities and exploits, his company’s business dealings and the work that goes into winning the CanSecWest Pwn2Own hacker contest.  </p>

<p>(Please excuse the audio quality and background chatter, this was recorded with a small handheld device in a noisy room).</p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+p2Jw57QC</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+p2Jw57QC" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Selena Larson, Intelligence Analyst, Dragos</title>
      <link>http://securityconversations.fireside.fm/selena-larson-dragos</link>
      <guid isPermaLink="false">9a9c9bf0-2463-42f6-9e4c-823c9a7763d8</guid>
      <pubDate>Wed, 16 Sep 2020 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9a9c9bf0-2463-42f6-9e4c-823c9a7763d8.mp3" length="37771153" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Journalist-turned-intel analyst Selena Larson joins the podcast to discuss the nuances of cybersecurity journalism, making the shift to analyzing intelligence and writing for a private audience, the ransomware epidemic, and the state of critical infrastructure security.</itunes:subtitle>
      <itunes:duration>52:17</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9a9c9bf0-2463-42f6-9e4c-823c9a7763d8/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Journalist-turned-intel analyst Selena Larson joins the podcast to discuss the nuances of cybersecurity journalism, making the shift to analyzing intelligence and writing for a private audience, the ransomware epidemic, and the state of critical infrastructure security.</p>]]>
      </description>
      <itunes:keywords>ics, scada, journalism, ransomware, red team, blue team</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Journalist-turned-intel analyst Selena Larson joins the podcast to discuss the nuances of cybersecurity journalism, making the shift to analyzing intelligence and writing for a private audience, the ransomware epidemic, and the state of critical infrastructure security.</p><p>Links:</p><ul><li><a title="Selena Larson Presentations" rel="nofollow" href="https://www.selenalarson.com/presentations">Selena Larson Presentations</a></li><li><a title="Follow Selena on Twitter" rel="nofollow" href="https://twitter.com/selenalarson">Follow Selena on Twitter</a></li><li><a title="Selena Larson on Bringing New &amp; Diverse People into the ICS Security Community" rel="nofollow" href="https://www.youtube.com/watch?v=WzfMsApgIl8&amp;ab_channel=S4Events">Selena Larson on Bringing New &amp; Diverse People into the ICS Security Community</a></li><li><a title="ICS OSINT: An Attacker’s Perspective" rel="nofollow" href="https://www.youtube.com/watch?v=fW7AkbG-q-A&amp;ab_channel=RSAConference">ICS OSINT: An Attacker’s Perspective</a></li><li><a title="Selena Larson profile" rel="nofollow" href="https://www.dragos.com/team/selena-larson/">Selena Larson profile</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Journalist-turned-intel analyst Selena Larson joins the podcast to discuss the nuances of cybersecurity journalism, making the shift to analyzing intelligence and writing for a private audience, the ransomware epidemic, and the state of critical infrastructure security.</p><p>Links:</p><ul><li><a title="Selena Larson Presentations" rel="nofollow" href="https://www.selenalarson.com/presentations">Selena Larson Presentations</a></li><li><a title="Follow Selena on Twitter" rel="nofollow" href="https://twitter.com/selenalarson">Follow Selena on Twitter</a></li><li><a title="Selena Larson on Bringing New &amp; Diverse People into the ICS Security Community" rel="nofollow" href="https://www.youtube.com/watch?v=WzfMsApgIl8&amp;ab_channel=S4Events">Selena Larson on Bringing New &amp; Diverse People into the ICS Security Community</a></li><li><a title="ICS OSINT: An Attacker’s Perspective" rel="nofollow" href="https://www.youtube.com/watch?v=fW7AkbG-q-A&amp;ab_channel=RSAConference">ICS OSINT: An Attacker’s Perspective</a></li><li><a title="Selena Larson profile" rel="nofollow" href="https://www.dragos.com/team/selena-larson/">Selena Larson profile</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+gb0yNNRu</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+gb0yNNRu" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Fredrick Lee, Chief Security Officer, Gusto</title>
      <link>http://securityconversations.fireside.fm/frederick-lee-gusto</link>
      <guid isPermaLink="false">d20c248c-131d-4e66-8790-6d0a146e7fa8</guid>
      <pubDate>Thu, 10 Sep 2020 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d20c248c-131d-4e66-8790-6d0a146e7fa8.mp3" length="27307999" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Gusto chief security officer Fredrick 'Flee' Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</itunes:subtitle>
      <itunes:duration>41:37</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d20c248c-131d-4e66-8790-6d0a146e7fa8/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>Gusto chief security officer Fredrick &#39;Flee&#39; Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</p>]]>
      </description>
      <itunes:keywords>security, privacy, compliance, crisis management, cybersecurity, pandemic, covid, corona virus, business continuity</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Gusto chief security officer Fredrick &#39;Flee&#39; Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</p><p>Links:</p><ul><li><a title="Gusto Appoints Fredrick Lee Chief Security Officer" rel="nofollow" href="https://www.businesswire.com/news/home/20190305005014/en/Gusto-Appoints-Fredrick-Lee-Chief-Security-Officer">Gusto Appoints Fredrick Lee Chief Security Officer</a></li><li><a title="Secret CSO: Fredrick &quot;Flee&quot; Lee, Gusto" rel="nofollow" href="https://www.idgconnect.com/interviews/1504751/secret-cso-fredrick-flee-lee-gusto">Secret CSO: Fredrick "Flee" Lee, Gusto</a></li><li><a title="CISO to CISO Webcast with Fredrick &quot;Flee&quot; Lee" rel="nofollow" href="https://blog.altitudenetworks.com/ciso-to-ciso-live-webcast-with-fredrick-lee-cso-of-gusto/">CISO to CISO Webcast with Fredrick "Flee" Lee</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Gusto chief security officer Fredrick &#39;Flee&#39; Lee talks about his passion for democratizing security, solving problems for small businesses, the responsibilities of being a black security leader, and the people and experiences that influenced him along the way.</p><p>Links:</p><ul><li><a title="Gusto Appoints Fredrick Lee Chief Security Officer" rel="nofollow" href="https://www.businesswire.com/news/home/20190305005014/en/Gusto-Appoints-Fredrick-Lee-Chief-Security-Officer">Gusto Appoints Fredrick Lee Chief Security Officer</a></li><li><a title="Secret CSO: Fredrick &quot;Flee&quot; Lee, Gusto" rel="nofollow" href="https://www.idgconnect.com/interviews/1504751/secret-cso-fredrick-flee-lee-gusto">Secret CSO: Fredrick "Flee" Lee, Gusto</a></li><li><a title="CISO to CISO Webcast with Fredrick &quot;Flee&quot; Lee" rel="nofollow" href="https://blog.altitudenetworks.com/ciso-to-ciso-live-webcast-with-fredrick-lee-cso-of-gusto/">CISO to CISO Webcast with Fredrick "Flee" Lee</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+hp81l3LY</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+hp81l3LY" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Zack Whittaker, Security Editor, TechCrunch</title>
      <link>http://securityconversations.fireside.fm/zack-whittaker-techcrunch</link>
      <guid isPermaLink="false">cb83913c-2556-48c1-aff3-aa2f7b7db8c8</guid>
      <pubDate>Tue, 01 Sep 2020 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cb83913c-2556-48c1-aff3-aa2f7b7db8c8.mp3" length="19170998" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>TechCrunch security writer Zack Whittaker stumbled into journalism while in college and has carved a successful career covering cybersecurity the last decade.  He joins the podcast to talk about landing at ZDNet out of university and some lucky breaks along the way.   Zack also talks about the trials of living and working with Tourette syndrome.</itunes:subtitle>
      <itunes:duration>25:45</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/cb83913c-2556-48c1-aff3-aa2f7b7db8c8/cover.jpg?v=2"/>
      <description>
        <![CDATA[<p>TechCrunch security writer Zack Whittaker stumbled into journalism while in college and has carved a successful career covering cybersecurity the last decade.  He joins the podcast to talk about landing at ZDNet out of university and some lucky breaks along the way.   Zack also talks about the trials of living and working with Tourette syndrome. </p>]]>
      </description>
      <itunes:keywords>journalism, story-telling, writing, news gathering</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>TechCrunch security writer Zack Whittaker stumbled into journalism while in college and has carved a successful career covering cybersecurity the last decade.  He joins the podcast to talk about landing at ZDNet out of university and some lucky breaks along the way.   Zack also talks about the trials of living and working with Tourette syndrome. </p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>TechCrunch security writer Zack Whittaker stumbled into journalism while in college and has carved a successful career covering cybersecurity the last decade.  He joins the podcast to talk about landing at ZDNet out of university and some lucky breaks along the way.   Zack also talks about the trials of living and working with Tourette syndrome. </p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+uQSYRL2n</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+uQSYRL2n" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Jason Chan, VP, Information Security, Netflix</title>
      <link>http://securityconversations.fireside.fm/jason-chan-netflix</link>
      <guid isPermaLink="false">c238448d-c5c4-411a-b256-d6afae1ec31b</guid>
      <pubDate>Tue, 18 Aug 2020 16:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c238448d-c5c4-411a-b256-d6afae1ec31b.mp3" length="22390072" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender's top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</itunes:subtitle>
      <itunes:duration>31:04</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c238448d-c5c4-411a-b256-d6afae1ec31b/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender&#39;s top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</p>]]>
      </description>
      <itunes:keywords>leadership, zero-trust, serverless, CISO</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender&#39;s top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</p><p>Links:</p><ul><li><a title="Jason&#39;s ultra-marathon photos" rel="nofollow" href="https://run200photos.com/jason/hB7475CBB#hb7475cbb">Jason's ultra-marathon photos</a></li><li><a title="Keynote: Keeping Developers and Security Teams Happy" rel="nofollow" href="https://www.youtube.com/watch?v=WGkAf4x94rQ">Keynote: Keeping Developers and Security Teams Happy</a></li><li><a title="Developer Empathy with Jason Chan of Netflix (Podcast)" rel="nofollow" href="https://www.heavybit.com/library/podcasts/the-secure-developer/ep-28-developer-empathy-with-jason-chan-of-netflix/">Developer Empathy with Jason Chan of Netflix (Podcast)</a></li><li><a title="Hacktivity 2014:  Jason Chan -- Building a Glass House" rel="nofollow" href="https://www.youtube.com/watch?v=wH-8610xh6s">Hacktivity 2014:  Jason Chan -- Building a Glass House</a></li><li><a title="I Want Your Job: Jason Chan, Netflix" rel="nofollow" href="https://today.cofc.edu/2019/04/03/jason-chan-vice-president-of-information-security-netflix/">I Want Your Job: Jason Chan, Netflix</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Netflix security leader Jason Chan talks about the connections between ultra-marathons and running a robust security program, his view of the defender&#39;s top priorities, the talent shortage in cybersecurity, and the shifting patterns that drive secure code delivery.</p><p>Links:</p><ul><li><a title="Jason&#39;s ultra-marathon photos" rel="nofollow" href="https://run200photos.com/jason/hB7475CBB#hb7475cbb">Jason's ultra-marathon photos</a></li><li><a title="Keynote: Keeping Developers and Security Teams Happy" rel="nofollow" href="https://www.youtube.com/watch?v=WGkAf4x94rQ">Keynote: Keeping Developers and Security Teams Happy</a></li><li><a title="Developer Empathy with Jason Chan of Netflix (Podcast)" rel="nofollow" href="https://www.heavybit.com/library/podcasts/the-secure-developer/ep-28-developer-empathy-with-jason-chan-of-netflix/">Developer Empathy with Jason Chan of Netflix (Podcast)</a></li><li><a title="Hacktivity 2014:  Jason Chan -- Building a Glass House" rel="nofollow" href="https://www.youtube.com/watch?v=wH-8610xh6s">Hacktivity 2014:  Jason Chan -- Building a Glass House</a></li><li><a title="I Want Your Job: Jason Chan, Netflix" rel="nofollow" href="https://today.cofc.edu/2019/04/03/jason-chan-vice-president-of-information-security-netflix/">I Want Your Job: Jason Chan, Netflix</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+o_myJF0H</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+o_myJF0H" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Matt Honea, Senior Director, Cybersecurity, Guidewire</title>
      <link>http://securityconversations.fireside.fm/matt-honea-guidewire</link>
      <guid isPermaLink="false">6430e0f1-7e1a-4003-853b-8f19d9a34d6b</guid>
      <pubDate>Tue, 11 Aug 2020 12:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6430e0f1-7e1a-4003-853b-8f19d9a34d6b.mp3" length="30677958" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>After a career in government that included physical security work for the U.S. State Department, Matt Honea transitioned to Silicon Valley and turned his attention to the cyber-insurance space.   He joins the podcast for a frank discussion on cyber-insurance, ransomware payments and trends, and his opinions on innovation in security.</itunes:subtitle>
      <itunes:duration>46:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6430e0f1-7e1a-4003-853b-8f19d9a34d6b/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>After a career in government that included physical security work for the U.S. State Department, Matt Honea transitioned to Silicon Valley and turned his attention to the cyber-insurance space.   He joins the podcast for a frank discussion on cyber-insurance, ransomware payments and trends, and his opinions on innovation in security.</p>]]>
      </description>
      <itunes:keywords>cyber-insurance, ransomware, insurance</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>After a career in government that included physical security work for the U.S. State Department, Matt Honea transitioned to Silicon Valley and turned his attention to the cyber-insurance space.   He joins the podcast for a frank discussion on cyber-insurance, ransomware payments and trends, and his opinions on innovation in security.</p><p>Links:</p><ul><li><a title="Matt Honea blog posts" rel="nofollow" href="https://www.guidewire.com/our-bloggers/matthew-honea">Matt Honea blog posts</a></li><li><a title="Safe Harbor Programs: Ensuring the Bounty Isn&#39;t on ..." rel="nofollow" href="https://www.darkreading.com/application-security/safe-harbor-programs-ensuring-the-bounty-isnt-on-white-hat-hackers-heads/a/d-id/1334339?">Safe Harbor Programs: Ensuring the Bounty Isn't on ...</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>After a career in government that included physical security work for the U.S. State Department, Matt Honea transitioned to Silicon Valley and turned his attention to the cyber-insurance space.   He joins the podcast for a frank discussion on cyber-insurance, ransomware payments and trends, and his opinions on innovation in security.</p><p>Links:</p><ul><li><a title="Matt Honea blog posts" rel="nofollow" href="https://www.guidewire.com/our-bloggers/matthew-honea">Matt Honea blog posts</a></li><li><a title="Safe Harbor Programs: Ensuring the Bounty Isn&#39;t on ..." rel="nofollow" href="https://www.darkreading.com/application-security/safe-harbor-programs-ensuring-the-bounty-isnt-on-white-hat-hackers-heads/a/d-id/1334339?">Safe Harbor Programs: Ensuring the Bounty Isn't on ...</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+fnxeDfWY</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+fnxeDfWY" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Andy Greenberg, Senior Writer, Wired</title>
      <link>http://securityconversations.fireside.fm/andy-greenberg-wired</link>
      <guid isPermaLink="false">1a7b0cc6-4405-4f53-81c3-653964fd377d</guid>
      <pubDate>Tue, 11 Aug 2020 10:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1a7b0cc6-4405-4f53-81c3-653964fd377d.mp3" length="43116760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Cybersecurity journalist and author Andy Greenberg joins the podcast to talk about his career as a journalist, the ins-and-outs of negotiating a big story with sources, the intricacies of writing a good book, and some of his biggest stories to date.</itunes:subtitle>
      <itunes:duration>59:47</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1a7b0cc6-4405-4f53-81c3-653964fd377d/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Cybersecurity journalist and author Andy Greenberg joins the podcast to talk about his career as a journalist, the ins-and-outs of negotiating a big story with sources, the intricacies of writing a good book, and some of his biggest stories to date.</p>]]>
      </description>
      <itunes:keywords>journalism, story-telling, writing, news gathering, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Cybersecurity journalist and author Andy Greenberg joins the podcast to talk about his career as a journalist, the ins-and-outs of negotiating a big story with sources, the intricacies of writing a good book, and some of his biggest stories to date.</p><p>Links:</p><ul><li><a title="Follow Andy Greenberg on Twitter" rel="nofollow" href="https://twitter.com/a_greenberg">Follow Andy Greenberg on Twitter</a></li><li><a title="Andy Greenberg&#39;s Wired bio" rel="nofollow" href="https://www.wired.com/author/andy-greenberg/">Andy Greenberg's Wired bio</a></li><li><a title="Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin&#39;s Most Dangerous Hackers" rel="nofollow" href="https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405?ots=1&amp;slotNum=0&amp;imprToken=10b9ef54-bb0c-ca8b-8b2&amp;tag=w050b-20&amp;linkCode=w50">Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity journalist and author Andy Greenberg joins the podcast to talk about his career as a journalist, the ins-and-outs of negotiating a big story with sources, the intricacies of writing a good book, and some of his biggest stories to date.</p><p>Links:</p><ul><li><a title="Follow Andy Greenberg on Twitter" rel="nofollow" href="https://twitter.com/a_greenberg">Follow Andy Greenberg on Twitter</a></li><li><a title="Andy Greenberg&#39;s Wired bio" rel="nofollow" href="https://www.wired.com/author/andy-greenberg/">Andy Greenberg's Wired bio</a></li><li><a title="Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin&#39;s Most Dangerous Hackers" rel="nofollow" href="https://www.amazon.com/Sandworm-Cyberwar-Kremlins-Dangerous-Hackers/dp/0385544405?ots=1&amp;slotNum=0&amp;imprToken=10b9ef54-bb0c-ca8b-8b2&amp;tag=w050b-20&amp;linkCode=w50">Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ui9AM94i</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ui9AM94i" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Brooke Pearson, Security Awareness, Uber</title>
      <link>http://securityconversations.fireside.fm/brooke-pearson-uber</link>
      <guid isPermaLink="false">e2e90b4c-d2d7-4cf8-abb8-691432172793</guid>
      <pubDate>Wed, 17 Jun 2020 21:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/e2e90b4c-d2d7-4cf8-abb8-691432172793.mp3" length="44092719" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>After a career in diplomacy at the U.S. State Department, Uber's Brooke Pearson headed to Silicon Valley to find a new path in cybersecurity.  We chat about her early interest in Russia and international relations, a life-changing chance encounter during an airport layover, using non-traditional skills to find success in tech, and her passion for helping minorities find meaningful careers in security.   </itunes:subtitle>
      <itunes:duration>1:01:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/e/e2e90b4c-d2d7-4cf8-abb8-691432172793/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>After a career in diplomacy at the U.S. State Department, Uber&#39;s Brooke Pearson headed to Silicon Valley to find a new path in cybersecurity.  We chat about her early interest in Russia and international relations, a life-changing chance encounter during an airport layover, using non-traditional skills to find success in tech, and her passion for helping minorities find meaningful careers in security.  </p>]]>
      </description>
      <itunes:keywords>security, diplomacy, security awareness</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>After a career in diplomacy at the U.S. State Department, Uber&#39;s Brooke Pearson headed to Silicon Valley to find a new path in cybersecurity.  We chat about her early interest in Russia and international relations, a life-changing chance encounter during an airport layover, using non-traditional skills to find success in tech, and her passion for helping minorities find meaningful careers in security.  </p>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>After a career in diplomacy at the U.S. State Department, Uber&#39;s Brooke Pearson headed to Silicon Valley to find a new path in cybersecurity.  We chat about her early interest in Russia and international relations, a life-changing chance encounter during an airport layover, using non-traditional skills to find success in tech, and her passion for helping minorities find meaningful careers in security.  </p>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+eHtFgLj3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+eHtFgLj3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Tim MalcomVetter, Red Team Lead, Walmart</title>
      <link>http://securityconversations.fireside.fm/tim-malcomvetter-walmart</link>
      <guid isPermaLink="false">768dab87-a2a6-4fa9-9a41-b74bd83665a3</guid>
      <pubDate>Mon, 04 May 2020 18:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/768dab87-a2a6-4fa9-9a41-b74bd83665a3.mp3" length="43661751" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Tim joins the podcast to talk about red-team/blue team dynamics, the adversarial relationship between the two sides, the mentality of a determined attacker, and why everyone in cybersecurity should give jiu-jitsu a try.</itunes:subtitle>
      <itunes:duration>59:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/768dab87-a2a6-4fa9-9a41-b74bd83665a3/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p><em>[ DISCLAIMER:   These are the personal opinions of Tim MalcomVetter and do not construe an official endorsement or business relationship of his employer with any product or service.  ]</em></p>

<p>Walmart Red Team lead Tim MalcomVetter joins the podcast to talk about red-team/blue team dynamics, the adversarial relationship between the two sides, the mentality of a determined attacker, and why everyone in cybersecurity should give jiu-jitsu a try.</p>]]>
      </description>
      <itunes:keywords>red team, blue team, offense vs defense, simulated hacking attacks</itunes:keywords>
      <content:encoded>
        <![CDATA[<p><em>[ DISCLAIMER:   These are the personal opinions of Tim MalcomVetter and do not construe an official endorsement or business relationship of his employer with any product or service.  ]</em></p>

<p>Walmart Red Team lead Tim MalcomVetter joins the podcast to talk about red-team/blue team dynamics, the adversarial relationship between the two sides, the mentality of a determined attacker, and why everyone in cybersecurity should give jiu-jitsu a try.</p><p>Links:</p><ul><li><a title="TIm&#39;s Articles on Medium" rel="nofollow" href="https://medium.com/@malcomvetter">TIm's Articles on Medium</a></li><li><a title="Follow Tim MalcomVetter on Twitter" rel="nofollow" href="https://twitter.com/malcomvetter">Follow Tim MalcomVetter on Twitter</a></li><li><a title="LinkedIn Profile" rel="nofollow" href="https://www.linkedin.com/in/malcomvetter/">LinkedIn Profile</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><em>[ DISCLAIMER:   These are the personal opinions of Tim MalcomVetter and do not construe an official endorsement or business relationship of his employer with any product or service.  ]</em></p>

<p>Walmart Red Team lead Tim MalcomVetter joins the podcast to talk about red-team/blue team dynamics, the adversarial relationship between the two sides, the mentality of a determined attacker, and why everyone in cybersecurity should give jiu-jitsu a try.</p><p>Links:</p><ul><li><a title="TIm&#39;s Articles on Medium" rel="nofollow" href="https://medium.com/@malcomvetter">TIm's Articles on Medium</a></li><li><a title="Follow Tim MalcomVetter on Twitter" rel="nofollow" href="https://twitter.com/malcomvetter">Follow Tim MalcomVetter on Twitter</a></li><li><a title="LinkedIn Profile" rel="nofollow" href="https://www.linkedin.com/in/malcomvetter/">LinkedIn Profile</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Jq7jB1C3</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Jq7jB1C3" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Matt Suiche, Comae Technologies</title>
      <link>http://securityconversations.fireside.fm/matt-suiche-comae</link>
      <guid isPermaLink="false">9a77e22d-d2e8-4f91-a79b-f6edb4f69eaa</guid>
      <pubDate>Fri, 17 Apr 2020 06:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/9a77e22d-d2e8-4f91-a79b-f6edb4f69eaa.mp3" length="35719975" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics, building a selling a company, and his passion for spreading security research in developing countries.</itunes:subtitle>
      <itunes:duration>42:36</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/9a77e22d-d2e8-4f91-a79b-f6edb4f69eaa/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft&#39;s Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries. </p>]]>
      </description>
      <itunes:keywords>memory forensics, community building, africa, entrepreneurship</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft&#39;s Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries. </p><p>Links:</p><ul><li><a title="OPCDE Online" rel="nofollow" href="https://online.opcde.com">OPCDE Online</a></li><li><a title="Comae Technologies" rel="nofollow" href="https://www.comae.com/">Comae Technologies</a></li><li><a title="Follow Matt Suiche on Twitter" rel="nofollow" href="https://twitter.com/msuiche">Follow Matt Suiche on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Hacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft&#39;s Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries. </p><p>Links:</p><ul><li><a title="OPCDE Online" rel="nofollow" href="https://online.opcde.com">OPCDE Online</a></li><li><a title="Comae Technologies" rel="nofollow" href="https://www.comae.com/">Comae Technologies</a></li><li><a title="Follow Matt Suiche on Twitter" rel="nofollow" href="https://twitter.com/msuiche">Follow Matt Suiche on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+c1S3jrh7</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+c1S3jrh7" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Jaime Blasco, AT&amp;T Cybersecurity</title>
      <link>http://securityconversations.fireside.fm/jaime-blasco-att-cybersecurity</link>
      <guid isPermaLink="false">3ea2877d-d3a0-44e1-98b4-e9536f831b77</guid>
      <pubDate>Tue, 14 Apr 2020 15:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/3ea2877d-d3a0-44e1-98b4-e9536f831b77.mp3" length="30063613" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>AT&amp;T Cybersecurity's Jaime Blasco talks about falling in love with security as a high-school student in Spain, finding a career path in pen-testing and offense,  shifting to building defensive technologies and his current passion for exploring the value of machine learning.</itunes:subtitle>
      <itunes:duration>31:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/3ea2877d-d3a0-44e1-98b4-e9536f831b77/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>AT&amp;T Cybersecurity&#39;s Jaime Blasco talks about falling in love with security as a high-school student in Spain, finding a career path in pen-testing and offense,  shifting to building defensive technologies and his current passion for exploring the value of machine learning. </p>]]>
      </description>
      <itunes:keywords>penetration testing, entrepreneurship, threat-intel</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>AT&amp;T Cybersecurity&#39;s Jaime Blasco talks about falling in love with security as a high-school student in Spain, finding a career path in pen-testing and offense,  shifting to building defensive technologies and his current passion for exploring the value of machine learning. </p><p>Links:</p><ul><li><a title="AT&amp;T AlienLabs" rel="nofollow" href="https://cybersecurity.att.com/alien-labs">AT&amp;T AlienLabs</a></li><li><a title="Follow Jaime on Twitter" rel="nofollow" href="https://twitter.com/jaimeblascob">Follow Jaime on Twitter</a></li><li><a title="Open Threat Exchange (OTX)" rel="nofollow" href="https://cybersecurity.att.com/open-threat-exchange">Open Threat Exchange (OTX)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>AT&amp;T Cybersecurity&#39;s Jaime Blasco talks about falling in love with security as a high-school student in Spain, finding a career path in pen-testing and offense,  shifting to building defensive technologies and his current passion for exploring the value of machine learning. </p><p>Links:</p><ul><li><a title="AT&amp;T AlienLabs" rel="nofollow" href="https://cybersecurity.att.com/alien-labs">AT&amp;T AlienLabs</a></li><li><a title="Follow Jaime on Twitter" rel="nofollow" href="https://twitter.com/jaimeblascob">Follow Jaime on Twitter</a></li><li><a title="Open Threat Exchange (OTX)" rel="nofollow" href="https://cybersecurity.att.com/open-threat-exchange">Open Threat Exchange (OTX)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+9_a7LCN5</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+9_a7LCN5" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Collin Mulliner, Security Engineer, Cruise</title>
      <link>http://securityconversations.fireside.fm/collin-mulliner-cruise</link>
      <guid isPermaLink="false">1762300e-32da-4a5b-b925-44680cc367e6</guid>
      <pubDate>Fri, 03 Apr 2020 18:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1762300e-32da-4a5b-b925-44680cc367e6.mp3" length="34191733" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Mobile security research pioneer Collin Mulliner talks about the early days of hacking PalmOS devices, the current state of smartphone platforms, his work on securing self driving cars, and why he built and open-sourced a firmware analyzer tool.</itunes:subtitle>
      <itunes:duration>33:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1762300e-32da-4a5b-b925-44680cc367e6/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Mobile security pioneer Collin Mulliner talks about the early days of hacking PalmOS devices, the current state of smartphone platforms, his work on securing self driving cars, and why he built and open-sourced a firmware analyzer tool. </p>]]>
      </description>
      <itunes:keywords>mobile, android, ios self-driving cars, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Mobile security pioneer Collin Mulliner talks about the early days of hacking PalmOS devices, the current state of smartphone platforms, his work on securing self driving cars, and why he built and open-sourced a firmware analyzer tool. </p><p>Links:</p><ul><li><a title="Firmware Analyzer" rel="nofollow" href="https://github.com/cruise-automation/fwanalyzer">Firmware Analyzer</a> &mdash; FwAnalyzer is a tool to analyze (ext2/3/4), FAT/VFat, SquashFS, UBIFS filesystem images, cpio archives, and directory content using a set of configurable rules. </li><li><a title="Collin&#39;s blog" rel="nofollow" href="http://www.mulliner.org/blog/">Collin's blog</a></li><li><a title="PDF: Continuous Automated Firmware Security Analysis" rel="nofollow" href="https://i.blackhat.com/USA-19/Wednesday/us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis.pdf">PDF: Continuous Automated Firmware Security Analysis</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Mobile security pioneer Collin Mulliner talks about the early days of hacking PalmOS devices, the current state of smartphone platforms, his work on securing self driving cars, and why he built and open-sourced a firmware analyzer tool. </p><p>Links:</p><ul><li><a title="Firmware Analyzer" rel="nofollow" href="https://github.com/cruise-automation/fwanalyzer">Firmware Analyzer</a> &mdash; FwAnalyzer is a tool to analyze (ext2/3/4), FAT/VFat, SquashFS, UBIFS filesystem images, cpio archives, and directory content using a set of configurable rules. </li><li><a title="Collin&#39;s blog" rel="nofollow" href="http://www.mulliner.org/blog/">Collin's blog</a></li><li><a title="PDF: Continuous Automated Firmware Security Analysis" rel="nofollow" href="https://i.blackhat.com/USA-19/Wednesday/us-19-Mulliner-Come-Join-The-CAFSA-Continuous-Automated-Firmware-Security-Analysis.pdf">PDF: Continuous Automated Firmware Security Analysis</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+6RYpPNLM</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+6RYpPNLM" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Michael Piacente, Principal, Hitch Partners</title>
      <link>http://securityconversations.fireside.fm/michael-piacente-hitch-partners</link>
      <guid isPermaLink="false">87141539-e2ba-45d7-a262-cec68a4f6baf</guid>
      <pubDate>Mon, 30 Mar 2020 07:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/87141539-e2ba-45d7-a262-cec68a4f6baf.mp3" length="27603336" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Hitch Partners principal Michael Piacente dishes on the cybersecurity job market during an economic crisis, the intricacies of recruiting top-flight security talent, the high rate of turnover among CISOs, and why companies should spend more time on writing better job descriptions.</itunes:subtitle>
      <itunes:duration>33:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/8/87141539-e2ba-45d7-a262-cec68a4f6baf/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Hitch Partners principal Michael Piacente dishes on the cybersecurity job market during an economic crisis, the intricacies of recruiting top-flight security talent, the high rate of turnover among CISOs, and why companies should spend more time on writing better job descriptions.</p>]]>
      </description>
      <itunes:keywords>recruiting, cybersecurity, hiring</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Hitch Partners principal Michael Piacente dishes on the cybersecurity job market during an economic crisis, the intricacies of recruiting top-flight security talent, the high rate of turnover among CISOs, and why companies should spend more time on writing better job descriptions.</p><p>Links:</p><ul><li><a title="WSJ: CISOs stay on the job less than three years, compared with nearly seven years for CEOs" rel="nofollow" href="https://www.wsj.com/articles/cisos-short-tenures-can-hamper-cyber-defenses-11582021801?mod=djemCybersecruityPro&amp;tpl=cy">WSJ: CISOs stay on the job less than three years, compared with nearly seven years for CEOs</a></li><li><a title="Exploring the CISO&#39;s personal brand" rel="nofollow" href="https://www.linkedin.com/pulse/exploring-cisos-personal-brand-michael-piacente/">Exploring the CISO's personal brand</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Hitch Partners principal Michael Piacente dishes on the cybersecurity job market during an economic crisis, the intricacies of recruiting top-flight security talent, the high rate of turnover among CISOs, and why companies should spend more time on writing better job descriptions.</p><p>Links:</p><ul><li><a title="WSJ: CISOs stay on the job less than three years, compared with nearly seven years for CEOs" rel="nofollow" href="https://www.wsj.com/articles/cisos-short-tenures-can-hamper-cyber-defenses-11582021801?mod=djemCybersecruityPro&amp;tpl=cy">WSJ: CISOs stay on the job less than three years, compared with nearly seven years for CEOs</a></li><li><a title="Exploring the CISO&#39;s personal brand" rel="nofollow" href="https://www.linkedin.com/pulse/exploring-cisos-personal-brand-michael-piacente/">Exploring the CISO's personal brand</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+IigS6Bqh</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+IigS6Bqh" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dave Aitel, Founder and CEO, Immunity</title>
      <link>http://securityconversations.fireside.fm/dave-aitel-immunity</link>
      <guid isPermaLink="false">68383542-84b9-4780-909a-a741b9c26cc8</guid>
      <pubDate>Mon, 23 Mar 2020 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/68383542-84b9-4780-909a-a741b9c26cc8.mp3" length="36849446" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Security industry pioneer Dave Aitel dishes on entrepreneurship, fostering a "one team, one parking lot" culture,  how lessons from his time at the NSA still guides his decisions, and his approach to blunt, honest marketing.   We also discuss a shared passion for Brazilian Jiu-Jitsu and his work supporting Project Grapple in Miami.</itunes:subtitle>
      <itunes:duration>37:43</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/68383542-84b9-4780-909a-a741b9c26cc8/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Security industry pioneer Dave Aitel dishes on entrepreneurship, fostering a &quot;one team, one parking lot&quot; culture,  how lessons from his time at the NSA still guides his decisions, and his approach to blunt, honest marketing.   We also discuss a shared passion for Brazilian Jiu-Jitsu and his work supporting Project Grapple in Miami. </p>]]>
      </description>
      <itunes:keywords>marketing, cybersecurity, jiu-jitsu</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Security industry pioneer Dave Aitel dishes on entrepreneurship, fostering a &quot;one team, one parking lot&quot; culture,  how lessons from his time at the NSA still guides his decisions, and his approach to blunt, honest marketing.   We also discuss a shared passion for Brazilian Jiu-Jitsu and his work supporting Project Grapple in Miami. </p><p>Links:</p><ul><li><a title="Project Grapple, The Jiu-Jitsu Non Profit Changing Lives" rel="nofollow" href="https://www.flograppling.com/video/6044979-project-grapple-the-jiu-jitsu-non-profit-changing-lives">Project Grapple, The Jiu-Jitsu Non Profit Changing Lives</a></li><li><a title="Aitel Foundation" rel="nofollow" href="https://www.aitelfoundation.org/">Aitel Foundation</a></li><li><a title="Infiltrate Conference" rel="nofollow" href="https://infiltratecon.com/">Infiltrate Conference</a></li><li><a title="Daily Dave (mailing list)" rel="nofollow" href="https://seclists.org/dailydave/">Daily Dave (mailing list)</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Security industry pioneer Dave Aitel dishes on entrepreneurship, fostering a &quot;one team, one parking lot&quot; culture,  how lessons from his time at the NSA still guides his decisions, and his approach to blunt, honest marketing.   We also discuss a shared passion for Brazilian Jiu-Jitsu and his work supporting Project Grapple in Miami. </p><p>Links:</p><ul><li><a title="Project Grapple, The Jiu-Jitsu Non Profit Changing Lives" rel="nofollow" href="https://www.flograppling.com/video/6044979-project-grapple-the-jiu-jitsu-non-profit-changing-lives">Project Grapple, The Jiu-Jitsu Non Profit Changing Lives</a></li><li><a title="Aitel Foundation" rel="nofollow" href="https://www.aitelfoundation.org/">Aitel Foundation</a></li><li><a title="Infiltrate Conference" rel="nofollow" href="https://infiltratecon.com/">Infiltrate Conference</a></li><li><a title="Daily Dave (mailing list)" rel="nofollow" href="https://seclists.org/dailydave/">Daily Dave (mailing list)</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+jubrcJjK</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+jubrcJjK" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Sounil Yu, Cyber Defense Matrix</title>
      <link>http://securityconversations.fireside.fm/sounil-yu-cyber-defense-matrix</link>
      <guid isPermaLink="false">cda34e0b-2ced-4519-9bee-dda805d6150c</guid>
      <pubDate>Tue, 17 Mar 2020 08:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cda34e0b-2ced-4519-9bee-dda805d6150c.mp3" length="31017607" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing "cattle vs pets," the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses.</itunes:subtitle>
      <itunes:duration>35:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/cda34e0b-2ced-4519-9bee-dda805d6150c/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing &quot;cattle vs pets,&quot; the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses. </p>]]>
      </description>
      <itunes:keywords>cybersecurity, security framework, NIST, investments</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing &quot;cattle vs pets,&quot; the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses. </p><p>Links:</p><ul><li><a title="Cyber Defense Matrix" rel="nofollow" href="https://owasp.org/www-project-cyber-defense-matrix/">Cyber Defense Matrix</a> &mdash; The Cyber Defense Matrix helps us understand what we need organized through a logical construct so that when we go into the security vendor marketplace, we can quickly discern what products solve what problems and be informed on what is the core function of a given product. In addition, the Cyber Defense Matrix provides a mechanism to ensure that we have capabilities across the entire spectrum of options to help secure our environments.</li><li><a title="Cyber Defense Matrix Reloaded" rel="nofollow" href="https://www.slideshare.net/sounilyu/cyber-defense-matrix-reloaded">Cyber Defense Matrix Reloaded</a> &mdash; This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Former Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places.  We discuss securing &quot;cattle vs pets,&quot; the next era of security innovation,  and the increasing security poverty line that hurts small- and medium-sized businesses. </p><p>Links:</p><ul><li><a title="Cyber Defense Matrix" rel="nofollow" href="https://owasp.org/www-project-cyber-defense-matrix/">Cyber Defense Matrix</a> &mdash; The Cyber Defense Matrix helps us understand what we need organized through a logical construct so that when we go into the security vendor marketplace, we can quickly discern what products solve what problems and be informed on what is the core function of a given product. In addition, the Cyber Defense Matrix provides a mechanism to ensure that we have capabilities across the entire spectrum of options to help secure our environments.</li><li><a title="Cyber Defense Matrix Reloaded" rel="nofollow" href="https://www.slideshare.net/sounilyu/cyber-defense-matrix-reloaded">Cyber Defense Matrix Reloaded</a> &mdash; This is an update to the Cyber Defense Matrix briefing given at the 2019 RSA Conference. Cybersecurity practitioners can use this to organize vendors, find gaps in security portfolios, understand how to organize security measurements, prioritize investments, minimize business impact, visualize attack surfaces, align other existing frameworks, and gain a fuller understanding of the entire space of cybersecurity.</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+dOMiVTWe</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+dOMiVTWe" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Andy Ellis, Chief Security Officer, Akamai Technologies</title>
      <link>http://securityconversations.fireside.fm/andy-ellis-akamai</link>
      <guid isPermaLink="false">dd036e55-5dd8-4043-ba3d-29caf4beebea</guid>
      <pubDate>Wed, 11 Mar 2020 16:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/dd036e55-5dd8-4043-ba3d-29caf4beebea.mp3" length="23543325" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>In an industry where 10-15% of staff are women, Akamai's security team is 40% women and growing.  Chief security officer Andy Ellis  joins the podcast to share lessons on practical things -- some subtle, some major -- that pushed real diversity on Akamai's security team.</itunes:subtitle>
      <itunes:duration>32:08</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/dd036e55-5dd8-4043-ba3d-29caf4beebea/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>In an industry where 10-15% of staff are women, Akamai&#39;s security team is 40% women and growing.  Chief security officer Andy Ellis  joins the podcast to share lessons on practical things -- some subtle, some major -- that pushed real diversity on Akamai&#39;s security team.</p>]]>
      </description>
      <itunes:keywords>diversity, cybersecurity, hiring</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>In an industry where 10-15% of staff are women, Akamai&#39;s security team is 40% women and growing.  Chief security officer Andy Ellis  joins the podcast to share lessons on practical things -- some subtle, some major -- that pushed real diversity on Akamai&#39;s security team.</p><p>Links:</p><ul><li><a title="One company’s successful approach to gender balance" rel="nofollow" href="https://hrexecutive.com/one-companys-successful-approach-to-gender-balance/">One company’s successful approach to gender balance</a></li><li><a title="Video: 20 Years In: Security’s Grand Challenges, Then and Now" rel="nofollow" href="https://www.youtube.com/watch?v=XgmTm5e38Y0">Video: 20 Years In: Security’s Grand Challenges, Then and Now</a></li><li><a title="Andy Ellis:  Humans are Awesome at Risk Management" rel="nofollow" href="https://www.rsaconference.com/industry-topics/presentation/humans-are-awesome-at-risk-management">Andy Ellis:  Humans are Awesome at Risk Management</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>In an industry where 10-15% of staff are women, Akamai&#39;s security team is 40% women and growing.  Chief security officer Andy Ellis  joins the podcast to share lessons on practical things -- some subtle, some major -- that pushed real diversity on Akamai&#39;s security team.</p><p>Links:</p><ul><li><a title="One company’s successful approach to gender balance" rel="nofollow" href="https://hrexecutive.com/one-companys-successful-approach-to-gender-balance/">One company’s successful approach to gender balance</a></li><li><a title="Video: 20 Years In: Security’s Grand Challenges, Then and Now" rel="nofollow" href="https://www.youtube.com/watch?v=XgmTm5e38Y0">Video: 20 Years In: Security’s Grand Challenges, Then and Now</a></li><li><a title="Andy Ellis:  Humans are Awesome at Risk Management" rel="nofollow" href="https://www.rsaconference.com/industry-topics/presentation/humans-are-awesome-at-risk-management">Andy Ellis:  Humans are Awesome at Risk Management</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+DDvn2YQv</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+DDvn2YQv" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Costin Raiu, Global Director, GReAT, Kaspersky Lab</title>
      <link>http://securityconversations.fireside.fm/costin-raiu-great</link>
      <guid isPermaLink="false">c49758d1-bc1a-43d5-8eee-5f91c6d7021f</guid>
      <pubDate>Mon, 03 Sep 2018 04:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/c49758d1-bc1a-43d5-8eee-5f91c6d7021f.mp3" length="47022834" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</itunes:subtitle>
      <itunes:duration>51:21</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/c49758d1-bc1a-43d5-8eee-5f91c6d7021f/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Veteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups.</p><p>Links:</p><ul><li><a title="&quot;Equation Group&quot; ran the most advanced hacking operation ever uncovered" rel="nofollow" href="https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/">"Equation Group" ran the most advanced hacking operation ever uncovered</a></li><li><a title="The adventures of lab ED011" rel="nofollow" href="https://arstechnica.com/features/2018/08/the-secret-history-of-ed011-the-obscure-computer-lab-that-hacked-the-world/">The adventures of lab ED011</a> &mdash; One Romanian campus computer lab both pentested the world and eventually helped protect it</li><li><a title="Costin Raiu on Twitter" rel="nofollow" href="https://twitter.com/craiu">Costin Raiu on Twitter</a></li><li><a title="The &quot;Red October&quot; Campaign" rel="nofollow" href="https://securelist.com/the-red-october-campaign/57647/">The "Red October" Campaign</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+tU3aQiHE</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+tU3aQiHE" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Josh Lefkowitz, Founder and CEO, Flashpoint</title>
      <link>http://securityconversations.fireside.fm/josh-lefkowitz-flashpoint</link>
      <guid isPermaLink="false">1f0f4e71-9a49-4d80-8a17-c020c7e2698c</guid>
      <pubDate>Tue, 28 Aug 2018 04:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1f0f4e71-9a49-4d80-8a17-c020c7e2698c.mp3" length="30504303" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company's approach to gathering and analyzing data, and his mission to be an extension of a client's security team.</itunes:subtitle>
      <itunes:duration>32:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1f0f4e71-9a49-4d80-8a17-c020c7e2698c/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p><p>Links:</p><ul><li><a title="Flashpoint - Library" rel="nofollow" href="https://www.flashpoint-intel.com/library/">Flashpoint - Library</a></li><li><a title="&#39;7 Minutes&#39; with Flashpoint CEO Josh Lefkowitz" rel="nofollow" href="https://www.channelpartnersonline.com/article/7-minutes-with-flashpoint-ceo-josh-lefkowitz/">'7 Minutes' with Flashpoint CEO Josh Lefkowitz</a></li><li><a title="Video: Josh Lefkowitz on AlphaBay&#39;s demise" rel="nofollow" href="https://www.youtube.com/watch?v=fd6GedN3yng">Video: Josh Lefkowitz on AlphaBay's demise</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Flashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company&#39;s approach to gathering and analyzing data, and his mission to be an extension of a client&#39;s security team.</p><p>Links:</p><ul><li><a title="Flashpoint - Library" rel="nofollow" href="https://www.flashpoint-intel.com/library/">Flashpoint - Library</a></li><li><a title="&#39;7 Minutes&#39; with Flashpoint CEO Josh Lefkowitz" rel="nofollow" href="https://www.channelpartnersonline.com/article/7-minutes-with-flashpoint-ceo-josh-lefkowitz/">'7 Minutes' with Flashpoint CEO Josh Lefkowitz</a></li><li><a title="Video: Josh Lefkowitz on AlphaBay&#39;s demise" rel="nofollow" href="https://www.youtube.com/watch?v=fd6GedN3yng">Video: Josh Lefkowitz on AlphaBay's demise</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+RFkq8igu</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+RFkq8igu" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Christine Gadsby, Director of Product Security Operations, BlackBerry</title>
      <link>http://securityconversations.fireside.fm/christine-gadsby-blackberry</link>
      <guid isPermaLink="false">37e1bbf9-9add-4a52-9c5e-dc0940f670b6</guid>
      <pubDate>Mon, 06 Aug 2018 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/37e1bbf9-9add-4a52-9c5e-dc0940f670b6.mp3" length="26141237" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry's new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</itunes:subtitle>
      <itunes:duration>27:32</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/37e1bbf9-9add-4a52-9c5e-dc0940f670b6/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry&#39;s new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</p>]]>
      </description>
      <itunes:keywords>vulnerabilities, blackberry, securityresponse, CISOs</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry&#39;s new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</p><p>Links:</p><ul><li><a title="Black Hat 2018: Stop that Release There&#39;s a Vulnerability!" rel="nofollow" href="https://www.blackhat.com/us-18/briefings.html#stop-that-release-theres-a-vulnerability">Black Hat 2018: Stop that Release There's a Vulnerability!</a></li><li><a title="Christine Gadsby on Twitter" rel="nofollow" href="https://twitter.com/ChristineGadsby">Christine Gadsby on Twitter</a></li><li><a title="BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things" rel="nofollow" href="https://us.blackberry.com/enterprise">BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things</a></li><li><a title="Christine Gadsby on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/bbchristine/">Christine Gadsby on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>BlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry&#39;s new ransomware recovery feature, and her upcoming Black Hat 2018 presentation.</p><p>Links:</p><ul><li><a title="Black Hat 2018: Stop that Release There&#39;s a Vulnerability!" rel="nofollow" href="https://www.blackhat.com/us-18/briefings.html#stop-that-release-theres-a-vulnerability">Black Hat 2018: Stop that Release There's a Vulnerability!</a></li><li><a title="Christine Gadsby on Twitter" rel="nofollow" href="https://twitter.com/ChristineGadsby">Christine Gadsby on Twitter</a></li><li><a title="BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things" rel="nofollow" href="https://us.blackberry.com/enterprise">BlackBerry Enterprise Software - Security &amp; Management for the Enterprise of Things</a></li><li><a title="Christine Gadsby on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/bbchristine/">Christine Gadsby on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Sv0DJ1xZ</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Sv0DJ1xZ" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Chad Loder, co-founder and CEO, Habitu8</title>
      <link>http://securityconversations.fireside.fm/chad-loder-habitu8</link>
      <guid isPermaLink="false">d2f343f6-c9ae-4e29-a5be-bf8f746446b6</guid>
      <pubDate>Tue, 31 Jul 2018 09:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d2f343f6-c9ae-4e29-a5be-bf8f746446b6.mp3" length="45359306" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</itunes:subtitle>
      <itunes:duration>53:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d2f343f6-c9ae-4e29-a5be-bf8f746446b6/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</p><p>Links:</p><ul><li><a title="About Habitu8" rel="nofollow" href="https://www.habitu8.io/about-us/">About Habitu8</a></li><li><a title="Chad Loder on Twitter" rel="nofollow" href="https://twitter.com/chadloder">Chad Loder on Twitter</a></li><li><a title="Rapid7 Acquires Metasploit" rel="nofollow" href="https://www.businesswire.com/news/home/20091021005675/en/Rapid7-Acquires-Metasploit">Rapid7 Acquires Metasploit</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training.</p><p>Links:</p><ul><li><a title="About Habitu8" rel="nofollow" href="https://www.habitu8.io/about-us/">About Habitu8</a></li><li><a title="Chad Loder on Twitter" rel="nofollow" href="https://twitter.com/chadloder">Chad Loder on Twitter</a></li><li><a title="Rapid7 Acquires Metasploit" rel="nofollow" href="https://www.businesswire.com/news/home/20091021005675/en/Rapid7-Acquires-Metasploit">Rapid7 Acquires Metasploit</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+d2FwCZ3k</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+d2FwCZ3k" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Chris Castaldo, Senior Director of Cybersecurity, 2U </title>
      <link>http://securityconversations.fireside.fm/chris-castaldo-2u</link>
      <guid isPermaLink="false">a936371f-8a20-4865-9932-a916fd16a2da</guid>
      <pubDate>Thu, 26 Jul 2018 09:45:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a936371f-8a20-4865-9932-a916fd16a2da.mp3" length="37191493" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it's important to get independent third-party security assessments.</itunes:subtitle>
      <itunes:duration>39:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a936371f-8a20-4865-9932-a916fd16a2da/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it&#39;s important to get independent third-party security assessments.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it&#39;s important to get independent third-party security assessments.</p><p>Links:</p><ul><li><a title="Uptycs" rel="nofollow" href="https://www.uptycs.com/technology">Uptycs</a></li><li><a title="osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure" rel="nofollow" href="https://osquery.io/">osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Chris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it&#39;s important to get independent third-party security assessments.</p><p>Links:</p><ul><li><a title="Uptycs" rel="nofollow" href="https://www.uptycs.com/technology">Uptycs</a></li><li><a title="osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure" rel="nofollow" href="https://osquery.io/">osquery | Easily ask questions about your Linux, Windows, and macOS infrastructure</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+-BruMb8o</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+-BruMb8o" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Wim Remes, CEO and Principal Researcher, Wire Security</title>
      <link>http://securityconversations.fireside.fm/wim-remes-wire-security</link>
      <guid isPermaLink="false">2eee789f-5d35-4620-bef5-79a98b867ffb</guid>
      <pubDate>Mon, 23 Jul 2018 12:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2eee789f-5d35-4620-bef5-79a98b867ffb.mp3" length="29368681" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Founder and CEO of Wire Security Wim Remes discusses the intricacies of penetration testing, red-teaming, bug bounties, and calls for defenders to embrace continuous pen-testing.</itunes:subtitle>
      <itunes:duration>40:42</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2eee789f-5d35-4620-bef5-79a98b867ffb/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Founder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing.</p><p>Links:</p><ul><li><a title="Wim Remes on GitHub" rel="nofollow" href="https://github.com/wimremes/">Wim Remes on GitHub</a></li><li><a title="Wim Remes on Twitter" rel="nofollow" href="https://twitter.com/wimremes">Wim Remes on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Founder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing.</p><p>Links:</p><ul><li><a title="Wim Remes on GitHub" rel="nofollow" href="https://github.com/wimremes/">Wim Remes on GitHub</a></li><li><a title="Wim Remes on Twitter" rel="nofollow" href="https://twitter.com/wimremes">Wim Remes on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+kMOfzKep</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+kMOfzKep" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dan Hubbard, Chief Security Architect, Lacework</title>
      <link>http://securityconversations.fireside.fm/dan-hubbard-lacework</link>
      <guid isPermaLink="false">d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3</guid>
      <pubDate>Mon, 16 Jul 2018 14:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3.mp3" length="33852535" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Lacework Chief Security Architect Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</itunes:subtitle>
      <itunes:duration>38:12</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/d7db6dd9-a8d4-42ec-a94d-b51821f8e4e3/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p><p>Links:</p><ul><li><a title="Containers at risk (PDF direct download)" rel="nofollow" href="https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021,000%20Cloud%20Environments.pdf">Containers at risk (PDF direct download)</a></li><li><a title="Dan Hubbard on Twitter" rel="nofollow" href="https://twitter.com/dhubbard858">Dan Hubbard on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Lacework Chief Security Architect  Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces.</p><p>Links:</p><ul><li><a title="Containers at risk (PDF direct download)" rel="nofollow" href="https://info.lacework.com/hubfs/Containers%20At-Risk_%20A%20Review%20of%2021,000%20Cloud%20Environments.pdf">Containers at risk (PDF direct download)</a></li><li><a title="Dan Hubbard on Twitter" rel="nofollow" href="https://twitter.com/dhubbard858">Dan Hubbard on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+jMO6kQWw</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+jMO6kQWw" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>David Weston, Principal Security Engineering Manager, Microsoft</title>
      <link>http://securityconversations.fireside.fm/david-weston-microsoft</link>
      <guid isPermaLink="false">904ca3fd-d3eb-481f-8a0e-819e0bfd87c4</guid>
      <pubDate>Sun, 24 Jun 2018 18:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4.mp3" length="37022785" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem.</itunes:subtitle>
      <itunes:duration>46:23</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/9/904ca3fd-d3eb-481f-8a0e-819e0bfd87c4/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>David Weston manages the Windows Device and Offensive Security Research teams at Microsoft.  He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft&#39;s products and the current state of security in the Windows ecosystem.</p><p>Links:</p><ul><li><a title="Dave Weston on Twitter" rel="nofollow" href="https://twitter.com/dwizzzlemsft">Dave Weston on Twitter</a></li><li><a title="David Weston: Hardening with Hardware" rel="nofollow" href="https://www.youtube.com/watch?v=8V0wcqS22vc">David Weston: Hardening with Hardware</a> &mdash; In this talk, we will review the metamorphosis and fundamental re-architecture of Windows to take advantage of emerging hardware security capabilities. </li><li><a title="Windows 10 in S mode" rel="nofollow" href="https://www.microsoft.com/en-us/windows/s-mode">Windows 10 in S mode</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+KuuA35s6</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+KuuA35s6" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Rich Seiersen, SVP and CISO, Lending Club</title>
      <link>http://securityconversations.fireside.fm/rich-seiersen-lending-club</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=530</guid>
      <pubDate>Mon, 18 Jun 2018 09:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cacc11a2-aec9-4926-8d62-1cd34a5befdf.mp3" length="27931750" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek's &lt;a href="https://cisoforum.com"&gt;CISO Forum&lt;/a&gt;)</itunes:subtitle>
      <itunes:duration>37:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/c/cacc11a2-aec9-4926-8d62-1cd34a5befdf/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p><span style="font-weight: 400;">SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek&#8217;s <a href="https://cisoforum.com">CISO Forum</a>).</span></p>

<p>&nbsp;</p>

<!--[if lt IE 9]><![endif]-->

<audio class="wp-audio-shortcode" id="audio-530-1" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3?_=1" /><a href="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3">https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><span style="font-weight: 400;">SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek&#8217;s <a href="https://cisoforum.com">CISO Forum</a>).</span></p>

<p>&nbsp;</p>

<!--[if lt IE 9]><![endif]-->

<audio class="wp-audio-shortcode" id="audio-530-1" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3?_=1" /><a href="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3">https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3</a></audio><p>Links:</p><ul><li><a title="Book: How to Measure Anything in Cybersecurity Risk" rel="nofollow" href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741">Book: How to Measure Anything in Cybersecurity Risk</a> &mdash; How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p><span style="font-weight: 400;">SVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek&#8217;s <a href="https://cisoforum.com">CISO Forum</a>).</span></p>

<p>&nbsp;</p>

<!--[if lt IE 9]><![endif]-->

<audio class="wp-audio-shortcode" id="audio-530-1" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3?_=1" /><a href="https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3">https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3</a></audio><p>Links:</p><ul><li><a title="Book: How to Measure Anything in Cybersecurity Risk" rel="nofollow" href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741">Book: How to Measure Anything in Cybersecurity Risk</a> &mdash; How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security.</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+4Zn9MPFL</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+4Zn9MPFL" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Andrew Morris, Founder and CEO, GreyNoise Intelligence</title>
      <link>http://securityconversations.fireside.fm/andrew-morris-greynoise-intelligence</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=521</guid>
      <pubDate>Thu, 31 May 2018 15:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a441617f-9c5d-49d0-8fd8-d21fc211523a.mp3" length="21465394" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Founder and CEO of GreyNoise Intelligence Andrew Morris talks about his anti threat-intelligence company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</itunes:subtitle>
      <itunes:duration>37:19</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a441617f-9c5d-49d0-8fd8-d21fc211523a/cover.jpg?v=6"/>
      <description>
        <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio><p>Links:</p><ul><li><a title="What is GreyNoise?" rel="nofollow" href="https://greynoise.io/blog/2018/2/1/what-is-greynoise">What is GreyNoise?</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Founder and CEO of GreyNoise Intelligence Andrew Morris (<a href="https://twitter.com/andrew___morris">andrew___morris</a>) talks about his &#8220;anti threat-intelligence&#8221; company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-521-2" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3?_=2" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3">https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3</a></audio><p>Links:</p><ul><li><a title="What is GreyNoise?" rel="nofollow" href="https://greynoise.io/blog/2018/2/1/what-is-greynoise">What is GreyNoise?</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+UOOcujX_</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+UOOcujX_" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Yoav Leitersdorf, Managing Partner , YL Ventures</title>
      <link>http://securityconversations.fireside.fm/yoav-leitersdorf-yl-ventures</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=513</guid>
      <pubDate>Mon, 21 May 2018 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/b23f807e-3c66-4fd6-93eb-f9d10a93dda2.mp3" length="19693277" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Managing Partner at YL Ventures, Yoav Leitersdorf, explains the surge in cybersecurity investments in Israel, the priorities for his $75 million fund, and which sectors are ripe for the picking.</itunes:subtitle>
      <itunes:duration>26:07</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/b/b23f807e-3c66-4fd6-93eb-f9d10a93dda2/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Managing Partner at YL Ventures, Yoav Leitersdorf (<a href="https://twitter.com/ylventures" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">ylventures</a>), explains the surge in cybersecurity investments in Israel, the priorities for his $75 million fund and which sectors are ripe for the picking.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-513-3" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3?_=3" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Managing Partner at YL Ventures, Yoav Leitersdorf (<a href="https://twitter.com/ylventures" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">ylventures</a>), explains the surge in cybersecurity investments in Israel, the priorities for his $75 million fund and which sectors are ripe for the picking.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-513-3" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3?_=3" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3</a></audio><p>Links:</p><ul><li><a title="Ask A VC: Yoav Leitersdorf On The Cyber Security Opportunity " rel="nofollow" href="https://techcrunch.com/2014/03/07/ask-a-vc-yl-ventures-yoav-leitersdorf-on-the-cyber-security-opportunity/">Ask A VC: Yoav Leitersdorf On The Cyber Security Opportunity </a> &mdash; In this week’s episode of Ask A VC, we hosted YL Ventures’ Yoav Leitersdorf in the studio to talk about cyber security, innovations in Israel and more.</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Managing Partner at YL Ventures, Yoav Leitersdorf (<a href="https://twitter.com/ylventures" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">ylventures</a>), explains the surge in cybersecurity investments in Israel, the priorities for his $75 million fund and which sectors are ripe for the picking.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-513-3" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3?_=3" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3</a></audio><p>Links:</p><ul><li><a title="Ask A VC: Yoav Leitersdorf On The Cyber Security Opportunity " rel="nofollow" href="https://techcrunch.com/2014/03/07/ask-a-vc-yl-ventures-yoav-leitersdorf-on-the-cyber-security-opportunity/">Ask A VC: Yoav Leitersdorf On The Cyber Security Opportunity </a> &mdash; In this week’s episode of Ask A VC, we hosted YL Ventures’ Yoav Leitersdorf in the studio to talk about cyber security, innovations in Israel and more.</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ynL1Zh4B</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ynL1Zh4B" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Juan Andrés Guerrero-Saade, Principal Security Researcher, Recorded Future</title>
      <link>http://securityconversations.fireside.fm/juan-andres-guerrero-saade-recorded-future</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=499</guid>
      <pubDate>Mon, 14 May 2018 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/f69cb1a6-f5e9-4664-bc82-fc229d5b1de4.mp3" length="53015905" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Principal Security Researcher at Recorded Futures Insikt Group, Juan Andrés Guerrero-Saade, explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don't have to be sophisticated to launch successful attacks.</itunes:subtitle>
      <itunes:duration>1:01:24</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/f69cb1a6-f5e9-4664-bc82-fc229d5b1de4/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Principal Security Researcher at Recorded Future&#8217;s Insikt Group, Juan Andrés Guerrero-Saade (<a href="https://twitter.com/juanandres_gs" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://twitter.com/juanandres_gs&amp;source=gmail&amp;ust=1526399114060000&amp;usg=AFQjCNEoPD1PMwpQPcXxUAGMC6Er-NGdWg">juanandres_gs</a>), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don&#8217;t have to be &#8220;sophisticated&#8221; to launch successful attacks.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-499-4" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3?_=4" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3">https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3</a></audio>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Udi15lhz</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Udi15lhz" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Robert M. Lee, Chief Executive Officer, Dragos Inc.</title>
      <link>http://securityconversations.fireside.fm/robert-m-lee-dragos</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=488</guid>
      <pubDate>Thu, 10 May 2018 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/12cf4cec-e81b-4f38-b8ff-956979ab0e93.mp3" length="65117301" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>The founder and CEO of Dragos, Inc. Robert M. Lee cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</itunes:subtitle>
      <itunes:duration>54:44</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/12cf4cec-e81b-4f38-b8ff-956979ab0e93/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>The founder and CEO of Dragos, Inc. Robert M. Lee (<a href="https://twitter.com/RobertMLee">RobertMLee</a>) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations.</p>

<p>&nbsp;</p>

<audio class="wp-audio-shortcode" id="audio-488-5" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3?_=5" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3</a></audio>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+r-2xn8GS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+r-2xn8GS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Brandon Dixon, Vice President, RiskIQ</title>
      <link>http://securityconversations.fireside.fm/brandon-dixon-riskiq</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=479</guid>
      <pubDate>Wed, 09 May 2018 12:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/55e3820f-eacf-49b8-a98a-9baf2dfd641d.mp3" length="55969497" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>VP of Product at RiskIQ Brandon Dixon delves into nation-state cyber operations, explains why it’s dangerous to underestimate North Korea’s capabilities, and his passion for roasting the perfect coffee bean.</itunes:subtitle>
      <itunes:duration>1:03:10</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/55e3820f-eacf-49b8-a98a-9baf2dfd641d/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>VP of Product at RiskIQ Brandon Dixon (<a href="https://twitter.com/9bplus">@9bplus</a>) delves into nation-state cyber operations, explains why it’s dangerous to underestimate North Korea’s capabilities, and his passion for roasting the perfect coffee bean.</p>

<audio class="wp-audio-shortcode" id="audio-479-6" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3?_=6" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>VP of Product at RiskIQ Brandon Dixon (<a href="https://twitter.com/9bplus">@9bplus</a>) delves into nation-state cyber operations, explains why it’s dangerous to underestimate North Korea’s capabilities, and his passion for roasting the perfect coffee bean.</p>

<audio class="wp-audio-shortcode" id="audio-479-6" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3?_=6" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3</a></audio><p>Links:</p><ul><li><a title="Split Key Coffee" rel="nofollow" href="https://twitter.com/SplitKeyCoffee">Split Key Coffee</a></li><li><a title="Split Key Coffee on Medium" rel="nofollow" href="https://medium.com/split-key-coffee">Split Key Coffee on Medium</a></li><li><a title="Tainted Leaks: Disinformation and Phishing With a Russian Nexus - The Citizen Lab" rel="nofollow" href="https://citizenlab.ca/2017/05/tainted-leaks-disinformation-phish/">Tainted Leaks: Disinformation and Phishing With a Russian Nexus - The Citizen Lab</a> &mdash; This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then “leaked” to achieve specific propaganda aims.</li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>VP of Product at RiskIQ Brandon Dixon (<a href="https://twitter.com/9bplus">@9bplus</a>) delves into nation-state cyber operations, explains why it’s dangerous to underestimate North Korea’s capabilities, and his passion for roasting the perfect coffee bean.</p>

<audio class="wp-audio-shortcode" id="audio-479-6" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3?_=6" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3</a></audio><p>Links:</p><ul><li><a title="Split Key Coffee" rel="nofollow" href="https://twitter.com/SplitKeyCoffee">Split Key Coffee</a></li><li><a title="Split Key Coffee on Medium" rel="nofollow" href="https://medium.com/split-key-coffee">Split Key Coffee on Medium</a></li><li><a title="Tainted Leaks: Disinformation and Phishing With a Russian Nexus - The Citizen Lab" rel="nofollow" href="https://citizenlab.ca/2017/05/tainted-leaks-disinformation-phish/">Tainted Leaks: Disinformation and Phishing With a Russian Nexus - The Citizen Lab</a> &mdash; This report describes an extensive Russia-linked phishing and disinformation campaign. It provides evidence of how documents stolen from a prominent journalist and critic of Russia was tampered with and then “leaked” to achieve specific propaganda aims.</li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+t03pIuI5</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+t03pIuI5" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ryan Huber, Security Architect, Slack</title>
      <link>http://securityconversations.fireside.fm/ryan-huber-slack</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=470</guid>
      <pubDate>Tue, 08 May 2018 16:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/356ed2cf-065c-4092-b71b-5ee407b73e26.mp3" length="75433009" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Slack security architect Ryan Huber talks about the gargantuan task of defending an organization with 8 million daily active users, burnout, and fatigue in security teams and a range of issues around bug bounties and penetration testing.</itunes:subtitle>
      <itunes:duration>1:04:48</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/3/356ed2cf-065c-4092-b71b-5ee407b73e26/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Slack security architect Ryan Huber talks about the gargantuan task of defending an organization with 8 million daily active users, burnout, and fatigue in security teams and a range of issues around bug bounties and penetration testing.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Slack security architect Ryan Huber talks about the gargantuan task of defending an organization with 8 million daily active users, burnout, and fatigue in security teams and a range of issues around bug bounties and penetration testing.</p><p>Links:</p><ul><li><a title="Video of Rob Joyce&#39;s 2016 Enigma talk" rel="nofollow" href="https://www.youtube.com/watch?v=bDJb8WOJYdA">Video of Rob Joyce's 2016 Enigma talk</a></li><li><a title="Ryan Huber on Twitter" rel="nofollow" href="https://twitter.com/ryanhuber">Ryan Huber on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Slack security architect Ryan Huber talks about the gargantuan task of defending an organization with 8 million daily active users, burnout, and fatigue in security teams and a range of issues around bug bounties and penetration testing.</p><p>Links:</p><ul><li><a title="Video of Rob Joyce&#39;s 2016 Enigma talk" rel="nofollow" href="https://www.youtube.com/watch?v=bDJb8WOJYdA">Video of Rob Joyce's 2016 Enigma talk</a></li><li><a title="Ryan Huber on Twitter" rel="nofollow" href="https://twitter.com/ryanhuber">Ryan Huber on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+A6hFSJCw</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+A6hFSJCw" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Ivan Arce, CTO at Quarkslab</title>
      <link>http://securityconversations.fireside.fm/ivan-arce-quarkslab</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=441</guid>
      <pubDate>Fri, 04 May 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/111cab3d-0ff5-4290-8488-07e6149421ce.mp3" length="69299416" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Chief Technology Officer at Quarkslab Ivan Arce tells stories about the birth of penetration testing platforms, the concentration of hacking talent in Argentina, and his focus on security problems in the Android ecosystem.</itunes:subtitle>
      <itunes:duration>1:00:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/111cab3d-0ff5-4290-8488-07e6149421ce/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Chief Technology Officer at Quarkslab Ivan Arce (<a href="https://twitter.com/4dgifts">@4dgifts</a>) tells stories about the birth of penetration testing platforms, the concentration of hacking talent in Argentina, and his focus on security problems in the Android ecosystem.</p>

<audio class="wp-audio-shortcode" id="audio-441-7" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3?_=7" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chief Technology Officer at Quarkslab Ivan Arce (<a href="https://twitter.com/4dgifts">@4dgifts</a>) tells stories about the birth of penetration testing platforms, the concentration of hacking talent in Argentina, and his focus on security problems in the Android ecosystem.</p>

<audio class="wp-audio-shortcode" id="audio-441-7" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3?_=7" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3</a></audio>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Chief Technology Officer at Quarkslab Ivan Arce (<a href="https://twitter.com/4dgifts">@4dgifts</a>) tells stories about the birth of penetration testing platforms, the concentration of hacking talent in Argentina, and his focus on security problems in the Android ecosystem.</p>

<audio class="wp-audio-shortcode" id="audio-441-7" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3?_=7" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3">https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3</a></audio>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+oM6aDjDU</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+oM6aDjDU" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Sinan Eren, Founder and CEO, Fyde</title>
      <link>http://securityconversations.fireside.fm/sinan-eren-fyde</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=431</guid>
      <pubDate>Wed, 02 May 2018 08:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1bdc9378-05fb-4cbb-885e-a635b58b2298.mp3" length="49914123" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Founder and CEO of Fyde (@FydeApp) Sinan Eren discusses the “iOS-ification” of platforms and the security ramifications, the dangers of running AV software, the iOS vs. Android security argument, and his new venture to address mobile phishing attacks.
</itunes:subtitle>
      <itunes:duration>44:18</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1bdc9378-05fb-4cbb-885e-a635b58b2298/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Founder and CEO of Fyde (@<a href="https://twitter.com/FydeApp">FydeApp</a>) Sinan Eren discusses the “iOS-ification” of platforms and the security ramifications, the dangers of running AV software, the iOS vs. Android security argument, and his new venture to address mobile phishing attacks.</p>

<audio class="wp-audio-shortcode" id="audio-431-8" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3?_=8" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3">https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of Fyde (@<a href="https://twitter.com/FydeApp">FydeApp</a>) Sinan Eren discusses the “iOS-ification” of platforms and the security ramifications, the dangers of running AV software, the iOS vs. Android security argument, and his new venture to address mobile phishing attacks.</p>

<audio class="wp-audio-shortcode" id="audio-431-8" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3?_=8" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3">https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3</a></audio><p>Links:</p><ul><li><a title="Security vendors need to stop doing more harm than good" rel="nofollow" href="https://www.zdnet.com/article/security-vendors-heal-thyself-do-good-not-harm/">Security vendors need to stop doing more harm than good</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Founder and CEO of Fyde (@<a href="https://twitter.com/FydeApp">FydeApp</a>) Sinan Eren discusses the “iOS-ification” of platforms and the security ramifications, the dangers of running AV software, the iOS vs. Android security argument, and his new venture to address mobile phishing attacks.</p>

<audio class="wp-audio-shortcode" id="audio-431-8" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3?_=8" /><a href="https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3">https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3</a></audio><p>Links:</p><ul><li><a title="Security vendors need to stop doing more harm than good" rel="nofollow" href="https://www.zdnet.com/article/security-vendors-heal-thyself-do-good-not-harm/">Security vendors need to stop doing more harm than good</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+FbHVODlI</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+FbHVODlI" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Stephen Ridley, Founder and CTO, Senrio</title>
      <link>http://securityconversations.fireside.fm/stephen-ridley-senrio</link>
      <guid isPermaLink="false">https://securityconversations.com/?post_type=podcast&amp;p=421</guid>
      <pubDate>Mon, 30 Apr 2018 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a0478299-5d72-4bd9-8bd0-bc3c553645ba.mp3" length="52952645" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Founder and CTO at Senrio Stephen Ridley talks about the abysmal state of IoT security, his recent exploitation of an IP camera, and router to exfiltrate corporate data and his experience as a minority in the security industry.</itunes:subtitle>
      <itunes:duration>49:58</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a0478299-5d72-4bd9-8bd0-bc3c553645ba/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Founder and CTO at Senrio Stephen Ridley (<a href="https://twitter.com/s7ephen">@s7ephen</a>) talks about the abysmal state of IoT security, his recent exploitation of an IP camera, and router to exfiltrate corporate data and his experience as a minority in the security industry.</p>

<audio class="wp-audio-shortcode" id="audio-421-9" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3?_=9" /><a href="https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3">https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3</a></audio>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Founder and CTO at Senrio Stephen Ridley (<a href="https://twitter.com/s7ephen">@s7ephen</a>) talks about the abysmal state of IoT security, his recent exploitation of an IP camera, and router to exfiltrate corporate data and his experience as a minority in the security industry.</p>

<audio class="wp-audio-shortcode" id="audio-421-9" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3?_=9" /><a href="https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3">https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3</a></audio><p>Links:</p><ul><li><a title="Introducing - Senrio Discovery" rel="nofollow" href="https://blog.senr.io/blog/introducing-senrio-discovery">Introducing - Senrio Discovery</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Founder and CTO at Senrio Stephen Ridley (<a href="https://twitter.com/s7ephen">@s7ephen</a>) talks about the abysmal state of IoT security, his recent exploitation of an IP camera, and router to exfiltrate corporate data and his experience as a minority in the security industry.</p>

<audio class="wp-audio-shortcode" id="audio-421-9" preload="metadata" style="width: 100%;" controls="controls"><source type="audio/mpeg" src="https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3?_=9" /><a href="https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3">https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3</a></audio><p>Links:</p><ul><li><a title="Introducing - Senrio Discovery" rel="nofollow" href="https://blog.senr.io/blog/introducing-senrio-discovery">Introducing - Senrio Discovery</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+gYWRh7TA</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+gYWRh7TA" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Mischel Kwon, Founder and CEO, MKA Cyber</title>
      <link>http://securityconversations.fireside.fm/mischel-kwon-mka-cyber</link>
      <guid isPermaLink="false">1acf96d7-a561-4f6f-a936-75f92e67ca7b</guid>
      <pubDate>Thu, 26 Apr 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1acf96d7-a561-4f6f-a936-75f92e67ca7b.mp3" length="43253945" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</itunes:subtitle>
      <itunes:duration>39:02</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1acf96d7-a561-4f6f-a936-75f92e67ca7b/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT, SOC, remediation</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p><p>Links:</p><ul><li><a title="MKACyber" rel="nofollow" href="https://mkacyber.io/">MKACyber</a></li><li><a title="Mischel Kwon on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mischelkwon/">Mischel Kwon on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Founder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics.</p><p>Links:</p><ul><li><a title="MKACyber" rel="nofollow" href="https://mkacyber.io/">MKACyber</a></li><li><a title="Mischel Kwon on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/mischelkwon/">Mischel Kwon on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+aGQR-T3z</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+aGQR-T3z" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Rick Holland, CISO and VP of Strategy, Digital Shadows</title>
      <link>http://securityconversations.fireside.fm/rick-holland-digital-shadows</link>
      <guid isPermaLink="false">5714f72d-d6d1-4ec0-9ba7-0b5ffbd297de</guid>
      <pubDate>Tue, 24 Apr 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/5714f72d-d6d1-4ec0-9ba7-0b5ffbd297de.mp3" length="55915215" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</itunes:subtitle>
      <itunes:duration>35:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/5714f72d-d6d1-4ec0-9ba7-0b5ffbd297de/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</p><p>Links:</p><ul><li><a title="Rick Holland on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/rick-holland-4737a93/">Rick Holland on LinkedIn</a></li><li><a title="Digital Shadows" rel="nofollow" href="https://www.digitalshadows.com/">Digital Shadows</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>CISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que.</p><p>Links:</p><ul><li><a title="Rick Holland on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/rick-holland-4737a93/">Rick Holland on LinkedIn</a></li><li><a title="Digital Shadows" rel="nofollow" href="https://www.digitalshadows.com/">Digital Shadows</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Qeb6yrhY</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Qeb6yrhY" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Thomas Ptacek, Founder, Latacora</title>
      <link>http://securityconversations.fireside.fm/tom-ptacek-latacora</link>
      <guid isPermaLink="false">1a12e545-c1df-485c-b38f-dacd2356366d</guid>
      <pubDate>Mon, 23 Apr 2018 15:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1a12e545-c1df-485c-b38f-dacd2356366d.mp3" length="42360848" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</itunes:subtitle>
      <itunes:duration>48:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1a12e545-c1df-485c-b38f-dacd2356366d/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</p><p>Links:</p><ul><li><a title="Latacora -- Security Teams For Startups" rel="nofollow" href="https://latacora.com/">Latacora -- Security Teams For Startups</a> &mdash; Latacora does just one kind of engagement: we join your engineering team virtually and run security, for about a year. Then we help you hire someone full-time to replace us.</li><li><a title="Thomas H. Ptacek on Twitter" rel="nofollow" href="https://twitter.com/tqbf">Thomas H. Ptacek on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Latacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry.</p><p>Links:</p><ul><li><a title="Latacora -- Security Teams For Startups" rel="nofollow" href="https://latacora.com/">Latacora -- Security Teams For Startups</a> &mdash; Latacora does just one kind of engagement: we join your engineering team virtually and run security, for about a year. Then we help you hire someone full-time to replace us.</li><li><a title="Thomas H. Ptacek on Twitter" rel="nofollow" href="https://twitter.com/tqbf">Thomas H. Ptacek on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+nlfKo44A</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+nlfKo44A" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Zane Lackey, Chief Security Officer, Signal Sciences</title>
      <link>http://securityconversations.fireside.fm/zane-lackey-signal-sciences</link>
      <guid isPermaLink="false">517fd50b-7794-4b77-a0f5-4c898524b014</guid>
      <pubDate>Mon, 16 Apr 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/517fd50b-7794-4b77-a0f5-4c898524b014.mp3" length="42101169" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</itunes:subtitle>
      <itunes:duration>41:40</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/5/517fd50b-7794-4b77-a0f5-4c898524b014/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</p><p>Links:</p><ul><li><a title="Zane Lackey on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/zane-lackey-66a3404/">Zane Lackey on LinkedIn</a></li><li><a title="Signal Sciences -The Next-Gen Web Protection Platform" rel="nofollow" href="https://www.signalsciences.com/">Signal Sciences -The Next-Gen Web Protection Platform</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Co-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment.</p><p>Links:</p><ul><li><a title="Zane Lackey on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/zane-lackey-66a3404/">Zane Lackey on LinkedIn</a></li><li><a title="Signal Sciences -The Next-Gen Web Protection Platform" rel="nofollow" href="https://www.signalsciences.com/">Signal Sciences -The Next-Gen Web Protection Platform</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+rqnXTx4I</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+rqnXTx4I" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Haroon Meer, CEO, Thinkst Applied Research</title>
      <link>http://securityconversations.fireside.fm/haroon-meer-thinkst-applied-research</link>
      <guid isPermaLink="false">21e54dc1-246e-4efb-a0dd-9cd1ab69a610</guid>
      <pubDate>Thu, 12 Apr 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/21e54dc1-246e-4efb-a0dd-9cd1ab69a610.mp3" length="49733509" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</itunes:subtitle>
      <itunes:duration>1:00:26</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/21e54dc1-246e-4efb-a0dd-9cd1ab69a610/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</p><p>Links:</p><ul><li><a title="Thinkst Canary - how it works" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary - how it works</a></li><li><a title="Video : Enterprise security - A new hope" rel="nofollow" href="https://www.youtube.com/watch?v=gbbq7FSPxdA">Video : Enterprise security - A new hope</a></li><li><a title="Haroon Meer on Twitter" rel="nofollow" href="https://twitter.com/haroonmeer">Haroon Meer on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Thinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market.</p><p>Links:</p><ul><li><a title="Thinkst Canary - how it works" rel="nofollow" href="https://canary.tools/#how-it-works">Thinkst Canary - how it works</a></li><li><a title="Video : Enterprise security - A new hope" rel="nofollow" href="https://www.youtube.com/watch?v=gbbq7FSPxdA">Video : Enterprise security - A new hope</a></li><li><a title="Haroon Meer on Twitter" rel="nofollow" href="https://twitter.com/haroonmeer">Haroon Meer on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+zk_KxtFD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+zk_KxtFD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>David (int eighty), Dual Core</title>
      <link>http://securityconversations.fireside.fm/int-eighty-dual-core</link>
      <guid isPermaLink="false">76f82d6c-8983-4786-abaf-d0426dc65a4c</guid>
      <pubDate>Wed, 11 Apr 2018 15:15:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/76f82d6c-8983-4786-abaf-d0426dc65a4c.mp3" length="34938743" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</itunes:subtitle>
      <itunes:duration>39:34</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/7/76f82d6c-8983-4786-abaf-d0426dc65a4c/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</p><p>Links:</p><ul><li><a title="Dual Core / International hip hop duo" rel="nofollow" href="http://dualcoremusic.com/nerdcore/">Dual Core / International hip hop duo</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Red teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core.</p><p>Links:</p><ul><li><a title="Dual Core / International hip hop duo" rel="nofollow" href="http://dualcoremusic.com/nerdcore/">Dual Core / International hip hop duo</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+ewGSN_bb</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+ewGSN_bb" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dennis Fisher, Editor-in-Chief, Decipher</title>
      <link>http://securityconversations.fireside.fm/dennis-fisher-decipher</link>
      <guid isPermaLink="false">470c2cbd-ffb9-4df1-aa97-1e70410dcc81</guid>
      <pubDate>Thu, 05 Apr 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/470c2cbd-ffb9-4df1-aa97-1e70410dcc81.mp3" length="36569236" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</itunes:subtitle>
      <itunes:duration>43:00</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/470c2cbd-ffb9-4df1-aa97-1e70410dcc81/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</p><p>Links:</p><ul><li><a title="Dennis Fisher | Decipher" rel="nofollow" href="https://duo.com/decipher/article_author/dfisher">Dennis Fisher | Decipher</a> &mdash; He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.</li><li><a title="Dennis Fisher on Twitter" rel="nofollow" href="https://twitter.com/DennisF">Dennis Fisher on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Veteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space.</p><p>Links:</p><ul><li><a title="Dennis Fisher | Decipher" rel="nofollow" href="https://duo.com/decipher/article_author/dfisher">Dennis Fisher | Decipher</a> &mdash; He is one of the co-founders of Threatpost and previously wrote for TechTarget and eWeek, when magazines were still a thing that existed. Dennis enjoys finding the stories behind the headlines and digging into the motivations and thinking of both defenders and attackers. His work has appeared in The Boston Globe, The Improper Bostonian, Harvard Business School’s Working Knowledge, and most of his kids’ English papers.</li><li><a title="Dennis Fisher on Twitter" rel="nofollow" href="https://twitter.com/DennisF">Dennis Fisher on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+SXYH8GbD</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+SXYH8GbD" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Tim Maurer, Scholar, Carnegie Endowment for International Peace</title>
      <link>http://securityconversations.fireside.fm/tim-maurer-carnegie-endowment-for-international-peace</link>
      <guid isPermaLink="false">4cddd571-1e73-4625-acb1-321bb47e706f</guid>
      <pubDate>Mon, 05 Mar 2018 15:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/4cddd571-1e73-4625-acb1-321bb47e706f.mp3" length="29020105" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</itunes:subtitle>
      <itunes:duration>32:31</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/4cddd571-1e73-4625-acb1-321bb47e706f/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Tim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system.</p><p>Links:</p><ul><li><a title="Tim Maurer - Carnegie Endowment for International Peace" rel="nofollow" href="http://carnegieendowment.org/experts/1086">Tim Maurer - Carnegie Endowment for International Peace</a> &mdash; Tim Maurer is the co-director of the Cyber Policy Initiative and a fellow at the Carnegie Endowment for International Peace. Since 2010, his work has been focusing on cybersecurity, human rights in the digital age, and Internet governance, currently with a specific focus on cybersecurity and financial stability.</li><li><a title="Tim Maurer on Twitter" rel="nofollow" href="https://twitter.com/maurertim">Tim Maurer on Twitter</a></li><li><a title="Cyber Mercenaries: The State, Hackers, and Power" rel="nofollow" href="https://www.amazon.com/Cyber-Mercenaries-State-Hackers-Power/dp/110756686X/ref=redir_mobile_desktop?_encoding=UTF8&amp;qid=&amp;ref_=tmm_pap_title_0&amp;sr=">Cyber Mercenaries: The State, Hackers, and Power</a> &mdash; Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. </li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+CN4z68QP</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+CN4z68QP" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Will Lin, Principal and Founding Investor, ForgePoint Capital</title>
      <link>http://securityconversations.fireside.fm/will-lin-forgepoint-capital</link>
      <guid isPermaLink="false">2f444967-e9fd-4c80-87eb-5ff56aee1ae4</guid>
      <pubDate>Fri, 02 Mar 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2f444967-e9fd-4c80-87eb-5ff56aee1ae4.mp3" length="43759308" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</itunes:subtitle>
      <itunes:duration>55:11</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2f444967-e9fd-4c80-87eb-5ff56aee1ae4/cover.jpg?v=3"/>
      <description>
        <![CDATA[<p>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</p><p>Links:</p><ul><li><a title="William Lin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/linwilliam/">William Lin on LinkedIn</a></li><li><a title="Forgepoint portfolio companies" rel="nofollow" href="https://forgepointcap.com/companies/">Forgepoint portfolio companies</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Principal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage.</p><p>Links:</p><ul><li><a title="William Lin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/linwilliam/">William Lin on LinkedIn</a></li><li><a title="Forgepoint portfolio companies" rel="nofollow" href="https://forgepointcap.com/companies/">Forgepoint portfolio companies</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+NvE2QjKy</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+NvE2QjKy" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Pete Chronis, CISO, Turner Broadcasting</title>
      <link>http://securityconversations.fireside.fm/pete-chronis-turner-broadcasting</link>
      <guid isPermaLink="false">2561c251-a654-4949-aefe-33ad83373f80</guid>
      <pubDate>Mon, 26 Feb 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/2561c251-a654-4949-aefe-33ad83373f80.mp3" length="37506970" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Chief Information Security Officer at Turner Broadcasting Pete Chronis discusses his new book on solving the cybersecurity conundrum, the day-to-day grind of securing a global media organization, and the role of the CISO in the modern world.</itunes:subtitle>
      <itunes:duration>45:53</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/2561c251-a654-4949-aefe-33ad83373f80/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Chief Information Security Officer at Turner Broadcasting Pete Chronis discusses his new book on solving the cybersecurity conundrum, the day-to-day grind of securing a global media organization, and the role of the CISO in the modern world.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chief Information Security Officer at Turner Broadcasting Pete Chronis discusses his new book on solving the cybersecurity conundrum, the day-to-day grind of securing a global media organization, and the role of the CISO in the modern world.</p><p>Links:</p><ul><li><a title="The Cyber Conundrum: How Do We Fix Cybersecurity?" rel="nofollow" href="https://www.amazon.com/Cyber-Conundrum-How-Fix-Cybersecurity-ebook/dp/B079WZ592P">The Cyber Conundrum: How Do We Fix Cybersecurity?</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Chief Information Security Officer at Turner Broadcasting Pete Chronis discusses his new book on solving the cybersecurity conundrum, the day-to-day grind of securing a global media organization, and the role of the CISO in the modern world.</p><p>Links:</p><ul><li><a title="The Cyber Conundrum: How Do We Fix Cybersecurity?" rel="nofollow" href="https://www.amazon.com/Cyber-Conundrum-How-Fix-Cybersecurity-ebook/dp/B079WZ592P">The Cyber Conundrum: How Do We Fix Cybersecurity?</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+BOYNUFha</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+BOYNUFha" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Brad Arkin, Chief Security Officer, Adobe</title>
      <link>http://securityconversations.fireside.fm/brad-arkin-adobe</link>
      <guid isPermaLink="false">ab9e9c84-15c6-4f9e-b703-71dc40c23baf</guid>
      <pubDate>Fri, 23 Feb 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/ab9e9c84-15c6-4f9e-b703-71dc40c23baf.mp3" length="44087043" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</itunes:subtitle>
      <itunes:duration>47:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/ab9e9c84-15c6-4f9e-b703-71dc40c23baf/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</p><p>Links:</p><ul><li><a title="Brad Arkin on Twitter" rel="nofollow" href="https://twitter.com/bradarkin">Brad Arkin on Twitter</a></li><li><a title="Security at Adobe" rel="nofollow" href="https://www.adobe.com/security.html">Security at Adobe</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Adobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player.</p><p>Links:</p><ul><li><a title="Brad Arkin on Twitter" rel="nofollow" href="https://twitter.com/bradarkin">Brad Arkin on Twitter</a></li><li><a title="Security at Adobe" rel="nofollow" href="https://www.adobe.com/security.html">Security at Adobe</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+lCuspeLz</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+lCuspeLz" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Aanchal Gupta, Director of Security, Facebook</title>
      <link>http://securityconversations.fireside.fm/aanchal-gupta-facebook</link>
      <guid isPermaLink="false">a134ba7a-9727-47e7-8a46-3ba0c5d705ee</guid>
      <pubDate>Wed, 14 Feb 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/a134ba7a-9727-47e7-8a46-3ba0c5d705ee.mp3" length="30922718" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</itunes:subtitle>
      <itunes:duration>35:38</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/a/a134ba7a-9727-47e7-8a46-3ba0c5d705ee/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</p><p>Links:</p><ul><li><a title="Aanchal Gupta on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/aanchalgupta/">Aanchal Gupta on LinkedIn</a></li><li><a title="Facebook Security" rel="nofollow" href="https://www.facebook.com/security/">Facebook Security</a></li><li><a title="Cybersecurity Needs Diversity" rel="nofollow" href="https://staysafeonline.org/blog/diversity-needed-cybersecurity-unique-experience-helps-protect-people/">Cybersecurity Needs Diversity</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Director of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles.</p><p>Links:</p><ul><li><a title="Aanchal Gupta on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/aanchalgupta/">Aanchal Gupta on LinkedIn</a></li><li><a title="Facebook Security" rel="nofollow" href="https://www.facebook.com/security/">Facebook Security</a></li><li><a title="Cybersecurity Needs Diversity" rel="nofollow" href="https://staysafeonline.org/blog/diversity-needed-cybersecurity-unique-experience-helps-protect-people/">Cybersecurity Needs Diversity</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+VtBODfTR</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+VtBODfTR" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Tom Conklin, Director of Security and Compliance, Vera Security</title>
      <link>http://securityconversations.fireside.fm/tom-conklin-vera-security</link>
      <guid isPermaLink="false">dcd14ec8-d9f0-4245-9324-6291ad4d10a7</guid>
      <pubDate>Thu, 08 Feb 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/dcd14ec8-d9f0-4245-9324-6291ad4d10a7.mp3" length="30629828" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</itunes:subtitle>
      <itunes:duration>33:28</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/d/dcd14ec8-d9f0-4245-9324-6291ad4d10a7/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</p><p>Links:</p><ul><li><a title="Vera Security" rel="nofollow" href="https://www.vera.com/">Vera Security</a></li><li><a title="Tom Conklin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tom-conklin-b4037713/">Tom Conklin on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Senior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators.</p><p>Links:</p><ul><li><a title="Vera Security" rel="nofollow" href="https://www.vera.com/">Vera Security</a></li><li><a title="Tom Conklin on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/tom-conklin-b4037713/">Tom Conklin on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+4Zex_-G5</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+4Zex_-G5" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>John Terrill, CISO, Fox News, Fox Business and Fox Television</title>
      <link>http://securityconversations.fireside.fm/john-terrill-fox-news</link>
      <guid isPermaLink="false">11a6011e-7ad8-418f-a302-37a700a11d45</guid>
      <pubDate>Tue, 06 Feb 2018 14:30:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/11a6011e-7ad8-418f-a302-37a700a11d45.mp3" length="41862607" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</itunes:subtitle>
      <itunes:duration>47:15</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/11a6011e-7ad8-418f-a302-37a700a11d45/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</p><p>Links:</p><ul><li><a title="John Terrill on Twitter" rel="nofollow" href="https://twitter.com/youbetyourballs">John Terrill on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Chief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative.</p><p>Links:</p><ul><li><a title="John Terrill on Twitter" rel="nofollow" href="https://twitter.com/youbetyourballs">John Terrill on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+8aW7BaXU</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+8aW7BaXU" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Christopher Ahlberg, CEO, Recorded Future</title>
      <link>http://securityconversations.fireside.fm/christopher-ahlberg-recorded-future</link>
      <guid isPermaLink="false">6fc1d3cb-e930-484f-84e6-8c521ddb9e97</guid>
      <pubDate>Tue, 30 Jan 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/6fc1d3cb-e930-484f-84e6-8c521ddb9e97.mp3" length="33265132" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</itunes:subtitle>
      <itunes:duration>29:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/6fc1d3cb-e930-484f-84e6-8c521ddb9e97/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Co-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall.</p><p>Links:</p><ul><li><a title="Recorded Future" rel="nofollow" href="https://www.recordedfuture.com/">Recorded Future</a></li><li><a title="Christopher Ahlberg on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/christopherahlberg/">Christopher Ahlberg on LinkedIn</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Xbz6Gxtx</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Xbz6Gxtx" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Masha Sedova, co-founder, Elevate Security</title>
      <link>http://securityconversations.fireside.fm/masha-sedova-elevate-security</link>
      <guid isPermaLink="false">fa20320a-7a94-45b5-b054-bbe06d3b723b</guid>
      <pubDate>Fri, 26 Jan 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/fa20320a-7a94-45b5-b054-bbe06d3b723b.mp3" length="33579206" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</itunes:subtitle>
      <itunes:duration>30:03</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/f/fa20320a-7a94-45b5-b054-bbe06d3b723b/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</p><p>Links:</p><ul><li><a title="Masha Sedova on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/msedova/">Masha Sedova on LinkedIn</a></li><li><a title="Hacker&#39;s Mind by Elevate Security" rel="nofollow" href="https://elevatesecurity.com/hackers-mind/">Hacker's Mind by Elevate Security</a></li><li><a title="Masha Sedova on Twitter" rel="nofollow" href="https://twitter.com/modMasha">Masha Sedova on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>As businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions.</p><p>Links:</p><ul><li><a title="Masha Sedova on LinkedIn" rel="nofollow" href="https://www.linkedin.com/in/msedova/">Masha Sedova on LinkedIn</a></li><li><a title="Hacker&#39;s Mind by Elevate Security" rel="nofollow" href="https://elevatesecurity.com/hackers-mind/">Hacker's Mind by Elevate Security</a></li><li><a title="Masha Sedova on Twitter" rel="nofollow" href="https://twitter.com/modMasha">Masha Sedova on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+bbebZtVS</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+bbebZtVS" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Paul Roberts, Editor-in-Chief, Security Ledger</title>
      <link>http://securityconversations.fireside.fm/paul-roberts-security-ledger</link>
      <guid isPermaLink="false">476c43ff-be49-4057-b965-928abc39b9af</guid>
      <pubDate>Fri, 19 Jan 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/476c43ff-be49-4057-b965-928abc39b9af.mp3" length="47164187" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</itunes:subtitle>
      <itunes:duration>40:59</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/4/476c43ff-be49-4057-b965-928abc39b9af/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p><p>Links:</p><ul><li><a title="The Security Ledger" rel="nofollow" href="https://securityledger.com/">The Security Ledger</a></li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Veteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation.</p><p>Links:</p><ul><li><a title="The Security Ledger" rel="nofollow" href="https://securityledger.com/">The Security Ledger</a></li><li><a title="Paul Roberts on Twitter" rel="nofollow" href="https://twitter.com/paulfroberts">Paul Roberts on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+g61yIrPa</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+g61yIrPa" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Dino Dai Zovi, co-founder and CTO, Capsule8</title>
      <link>http://securityconversations.fireside.fm/dino-dai-zovi-capsule8</link>
      <guid isPermaLink="false">25fade91-a24d-4173-9831-ddf30dc0d051</guid>
      <pubDate>Thu, 11 Jan 2018 14:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/25fade91-a24d-4173-9831-ddf30dc0d051.mp3" length="38280103" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</itunes:subtitle>
      <itunes:duration>39:57</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/2/25fade91-a24d-4173-9831-ddf30dc0d051/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p><p>Links:</p><ul><li><a title="Part One: Detecting Meltdown using Capsule8" rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-using-capsule8/">Part One: Detecting Meltdown using Capsule8</a></li><li><a title="Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels " rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-spectre-detecting-cache-side-channels/">Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels </a></li><li><a title="10 questions for MacBook hacker Dino Dai Zovi" rel="nofollow" href="https://www.zdnet.com/article/10-questions-for-macbook-hacker-dino-dai-zovi/">10 questions for MacBook hacker Dino Dai Zovi</a></li><li><a title="Dino Dai Zovi on Twitter" rel="nofollow" href="https://twitter.com/dinodaizovi">Dino Dai Zovi on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker.</p><p>Links:</p><ul><li><a title="Part One: Detecting Meltdown using Capsule8" rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-using-capsule8/">Part One: Detecting Meltdown using Capsule8</a></li><li><a title="Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels " rel="nofollow" href="https://capsule8.com/blog/detecting-meltdown-spectre-detecting-cache-side-channels/">Part Two: Detecting Meltdown and Spectre by Detecting Cache Side Channels </a></li><li><a title="10 questions for MacBook hacker Dino Dai Zovi" rel="nofollow" href="https://www.zdnet.com/article/10-questions-for-macbook-hacker-dino-dai-zovi/">10 questions for MacBook hacker Dino Dai Zovi</a></li><li><a title="Dino Dai Zovi on Twitter" rel="nofollow" href="https://twitter.com/dinodaizovi">Dino Dai Zovi on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+pOA2PymR</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+pOA2PymR" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Sharon Anolik, President and Founder, Privacy Panacea</title>
      <link>http://securityconversations.fireside.fm/sharon-anolik-privacy-panacea</link>
      <guid isPermaLink="false">0a1d0429-f768-4175-8f48-9416cb420157</guid>
      <pubDate>Thu, 04 Jan 2018 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/0a1d0429-f768-4175-8f48-9416cb420157.mp3" length="48156317" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</itunes:subtitle>
      <itunes:duration>43:51</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/0/0a1d0429-f768-4175-8f48-9416cb420157/cover.jpg?v=4"/>
      <description>
        <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p><p>Links:</p><ul><li><a title="Privacy Panacea" rel="nofollow" href="https://www.privacypanacea.com/">Privacy Panacea</a></li><li><a title="Sharon Anolik on Twitter" rel="nofollow" href="https://twitter.com/PrivacyPanacea">Sharon Anolik on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Sharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’</p><p>Links:</p><ul><li><a title="Privacy Panacea" rel="nofollow" href="https://www.privacypanacea.com/">Privacy Panacea</a></li><li><a title="Sharon Anolik on Twitter" rel="nofollow" href="https://twitter.com/PrivacyPanacea">Sharon Anolik on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Whr8Ea3n</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Whr8Ea3n" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Kim Zetter, Journalist and Author</title>
      <link>http://securityconversations.fireside.fm/kim-zetter</link>
      <guid isPermaLink="false">bf98d79b-204e-4a5f-9418-75c5b554a26e</guid>
      <pubDate>Fri, 29 Dec 2017 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/bf98d79b-204e-4a5f-9418-75c5b554a26e.mp3" length="56197391" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</itunes:subtitle>
      <itunes:duration>52:06</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/cover.jpg?v=15"/>
      <description>
        <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, threatintel, APT</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Award-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry.</p><p>Links:</p><ul><li><a title="Kim Zetter on Twitter" rel="nofollow" href="https://twitter.com/KimZetter">Kim Zetter on Twitter</a></li><li><a title="Countdown to Zero Day: Stuxnet and the Launch of the World&#39;s First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books" rel="nofollow" href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: Kim Zetter: 9780770436193: Amazon.com: Books</a></li><li><a title="Was Georgia’s Election System Hacked in 2016? " rel="nofollow" href="https://www.politico.com/magazine/story/2018/07/18/mueller-indictments-georgia-voting-infrastructure-219018">Was Georgia’s Election System Hacked in 2016? </a></li><li><a title="Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States " rel="nofollow" href="https://motherboard.vice.com/en_us/article/mb4ezy/top-voting-machine-vendor-admits-it-installed-remote-access-software-on-systems-sold-to-states">Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States </a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+4A_8P7AL</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+4A_8P7AL" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Kelly Jackson Higgins, Executive Editor, Dark Reading</title>
      <link>http://securityconversations.fireside.fm/kelly-jackson-higgins-dark-reading</link>
      <guid isPermaLink="false">66709e24-8186-4569-921c-d9b48756d089</guid>
      <pubDate>Wed, 20 Dec 2017 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/66709e24-8186-4569-921c-d9b48756d089.mp3" length="35129760" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</itunes:subtitle>
      <itunes:duration>39:55</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/6/66709e24-8186-4569-921c-d9b48756d089/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, securityawareness, </itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p><p>Links:</p><ul><li><a title="Kelly Jackson Higgins on Twitter" rel="nofollow" href="https://twitter.com/kjhiggins">Kelly Jackson Higgins on Twitter</a></li><li><a title="Dark Reading" rel="nofollow" href="https://www.darkreading.com/">Dark Reading</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Dark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely.</p><p>Links:</p><ul><li><a title="Kelly Jackson Higgins on Twitter" rel="nofollow" href="https://twitter.com/kjhiggins">Kelly Jackson Higgins on Twitter</a></li><li><a title="Dark Reading" rel="nofollow" href="https://www.darkreading.com/">Dark Reading</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+gccWByFZ</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+gccWByFZ" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
    <item>
      <title>Katie Moussouris, co-founder and CEO, Luta Security</title>
      <link>http://securityconversations.fireside.fm/katie-moussouris-luta-security</link>
      <guid isPermaLink="false">1bdec75a-1efc-454a-ad6b-8f56c2b526b7</guid>
      <pubDate>Wed, 06 Dec 2017 13:00:00 -0700</pubDate>
      <author>naraine@gmail.com (Security Conversations)</author>
      <enclosure url="https://aphid.fireside.fm/d/1437767933/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/1bdec75a-1efc-454a-ad6b-8f56c2b526b7.mp3" length="54354347" type="audio/mpeg"/>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Security Conversations</itunes:author>
      <itunes:subtitle>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</itunes:subtitle>
      <itunes:duration>52:54</itunes:duration>
      <itunes:explicit>false</itunes:explicit>
      <itunes:image href="https://assets.fireside.fm/file/fireside-images-2024/podcasts/images/5/5f0c01ff-49f1-4c51-a8f8-f14c0d9bc72e/episodes/1/1bdec75a-1efc-454a-ad6b-8f56c2b526b7/cover.jpg?v=5"/>
      <description>
        <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p>]]>
      </description>
      <itunes:keywords>cybersecurity, CISOs, bugbounty</itunes:keywords>
      <content:encoded>
        <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p><p>Links:</p><ul><li><a title="Luta Security" rel="nofollow" href="http://lutasecurity.com/">Luta Security</a></li><li><a title="How I Got Here: Katie Moussouris" rel="nofollow" href="https://threatpost.com/how-i-got-here-katie-moussouris/102784/">How I Got Here: Katie Moussouris</a></li><li><a title="It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online" rel="nofollow" href="https://www.csoonline.com/article/3271088/security/katie-moussouris-its-dangerous-to-conflate-bug-bounties-and-vulnerability-disclosure.html">It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online</a></li><li><a title="Katie Moussouris (@k8em0) on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris (@k8em0) on Twitter</a></li></ul>]]>
      </content:encoded>
      <itunes:summary>
        <![CDATA[<p>Computer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry.</p><p>Links:</p><ul><li><a title="Luta Security" rel="nofollow" href="http://lutasecurity.com/">Luta Security</a></li><li><a title="How I Got Here: Katie Moussouris" rel="nofollow" href="https://threatpost.com/how-i-got-here-katie-moussouris/102784/">How I Got Here: Katie Moussouris</a></li><li><a title="It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online" rel="nofollow" href="https://www.csoonline.com/article/3271088/security/katie-moussouris-its-dangerous-to-conflate-bug-bounties-and-vulnerability-disclosure.html">It’s dangerous to conflate bug bounties and vulnerability disclosure | CSO Online</a></li><li><a title="Katie Moussouris (@k8em0) on Twitter" rel="nofollow" href="https://twitter.com/k8em0">Katie Moussouris (@k8em0) on Twitter</a></li></ul>]]>
      </itunes:summary>
      <fireside:playerURL>https://fireside.fm/player/v2/KGx-rfAd+Is9_gTXE</fireside:playerURL>
      <fireside:playerEmbedCode>
        <![CDATA[<iframe src="https://fireside.fm/player/v2/KGx-rfAd+Is9_gTXE" width="740" height="200" frameborder="0" scrolling="no">]]>
      </fireside:playerEmbedCode>
      <podcast:person email="" href="https://securityconversations.com" role="host">Ryan Naraine</podcast:person>
    </item>
  </channel>
</rss>
