Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Health & Fitness
Technology
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
US
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/6d/de/c8/6ddec851-2ca1-fac2-048b-e738cbee5874/mza_5244608465002210952.jpg/600x600bb.jpg
Three Buddy Problem
Security Conversations
174 episodes
6 days ago
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).
Show more...
Technology
News,
Tech News
RSS
All content for Three Buddy Problem is the property of Security Conversations and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).
Show more...
Technology
News,
Tech News
Episodes (20/174)
Three Buddy Problem
Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service

Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire.

Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.

Cast: Dakota Cary, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Dakota Cary on LinkedIn
  • China’s Covert Capabilities -- Silk Spun From Hafnium
  • HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
  • Microsoft Probing Whether Chinese Hackers Found Flaw Via MAPP
  • Cybersecurity Law of the People’s Republic of China
  • Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
  • Fire Ant: Hypervisor-Level Espionage Targeting VMware ESXi & vCenter
  • Singapore actively dealing with ongoing China cyberattack
  • Iranians Targeted With Spyware in Lead-Up to War With Israel — all inside Iran and working either in the country’s technology sector or for the government.
  • LABScon 2025
  • Apple in China (book)
Show more...
6 days ago
1 hour 51 minutes 42 seconds

Three Buddy Problem
Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days

Three Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.

We also revisit the ProPublica bombshell about Microsoft's "digital escorts" and U.S. government data exposure to Chinese adversaries and the company's "oops, we will stop" response. Plus, trusting Google's Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Three Buddy Problem LIVE at Black Hat
  • TBP at Countermeasures 2025
  • CODE WHITE GmbH ToolShell exploit
  • Microsoft guidance for SharePoint vulnerability CVE-2025-53770
  • Kaspersky on ToolShell: A story of five Sharepoint vulns
  • Ryan's EkoParty keynote on Microsoft culture
  • Microsoft Disrupting active exploitation of on-prem SharePoint flaws
  • SentinelLabs on Sharepoint zero-day in-the-wild
  • ESET on ToolShell: An all-you-can-eat buffet for threat actors
  • Microsoft Stops Using China-Based Engineers for DoD Computer Systems
  • AI coding platform goes rogue during code freeze and deletes entire company database
  • Jason Lemkin: Replit goes rogue
  • John Hultquist on Big Dream AI
  • LABScon 2025
Show more...
1 week ago
1 hour 55 minutes 13 seconds

Three Buddy Problem
Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’

Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.

Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Europol targets NoName057(16) pro-Russian cybercrime network
  • Europe's most wanted list
  • UK sanctions Russian spies linked to Mariupol strikes
  • Profile: GRU cyber and hybrid threat operations
  • Lindsay Freeman: War Crimes for Fun and Profit
  • Lindsay Freeman bio
  • CISA: End-of-Train and Head-of-Train Remote Linking Protocol
  • Background of train vulnerability (CVE-2025-1727)
  • ProPublica on Microsoft “Digital Escorts”
  • Google’s Big Sleep AI bug-finding claims
  • EchoLeak (CVE-2025-32711)
  • Russian vodka producer reports disruptions after ransomware attack
  • Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer
  • Another exploited Google Chrome zero-day
  • Three Buddy Problem LIVE at Black Hat
  • Ringzer0 COUNTERMEASURE
Show more...
2 weeks ago
1 hour 48 minutes 45 seconds

Three Buddy Problem
How did China get Microsoft's zero-day exploits?

Three Buddy Problem - Episode 53: We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?

Plus, China's massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • US Gov: Prolific Chinese state-sponsored contract hacker arrested
  • Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits
  • Microsoft Exchange Server Attack Timeline
  • YouTube: Orange Tsai on ProxyLogon
  • Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace
  • The Growing Role of Cyber Militias in China’s Network Warfare Force Structure
  • NCA arrest four for attacks on M&S, Co-op and Harrods
  • Four arrested by UK police over ransomware attacks on M&S, Co-op and Harrods
  • Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war
  • Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war
  • Batavia spyware targeting Russian organizations
  • Chainalysis: First-ever crypto seizure in Greece
  • Ringzer0 COUNTERMEASURE — Three Buddy Problem discount code for training: CM25-3BUDDY
  • LABScon 2025
Show more...
4 weeks ago
1 hour 49 minutes 5 seconds

Three Buddy Problem
Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT

Three Buddy Problem - Episode 52: Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.

Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Houken: Seeking a path by living on the edge with zero-days
  • China-nexus APTs recon on top-tier targets
  • French cybersecurity agency confirms government affected by Ivanti hacks
  • Top FBI cyber official: Salt Typhoon ‘largely contained’
  • Operation Blockbuster (Novetta)
  • Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks
  • Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure
  • cisagov/thorium
Show more...
1 month ago
1 hour 34 minutes 16 seconds

Three Buddy Problem
Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks

Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blinding cyberattacks that paved the way for Israel’s air raid, the human cost of sudden ATM outages and unpaid salaries, and the puzzling “Code Breakers” data leak that preceded it all.

Hamid shares on-the-ground context, the buddies debate whether cyber operations can sway a shooting war, and everyone tries to gauge Iran’s true offensive muscle under sanctions.

Cast: Hamid Kashfi, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Pro-Israel hackers take credit for cyberattack on Iran's Bank Sepah
  • Predatory Sparrow Burns $90 Million on Iranian Crypto Exchange in Cyber Shadow War
  • Codebreakers and Predatory Sparrow
  • Iranian Exchange Nobitex: The $90M Exploit
  • Iranian newspaper: Defense system was hacked
  • Iranian state TV shows footage of Israeli drone
  • Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
  • Israeli Officials Warn Iran Is Hijacking Security Cameras to Spy
  • LABScon - Security Research in Real Time
  • Three Buddy Problem LIVE
  • Hamid Kashfi: The curious case of Predatory Sparrow
  • Glasshouse episode with Hamid Kashfi
Show more...
1 month ago
3 hours 7 minutes 13 seconds

Three Buddy Problem
Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms

Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes.

Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s brush with Chinese APTs, Citizen Lab’s forensic takedown of Paragon’s iPhone spyware, and the sneaky Meta/Yandex trick that links Android web browsing to app IDs.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Israel-Iran war breaks out
  • 'The magnet of threats'
  • Mossad set up drone swarm base in Iran
  • Stealth Falcon's Exploit of Microsoft Zero Day
  • CVE-2025-33053 - WebDAV remote code execution
  • CISA, Microsoft warn of Windows zero-day
  • China-nexus Threat actors target SentinelOne
  • Chinese Espionage Crews Circle SentinelOne
  • Citizen Lab: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted - The Citizen Lab
  • Meta and Yandex are de-anonymizing Android users’ web browsing identifiers
  • Dreadnode Offensive AI Conference
  • LABScon Call for Papers
Show more...
1 month ago
1 hour 51 minutes 48 seconds

Three Buddy Problem
Mikko Hypponen talks drone warfare, APT naming schemes

Three Buddy Problem - Episode 49: Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”.

Plus, news on Ukraine’s hack of bomber-maker Tupolev, the industry’s never-ending APT naming mess, iVerify’s newly disclosed iMessage zero-click bug, fresh Qualcomm GPU exploits still unpatched on Android devices, and Cellebrite’s purchase of Corellium.

Cast: Ryan Naraine, Costin Raiu and Mikko Hypponen

  • Juan Andres Guerrero-Saade is out this week at Sleuthcon.

Links:

  • Transcript (unedited, AI-generated)
  • Mikko Hyppönen pivots from infosec to drones inspired by war
  • Mikko Hypponen Leaves Anti-Malware Industry to Fight Against Drones
  • Anti-drone system | Sensofusion
  • Ukraine's military intelligence claims cyberattack on Russian strategic bomber maker
  • How Microsoft names threat actors
  • CrowdStrike and Microsoft Unite to Deconflict Cyber Threat Attribution
  • Qualcomm GPU driver 0days (exploitation detected)
  • Chrome 0day exploited in the wild
  • iVerify documents 'Nickname' iMessage exploitation
  • Cellebrite to acquire mobile testing firm Corellium
  • Hacker Chris Wade reveals the story of his presidential pardon, US government collaboration
Show more...
2 months ago
1 hour 29 minutes 4 seconds

Three Buddy Problem
The dark hole of 'friendlies' and Western APTs

Three Buddy Problem - Episode 48: We unpack a Dutch intelligence agencies report on ‘Laundry Bear’ and Microsoft’s parallel ‘Void Blizzard’ write-up, finding major gaps and bemoaning the absence of IOCs. Plus, discussion on why threat-intel naming is so messy, how initial-access brokers are powering even nation-state break-ins, and whether customers (or vendors) are to blame for the confusion.

Plus, thoughts on an academic paper on the vanishing art of Western companies exposing Western (friendly) APT operations, debate whether stealth or self-censorship is to blame, and the long-tail effects on cyber paleontology.

We also dig into Sean Heelan’s proof that OpenAI’s new reasoning model can spot a Linux kernel 0-day and the implications for humans in the bug-hunting chain.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Dutch intelligence agency outs 'Laundry Bear' Russian APT
  • Russian gov hackers buying passwords from cybercriminals
  • Microsoft: Russian actor Void Blizzard targets critical sectors for espionage
  • Censys data on AyySSHush ASUS router botnet
  • Czech Republic statement on Chinese hack
  • Czech gov condemns Chinese hack on critical infrastructure
  • NATO floats cybersecurity included in new spending target
  • Mark your Google Calendar: APT41 innovative tactics
  • The rise of responsible behavior: Western commercial reports on Western cyber threat actors
  • How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
  • ASUS Botnet Tracker
  • CISA: Logging Made Easy (LME)
Show more...
2 months ago
2 hours 11 minutes 19 seconds

Three Buddy Problem
Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate

Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge devices repurposed as honeypots.

The back half veers into Microsoft’s resurrected Windows Recall, Signal’s new screenshot-blocking countermeasure, Japan’s fresh legal mandate for pre-emptive cyber strikes, and why appliance vendors like Ivanti keep landing in the headlines.

Along the way you get hot takes on techno-feudalism, Johnny Ive’s rumored AI gadget, and a lively debate over whether publishing exploit code ever helps defenders.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Russian hackers hitting logistics companies supplying Ukraine
  • CISA says Russian hackers targeting Ukraine war supply lines
  • ViciousTrap: Turning edge devices into honeypots
  • BadSuccessor: Abusing dMSA to escalate privileges in Active Directory
  • Signal adds anti-screenshot to thwart Windows Recall
  • Controversial Windows Recall gets security makeover
  • Microsoft's International Criminal Court blockade
  • Japan enacts active cyberdefense law
  • UAE recruiting US personnel Displaced by DOGE
Show more...
2 months ago
2 hours 30 minutes 37 seconds

Three Buddy Problem
A Coinbase breach with bribes, rogue contractors and a $20M ransom demand

Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Coinbase on $20m ransom demand
  • SEC filing on Coinbase breach
  • Coinbase Rogue Contractors Bribed to Leak Customer Data
  • Ivanti 0day exploit chain (CVE-2025-4427 and CVE-2025-4428)
  • Watchtowr blog on new Ivanti 0days
  • CISA Known Exploited Vulnerabilities (KEV)
  • 'Advanced Protection' comes to Android 16
  • Europe launches it own vulnerability database
Show more...
2 months ago
2 hours 23 minutes 34 seconds

Three Buddy Problem
JAGS keynote: The intricacies of wartime cyber threat intelligence

Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week).

In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be aware of the real-world consequences of their work and the ethical responsibility that comes with it.

Acknowledgment: Credit for the audio goes to CyberThreat 2023, SANS Institute, NCSC, and SentinelOne.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Keynote transcript
  • The ethics and perils of APT research
  • Recommended Talks
  • The Lost APT Reports
Show more...
3 months ago
31 minutes 7 seconds

Three Buddy Problem
Signalgate redux, OpenAI's Aardvark, normalizing cyber offense

Three Buddy Problem - Episode 44: We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors.

Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • US government using obscure app to archive Signal messages
  • Reuters photo of Mike Waltz phone
  • US revokes Romania visa waiver program
  • OpenSSH bug found by OpenAI 'Aardvark'
  • JP Morgan Chase CISO: An open letter to third-party suppliers
  • JPMorgan Chase CISO Fires Warning Shot Ahead of RSA Conference
  • SentinelOne LABS on DPRK threat actor targeting
  • Alexei Bulazel comments at RSA conference
  • Google report on 0day exploitation in 2024
  • Apple notifies new victims of spyware attacks across the world
  • France attributes cyberattacks to Russia's military intelligence
  • RT-Solar on ViPNet backdoor from 2021
  • Kaspersky: Sophisticated backdoor mimicking secure networking software updates
  • $330m Bitcoin heist
Show more...
3 months ago
2 hours 38 minutes 40 seconds

Three Buddy Problem
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security

Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights.

Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices.

Cast: Thomas Rid, Juan Andres Guerrero-Saade and Ryan Naraine. Costin Raiu is away this week.

Links:

  • Transcript (unedited, AI-generated)
  • Anthropic: Exploring AI model welfare, consciousness
  • David Chalmers: Taking AI Welfare Seriously
  • Sam Altman: AI privacy safeguards can’t be established before ‘problems emerge’
  • TP-Link router pricing and China ties under US gov probe
  • Bloomberg: TP-Link’s US Future Hinges on Claimed Split From China
  • Verizon DBIR 2015 (full report)
  • Mandiant M-Trends 2025 Report
  • FBI seeking tips about China's 'Salt Typhoon' hackers
  • North Korean Cryptocurrency Thieves Caught Hijacking Zoom ‘Remote Control’ Feature
  • Dan Geer on the realpolitik of cybersecurity
  • LABScon 2025 CFP is open
  • Ransom War by Max Smeets
Show more...
3 months ago
1 hour 33 minutes 42 seconds

Three Buddy Problem
China doxxes NSA, CVE's funding crisis, Apple's zero-day troubles

Three Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games. Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days.

Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • China names alleged NSA cyberattack agents
  • WSJ: In Secret Meeting, China Acknowledged Role in U.S. Infrastructure Hacks
  • Apple Quashes Two Zero-Days With iOS, MacOS Patches
  • Apple bulletin - iOS 18.4.1 Security Vulnerabilities
  • Android zero-days documented
  • MITRE CVE Program Gets Last-Hour Funding Reprieve
  • NIST Still Struggling to Clear Vulnerability Submissions Backlog in NVD
  • EU issues US-bound staff with burner phones to avoid espionage
  • Exploitation of CLFS zero-day leads to ransomware
  • Google announces Sec-Gemini v1 cybersecurity model
Show more...
3 months ago
1 hour 39 minutes 19 seconds

Three Buddy Problem
NSA director fired, Ivanti's 0day screw-up, backdoor in robot dogs

Three Buddy Problem - Episode 41: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang's keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti's misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices. Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh.

We also discuss Microsoft touting AI's value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a backdoor in a popular Chinese robot dog, and Chinese dominance of the robotics market.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • National Security Agency chief ousted after far-right activist urged his removal
  • Mandiant: China-Nexus Threat Actor Actively Exploiting Critical Ivanti Connect Secure Vulnerability
  • Ivanti security bulletin (CVE-2025-22457)
  • Chinese APT exploits misdiagnosed RCE in Ivanti VPNs
  • Another exploited 0day in Apple iOS
  • Android version of Lockdown Mode coming
  • Microsoft: Using AI to find open-source bootloader flaws
  • Indiana University cybersecurity "safe" after FBI home searches
  • Silent Push: Russians impersonate CIA to target Ukraine sympathizers
  • Unitree Go1 robot dog backdoor documentation
  • America is missing in the robotics race
  • Automated AI Reverse Engineering with MCP for IDA and Ghidra
  • Bunny Huang: Perspectives on trust in hardware supply chains
Show more...
4 months ago
1 hour 36 minutes 57 seconds

Three Buddy Problem
Signalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returns

Three Buddy Problem - Episode 40: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who's behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • The Atlantic: The Trump admin accidentally texted me its war plans
  • The Atlantic: Here are the attack plans shared on Signal
  • Signal statement on SignalGate
  • Our experts separate Signal from noise in the Trump team group chat
  • Operation ForumTroll exploits zero-days in Google Chrome
  • PuzzleMaker attacks with Chrome zero-day exploit chain
  • Ten most mysterious APT campaigns that remain unattributed
  • Operation FishMedley linked to i-SOON
  • Chinese gov agency on mobile attacks by US intel agencies
  • LabDookhtegan Telegram channel
  • Tornado Cash sanctions removed
  • Intrusion Truth
  • Lab Dookhtegan archives on CyberScoop
Show more...
4 months ago
1 hour 52 minutes 34 seconds

Three Buddy Problem
China exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cuts

Three Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs.

Cast: Katie Moussouris, Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • China's MSS discloses Taiwan APTs
  • Antiy report Taiwan's "Green Spot" attack group
  • Citizen Lab on Paragon’s Proliferating Spyware Operations
  • Operation Zero wants Telegram 1-click RCE exploits
  • Operation Zero 0day Vulnerability Platform
  • GitHub Action supply chain attack
  • Blast radius of GitHub Action supply chain attack
  • Windows .lnk shortcut exploit abused as zero-day
  • Sean Plankey nominated to lead CISA
  • Trump admin halts funding for two cybersecurity efforts
  • CISA publishes Jen Easterley's calendars
  • CISA statement on 'red-team' layoff reports
Show more...
4 months ago
1 hour 56 minutes 22 seconds

Three Buddy Problem
A half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit hunting

Three Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek.

Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • Microsoft Flags Six Active Zero-Days, Patches 57 Flaws
  • Unpatched.ai discoveries
  • Apple Ships iOS 18.3.2 to Fix Already-Exploited WebKit Flaw
  • Apple iOS 18.3.2 and iPadOS 18.3.2 documentation
  • Citizen Lab: Predator in the wires
  • FreeType Zero-Day Being Exploited in the Wild
  • CVE-2020-15999: FreeType Heap Buffer Overflow
  • Mandiant : Ghost in the Juniper router
  • Jun OS out-of-cycle security bulletin (CVE-2025-21590)
  • Juniper Malware Removal Tool
  • Binarly: UEFI Bootkit Hunting -- In-Depth Search for Unique Code Behavior
  • Crypto Trader Loses $215,000 in MEV Sandwich Attack on Uniswap
  • The Secretive World Of MEV, Where Bots Front-Run Crypto Investors For Big Profits
  • Reuters journalist Raphael Satter loses overseas citizenship
  • Yanis Varoufakis: Trump’s tariff chaos explained
  • Technofeudalism: What Killed Capitalism (Yanis Varoufakis)
Show more...
4 months ago
2 hours 5 minutes 43 seconds

Three Buddy Problem
Revisiting the Lamberts, i-Soon indictments, VMware zero-days

Three Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play.

Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections.

Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • Kim Zetter: Did Trump admin order a stand-down on Russia?
  • Unraveling the Lamberts Toolkit (Securelist)
  • VB2019: King of the hill: nation-state counterintelligence for victim deconfliction
  • VB2018: Draw me like one of your French APTs
  • Symantec: Who is Longhorn?
  • VMware: Three new zero-days exploited
  • Broadcom patches 3 VMware zero-days exploited in the wild
  • DOJ indictments: i-Soon hackers for hire and APT27
  • Unmasking I-Soon
  • Catalan court orders former NSO Group execs be indicted for spyware abuses
  • Apple sending 'mercenary spyware' threat notifications
  • How Social Engineering Sparked a Billion-Dollar Supply Chain Cryptocurrency Heist
  • Safe{Wallet] post-mortem on ByBit $1.4B crypto heist
Show more...
5 months ago
1 hour 39 minutes 32 seconds

Three Buddy Problem
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).