Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/6d/de/c8/6ddec851-2ca1-fac2-048b-e738cbee5874/mza_5244608465002210952.jpg/600x600bb.jpg
Three Buddy Problem
Security Conversations
189 episodes
4 days ago
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).
Show more...
Technology
News,
Tech News
RSS
All content for Three Buddy Problem is the property of Security Conversations and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).
Show more...
Technology
News,
Tech News
Episodes (20/189)
Three Buddy Problem
OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs

Three Buddy Problem - Episode 70: Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets, pen-test cadence, and the zero-day economy.

Plus, L3 Harris/Trenchant exec pleads guilty to selling exploits to Russian brokers, Kaspersky catches the return of HackingTeam using Chrome zero-day exploit chain, and news of a proposed law in Russia to force researchers to report vulnerabilities first to goverment agencies.

Cast: Dave Aitel (Technical Staff, OpenAI), Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Episode 70 Livestream - YouTube
  • Aardvark: OpenAI’s agentic security researcher
  • TBP episode on OpenAI’s Aardvark
  • How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
  • Ex-US cyber intel exec pleads guilty to selling spy tools to Russian broker
  • Ex-L3Harris Cyber Boss Pleads Guilty to Selling Trade Secrets to Russian Firm
  • Kim Zetter: Former Trenchant Exec Sold Stolen Code to Russian Buyer Even After Learning that Other Code He Sold Was Being "Utilized" by Different Broker in South Korea
  • How we linked ForumTroll APT to Dante spyware by Memento Labs
  • CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware
  • Russia's new vuln disclosure law proposal
  • TBP Live in Ottawa
  • Binding Hook Live
  • State of Statecraft
  • Ekoparty Miami
Show more...
4 days ago
2 hours 10 minutes 48 seconds

Three Buddy Problem
Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA

Three Buddy Problem - Episode 69: We dig into news that Apple's iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters. Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit developer to Russian buyers, and Chinese threat intel reports pointing fingers at the NSA.

We also discuss calls for the US government to build a structured, lawful ecosystem for private-sector offensive operations to address existing chaos and market gaps.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Key IOCs for iPhone Spyware Cleaned With iOS 26 Update
  • Exploitation of WSUS Remote Code Execution Vulnerability (CVE-2025-59287)
  • Hamid Kashfi on CVE-2025-59287
  • Pwn2Own Ireland results
  • Hacking Lab Boss Charged with Seeking to Sell Secrets in Russia
  • Court doc (Peter Williams case)
  • Cyber Insurer Sues Policyholder’s Cyber Pros
  • NSA Accused of Stealing Secrets from China's National Time Centre
  • China's CN-CERT on alleged NSA espionage operation
  • DanderSpritz documentation
  • Building the US market for offensive cyber
  • Netherlands Limits Intelligence-Sharing With US Amid Politicization, Russia Fears
  • Agenda - Binding Hook Live
  • Agenda - State of Statecraft
  • TBP Live at Countermeasures (Ottawa)
Show more...
1 week ago
2 hours 11 minutes 23 seconds

Three Buddy Problem
JAGS LABScon 2025 keynote: Steps to an ecology of cyber

Three Buddy Problem (Episode 68): The buddies are trapped in timezone hell with cross-country travel this week.

In this special episode, we present Juan Andres Guerrero-Saade's LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustainable, and deeply interconnected in its place.

Juanito traces the field’s evolution from chaos to consolidation, weaving in cybernetics, standardization, and the dawning coexistence of human and artificial evaluative power. The result is part philosophical sermon, part rallying cry, an invitation to reject the industry’s slave morality, rethink our tools, and steer the next era of defense with intention.

Links:

  • Transcript (unedited, AI-generated)
  • JAGS keynote: The intricacies of wartime cyber threat intelligence - Security Conversations
  • LABScon - Security Research in Real Time
  • JAGS on LinkedIn
  • JAGS on Twitter
  • The Consolation of Threat Intel (JAGS LABScon 2024 keynote)
Show more...
2 weeks ago
31 minutes

Three Buddy Problem
Apple Exploit-Chain Bounties, Wireless Proximity Exploits and Tactical Suitcases

Three Buddy Problem - Episode 67: We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group’s supposed US investor buyout.

Plus, an update on Oracle’s zero-day ransomware fiasco, Ivanti’s endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe’s latest failed push for Chat Control, and VirusTotal’s new pricing tiers.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Apple's new exploit-chain bounties
  • Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits
  • Paragon Strikes Again: UniCredit CEO Among the Targets
  • NSO to be acquired by U.S. investors
  • Oracle confirms exploited 0day - CVE-2025-61882
  • Oracle Security Officer comms
  • Oracle E-Business Suite CVE-2025-61882 Exploited in Extortion Attacks
  • ZDI documents Ivanti 0days waiting for patches
  • One-man spam campaign ravages EU ‘chat control’ bill
  • VirusTotal new pricing tiers
  • Tavis Ormandy Kaspersky 0day find
Show more...
3 weeks ago
2 hours 23 minutes 2 seconds

Three Buddy Problem
Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity

This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode.

Plus, thoughts on how helping startups shape product strategy, what it takes to translate technical expertise into business impact, and how security culture has evolved since the early “hacker-to-enterprise” days. The conversation touches on defining your career beyond titles, how the perception of “cybersecurity” has changed over the years, and why the industry still has plenty of room for curiosity, reinvention, and good storytelling.

Links:

  • Chris Eng on LinkedIn
  • Chris Eng on Twitter
  • Monoculture Considered Harmful
  • Fired @stake CTO Says Microsoft Critique Was ‘Business as Usual’
  • Microsoft Takes LSD to Test Vista Security
  • Code Red (computer worm)
Show more...
4 weeks ago
44 minutes 54 seconds

Three Buddy Problem
Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout

Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response.

Plus, the TikTok–Oracle deal and the strange role Oracle now plays in U.S. national security; OpenAI’s Sora 2 launch and its implications for social media and human expression; Palo Alto’s “Phantom Taurus” APT report, a follow-up on Cisco’s ArcaneDoor disclosures, and the impact of the U.S. government shutdown on CISA.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Drone sightings prompt call for German police to gain shoot-down powers
  • UK arrest following aerospace cyber incident
  • Oracle Probes Hacks of Customers’ E-Business Suite After Extortion Campaign
  • Oracle Critical Patch Update Advisory - July 2025
  • Here is the email Clop attackers sent to Oracle customers
  • Oracle statement from Chief Security Officer
  • TikTok’s Algorithm to Be Secured by Oracle in Trump-Backed Deal
  • Phantom Taurus: A New Chinese Nexus APT
  • China Hackers Breached Foreign Ministers’ Emails
  • Cisco Statement on Attacks Against Cisco Firewalls
  • GreyNoise: 25,000 IPs Scanned Cisco ASA Devices in Early Sept
  • KeyDrop.io
Show more...
1 month ago
2 hours 3 minutes 28 seconds

Three Buddy Problem
Cisco firewall zero-days and bootkits in the wild

Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.

Plus, Cisco’s controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
  • Mandiant Brickstorm Scanner
  • Cisco advisory: Continued Attacks Against Cisco Firewalls
  • NCSC report on Cisco ASA bootkit in the wild
  • U.S. government scrambles to stop new hacking campaign blamed on China
  • US Secret Service Statement on SIM Farm Discovery
  • NYTimes: Cache of Devices Capable of Crashing Cell Network Is Found Near U.N.
  • Airport chaos: Ransomware hits airport check-in systems
  • NCSC statement: Incident impacting Collins Aerospace
  • Gamaredon X Turla collab
Show more...
1 month ago
1 hour 54 minutes 49 seconds

Three Buddy Problem
Live at LABScon: Aurora Johnson and Trevor Hilligoss on China's 'internet toilets'

Three Buddy Problem - Episode 64: SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets," the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).

Cast: Aurora Johnson, Trevor Hilligoss, Ryan Naraine and Juan Andres Guerrero-Saade.

Links:

  • Plunging China's internet toilets (LABScon)
  • SpyCloud Labs
Show more...
1 month ago
22 minutes 13 seconds

Three Buddy Problem
Live at LABScon: Visi Stark shares memories of creating the APT1 report

Three Buddy Problem - Episode 63: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant's famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025)

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Visi Stark.

Links:

  • How the Infamous APT-1 Report Exposing China’s PLA Hackers Came to Be
  • Mandiant APT1 Report
  • A guide to U.S. allegations of China cyberspying
  • The Vertex Project
  • LABScon 2025
  • Visi Stark on LinkedIn
  • LABScon 2025: Plunging the Internet Toilets in China
  • Aurora Johnson on Twitter
  • Trevor Hilligoss
Show more...
1 month ago
28 minutes 50 seconds

Three Buddy Problem
Live at LABScon: Lindsay Freeman on tracking Wagner Group war crimes

Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Lindsay Freeman.

Links:

  • LABScon Speaker 2025: Lindsay Freeman
  • War Crimes for Fun and Profit (Lawfare)
  • Mali: Army, Wagner Group Atrocities Against Civilians
  • The Wagner Group’s Atrocities in Africa: Lies and Truth
  • Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost in Mali
Show more...
1 month ago
31 minutes 52 seconds

Three Buddy Problem
Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?

Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors.

Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the value of Apple notifications; concerns around Chinese hardware and surveillance equipment in US infrastructure; Silicon Valley profiting from China’s surveillance ecosystem; and controversy around a Huntress disclosure of an attacker’s operations after an EDR agent was mistakenly installed.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Salesforce advisory on Salesloft Drift hack
  • Salesloft Drift Breach Tracker
  • Mandiant Drift and Salesloft Application Investigations
  • Widespread Data Theft Targets Salesforce Instances via Salesloft Drift
  • Large-Scale NPM Attack
  • NPM attack failed, with almost no victims
  • Chinese Hackers Pretended to Be a Top U.S. Lawmaker
  • Czech cyber agency warns against using services and products that send data to China
  • Apple Debuts Memory Integrity Enforcement (MIE)
  • Huntress: An Attacker’s Blunder Gave Us a Look Into Their Operations
  • LABScon 2025 Agenda
Show more...
1 month ago
2 hours 45 minutes 46 seconds

Three Buddy Problem
Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click

Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit.

Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world.

We also debate Google’s proposed “cyber disruption unit” versus Microsoft’s DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic’s report on real attacker use of Claude; note Amazon’s APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • NSA, Allies Report on Salt Typhoon
  • UK and allies expose China tech companies
  • Joint Advisory on Salt Typhoon (IOCs)
  • Dutch providers targeted by Salt Typhoon
  • Silent Control: The Hidden Penetration of MystRodX
  • Google previews cyber ‘disruption unit'
  • Anthropic report on misuse of Claude AI
  • WhatsApp 0day exploited (iOS attack chain)
  • RationalEdge - Intelligence Meets Accuracy
  • LABScon Speakers 2025
Show more...
2 months ago
2 hours 24 minutes 48 seconds

Three Buddy Problem
Zero-day reality check: iOS exploits, MAPP in China and the hack-back temptation

Three Buddy Problem - Episode 59: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who’s likely using these exploits, why Apple’s guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works.

Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora’s box?), and dissect two case studies that blur APT and crimeware: PipeMagic’s CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Apple bulletin: iOS 18.6.2
  • Apple discloses actively exploited zero-day affecting iOS, iPadOS and macOS
  • UK drops demand for backdoor into Apple encryption
  • Tulsi Gabbard on UK dropping Apple backdoor mandate
  • Microsoft Curbs Early Notifications for Chinese Firms on Security Flaws
  • Kaspersky report on PipeMagic
  • Microsoft: Dissecting PipeMagic Backdoor Framework
  • Cisco Talos on Static Tundra
  • FBI advisory on end-of-life network devices
  • SIM-Swapper, Scattered Spider Hacker Gets 10 Years
  • Qubic Claims Majority Control of Monero Hashrate, Raising 51% Attack Fears
  • State of Statecraft Call for Papers
  • LABScon 2025 Speaker Roster
  • Offensive AI Con
  • Three Buddy Problem: LIVE in Canada
Show more...
2 months ago
2 hours 32 minutes 15 seconds

Three Buddy Problem
On AI’s future, security’s failures, and what comes next...

Three Buddy Problem - Episode 58: The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents.

We revisit the Chinese "cyber militia" discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Live from Black Hat: Brandon Dixon
  • PSIRT | FortiGuard Labs
  • SonicWall Firewalls – SSLVPN Recent Threat Activity
  • Cisco CVSS 1.0 RCE
  • Margin Research: Cyber Militias Redux
  • Russia Is Suspected to Be Behind Breach of Federal Court Filing System
  • Russian hackers seized control of Norwegian dam
  • Poland foiled cyberattack on big city's water supply
  • EU Parliament pressing for agreement on chat scanning bill
  • LABScon 2025
Show more...
2 months ago
1 hour 57 minutes 44 seconds

Three Buddy Problem
Live from Black Hat: Brandon Dixon parses the AI security hype

Three Buddy Problem - Episode 57: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access.

Plus, the future of SOC automation to AI-assisted pen testing, how agentic AI could transform the cyber talent bottlenecks and operational inefficiencies, geopolitical debates over backdoors in GPUs and the strategic implications of China’s AI model development.

Cast: Brandon Dixon, Juan Andres Guerrero-Saade, and Ryan Naraine.

Links:

  • Transcript (unedited, AI-generated)
  • Brandon Dixon | LinkedIn
  • Google 'Big Sleep' AI Issue Tracker
  • XBOW - The road to Top 1: How XBOW did it
  • Does “XBOW AI Hacker” Deserve the Hype?
  • XBOW - Taking the Top Hacker in the US to New Heights: XBOW Raises $75M Series B
  • NVIDIA: No Backdoors. No Kill Switches. No Spyware
  • Nvidia reiterates its chips have no backdoors, urges US against location verification
  • Google: Our Big Sleep agent makes a big leap
  • Microsoft announces acquisition of RiskIQ
  • RiskIQ attack surface management
  • Brandon Dixon (SecurityConversations podcast)
  • Project Zero: A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
Show more...
2 months ago
1 hour 30 minutes 14 seconds

Three Buddy Problem
Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service

Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibility into these threat actors is so hard to get right, and how companies like Microsoft get caught in the geopolitical crossfire.

Plus: a deep dive on suspected MAPP leaks and Sharepoint zero-days, Singapore targeted by extremely sophisticated China-nexus hacking group, soft censorship in corporate threat-intel, and whether the U.S. should rethink how it fills its intelligence gaps.

Cast: Dakota Cary, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Dakota Cary on LinkedIn
  • China’s Covert Capabilities -- Silk Spun From Hafnium
  • HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
  • Microsoft Probing Whether Chinese Hackers Found Flaw Via MAPP
  • Cybersecurity Law of the People’s Republic of China
  • Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
  • Fire Ant: Hypervisor-Level Espionage Targeting VMware ESXi & vCenter
  • Singapore actively dealing with ongoing China cyberattack
  • Iranians Targeted With Spyware in Lead-Up to War With Israel — all inside Iran and working either in the country’s technology sector or for the government.
  • LABScon 2025
  • Apple in China (book)
Show more...
3 months ago
1 hour 51 minutes 42 seconds

Three Buddy Problem
Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days

Three Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party.

We also revisit the ProPublica bombshell about Microsoft's "digital escorts" and U.S. government data exposure to Chinese adversaries and the company's "oops, we will stop" response. Plus, trusting Google's Big Sleep AI claims and a cautionary tale about AI agents gone rogue that wiped out a production database.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Three Buddy Problem LIVE at Black Hat
  • TBP at Countermeasures 2025
  • CODE WHITE GmbH ToolShell exploit
  • Microsoft guidance for SharePoint vulnerability CVE-2025-53770
  • Kaspersky on ToolShell: A story of five Sharepoint vulns
  • Ryan's EkoParty keynote on Microsoft culture
  • Microsoft Disrupting active exploitation of on-prem SharePoint flaws
  • SentinelLabs on Sharepoint zero-day in-the-wild
  • ESET on ToolShell: An all-you-can-eat buffet for threat actors
  • Microsoft Stops Using China-Based Engineers for DoD Computer Systems
  • AI coding platform goes rogue during code freeze and deletes entire company database
  • Jason Lemkin: Replit goes rogue
  • John Hultquist on Big Dream AI
  • LABScon 2025
Show more...
3 months ago
1 hour 55 minutes 13 seconds

Three Buddy Problem
Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’

Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes.

Plus, ProPublica on Microsoft’s China‑based “digital escorts,” Google’s headline‑grabbing AI‑found SQLite zero‑day, and OpenAI’s new task‑running agents. Meanwhile, Ukraine’s hackers wiped a Russian drone maker, ransomware crippled a major vodka producer, and another Chrome zero‑day quietly underscored how routine critical exploits have become.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Europol targets NoName057(16) pro-Russian cybercrime network
  • Europe's most wanted list
  • UK sanctions Russian spies linked to Mariupol strikes
  • Profile: GRU cyber and hybrid threat operations
  • Lindsay Freeman: War Crimes for Fun and Profit
  • Lindsay Freeman bio
  • CISA: End-of-Train and Head-of-Train Remote Linking Protocol
  • Background of train vulnerability (CVE-2025-1727)
  • ProPublica on Microsoft “Digital Escorts”
  • Google’s Big Sleep AI bug-finding claims
  • EchoLeak (CVE-2025-32711)
  • Russian vodka producer reports disruptions after ransomware attack
  • Ukrainian Hackers Cripple IT Infrastructure of Russian Drone Manufacturer
  • Another exploited Google Chrome zero-day
  • Three Buddy Problem LIVE at Black Hat
  • Ringzer0 COUNTERMEASURE
Show more...
3 months ago
1 hour 48 minutes 45 seconds

Three Buddy Problem
How did China get Microsoft's zero-day exploits?

Three Buddy Problem - Episode 53: We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister?

Plus, China's massive cyber capabilities pipeline, ‘theCom’ teenagers arrested in the UK after ransomware binge, and spyware attacks against Russian organizations.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • US Gov: Prolific Chinese state-sponsored contract hacker arrested
  • Microsoft: HAFNIUM targeting Exchange Servers with 0-day exploits
  • Microsoft Exchange Server Attack Timeline
  • YouTube: Orange Tsai on ProxyLogon
  • Crash (exploit) and burn: Securing the offensive cyber supply chain to counter China in cyberspace
  • The Growing Role of Cyber Militias in China’s Network Warfare Force Structure
  • NCA arrest four for attacks on M&S, Co-op and Harrods
  • Four arrested by UK police over ransomware attacks on M&S, Co-op and Harrods
  • Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war
  • Cyberattack deals blow to Russian firmware used to repurpose civilian drones for Ukraine war
  • Batavia spyware targeting Russian organizations
  • Chainalysis: First-ever crypto seizure in Greece
  • Ringzer0 COUNTERMEASURE — Three Buddy Problem discount code for training: CM25-3BUDDY
  • LABScon 2025
Show more...
3 months ago
1 hour 49 minutes 5 seconds

Three Buddy Problem
Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT

Three Buddy Problem - Episode 52: Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and connects Houken to SentinelOne’s “Purple Haze” research.

Plus, the FBI’s claim that China’s “Salt Typhoon” has been “contained,” Iran’s Nobitex crypto-exchange breach (Predatory Sparrow torches $90 million and leaks the source code), Iranian cyber capabilities and sanctions avoidance.

Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

Links:

  • Transcript (unedited, AI-generated)
  • Houken: Seeking a path by living on the edge with zero-days
  • China-nexus APTs recon on top-tier targets
  • French cybersecurity agency confirms government affected by Ivanti hacks
  • Top FBI cyber official: Salt Typhoon ‘largely contained’
  • Operation Blockbuster (Novetta)
  • Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, bank hacks
  • Inside the Nobitex Breach: What the Leaked Source Code Reveals About Iran’s Crypto Infrastructure
  • cisagov/thorium
Show more...
4 months ago
1 hour 34 minutes 16 seconds

Three Buddy Problem
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).