Drone Security podcast that covers hacking, hardening and counter-uas measures.
…
continue reading
Drone Infosec Podcasts
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading

1
Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout
2:03:28
2:03:28
Play later
Play later
Lists
Like
Liked
2:03:28Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. Plus, the TikTok–Oracle deal and the strange role …
…
continue reading

1
Cisco firewall zero-days and bootkits in the wild
1:54:49
1:54:49
Play later
Play later
Lists
Like
Liked
1:54:49Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the h…
…
continue reading

1
Live at LABScon: Aurora Johnson and Trevor Hilligoss on China's 'internet toilets'
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Three Buddy Problem - Episode 64: SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets," the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying tha…
…
continue reading

1
Live at LABScon: Visi Stark shares memories of creating the APT1 report
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Three Buddy Problem - Episode 63: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant's famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025) Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Vis…
…
continue reading

1
Live at LABScon: Lindsay Freeman on tracking Wagner Group war crimes
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media pl…
…
continue reading

1
A Conversation With Harry Wetherald CO-Founder & CEO At Maze
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03➡ Stay Ahead of Cyber Threats with AI-Driven Vulnerability Management with Maze: https://mazehq.com/ In this conversation, I speak with Harry about how AI is transforming vulnerability management and application security. We explore how modern approaches can move beyond endless reports and generic fixes, toward real context-aware workflows that act…
…
continue reading

1
A Conversation With Grant Lee CO-Founder & CEO At Gamma
21:48
21:48
Play later
Play later
Lists
Like
Liked
21:48➡ Upgrade your presentations with Gamma, the best AI presentation maker: https://gamma.app In this conversation, I speak with Grant, co-founder of Gamma, about how their platform is transforming presentations and idea-sharing. Instead of starting with slides, Gamma helps you focus on the story first—then builds the visuals, structure, and delivery …
…
continue reading

1
UL NO. 497: STANDARD EDITION | More NPM Shenanigans, I Open Sourced Kai, Blood Work Results, Finding Vulns in a 10-line Prompt, and more...
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13UL NO. 497: STANDARD EDITION | More NPM Shenanigans, I Open Sourced Kai, Blood Work Results, Finding Vulns in a 10-line Prompt, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-497 Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow …
…
continue reading

1
Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?
2:45:46
2:45:46
Play later
Play later
Lists
Like
Liked
2:45:46Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the va…
…
continue reading

1
UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more...
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-496 Personal AI Video I'm so excited about Subscribe to the newsletter at: https://danielmiessl…
…
continue reading

1
Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click
2:24:48
2:24:48
Play later
Play later
Lists
Like
Liked
2:24:48Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs wer…
…
continue reading

1
A Conversation with Michael Brown About Designing AI Systems
50:06
50:06
Play later
Play later
Lists
Like
Liked
50:06In this episode of Unsupervised Learning, I sit down with Michael Brown, Principal Security Engineer at Trail of Bits, to dive deep into the design and lessons learned from the AI Cyber Challenge (AIxCC). Michael led the team behind Buttercup, an AI-driven system that secured 2nd place overall. We discuss: -The design philosophy behind Buttercup an…
…
continue reading

1
Zero-day reality check: iOS exploits, MAPP in China and the hack-back temptation
2:32:15
2:32:15
Play later
Play later
Lists
Like
Liked
2:32:15Three Buddy Problem - Episode 59: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geo…
…
continue reading

1
UL NO. 494: STANDARD EDITION | AI Finds a P1, I Missed Chartbeat So I Made My Own, XBow Open-Sources Their AI Bot, and more...
1:38:09
1:38:09
Play later
Play later
Lists
Like
Liked
1:38:09You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Read this episode online: https://newsletter.danielmiessler.com/p/ul-494 Subscribe to the newsletter at: https://danielmiessler.…
…
continue reading

1
On AI’s future, security’s failures, and what comes next...
1:57:44
1:57:44
Play later
Play later
Lists
Like
Liked
1:57:44Three Buddy Problem - Episode 58: The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving ad…
…
continue reading

1
Live from Black Hat: Brandon Dixon parses the AI security hype
1:30:14
1:30:14
Play later
Play later
Lists
Like
Liked
1:30:14Three Buddy Problem - Episode 57: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access. Plus, the fu…
…
continue reading

1
Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service
1:51:42
1:51:42
Play later
Play later
Lists
Like
Liked
1:51:42Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibilit…
…
continue reading

1
A Conversation With Sarit Tager from Prisma Cloud
25:31
25:31
Play later
Play later
Lists
Like
Liked
25:31➡ Prevent Risk At The Source with Cortex Cloud: https://www.paloaltonetworks.com/cortex/cloud/application-security In this sponsored conversation, I speak with Sarit Tager, VP of Product Management at Palo Alto Networks, about how Prisma Cloud and their new ASPM solution are transforming cloud and application security by unifying data and deeply in…
…
continue reading

1
Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days
1:55:13
1:55:13
Play later
Play later
Lists
Like
Liked
1:55:13Three Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware gr…
…
continue reading

1
Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’
1:48:45
1:48:45
Play later
Play later
Lists
Like
Liked
1:48:45Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes. Plus, ProPublica on Microsoft’s China‑based “digi…
…
continue reading

1
UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more...
22:01
22:01
Play later
Play later
Lists
Like
Liked
22:01UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: htt…
…
continue reading

1
UL NO. 488: STANDARD EDITION | Google Granting Confusing Access to Gemini, A New Favorite Creator, Russia's new Autonomous Drones, Claude Code Madness and Neovim Config, and more...
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11UL NO. 488: STANDARD EDITION | Google Granting Confusing Access to Gemini, A New Favorite Creator, Russia's new Autonomous Drones, Claude Code Madness and Neovim Config, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefit…
…
continue reading

1
How did China get Microsoft's zero-day exploits?
1:49:05
1:49:05
Play later
Play later
Lists
Like
Liked
1:49:05Three Buddy Problem - Episode 53: We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister? Plus, Ch…
…
continue reading

1
Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT
1:34:16
1:34:16
Play later
Play later
Lists
Like
Liked
1:34:16Three Buddy Problem - Episode 52: Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and c…
…
continue reading

1
UL NO. 487: STANDARD EDITION: Iranian Critical Infra Attacks, Insane Recent Productivity, A Chinese Mosquito Drone, Marcus's Response to Our AI Debate, "Context Engineering" Ain't It, and more...
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31UL NO. 487: STANDARD EDITION: Iranian Critical Infra Attacks, Insane Recent Productivity, A Chinese Mosquito Drone, Marcus's Response to Our AI Debate, "Context Engineering" Ain't It, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exc…
…
continue reading
Marcus and I debate AIs capabilities from nearly polar opposite ends. He thinks it's basically autocomplete, and I think it's the most important tech we've ever built as humans. It was a fantastic, and very civil conversation, so thanks to Marcus for that, and we're already planning on Part 2. This two-hour discussion covers: 🧠 The real risks of AI…
…
continue reading

1
UL NO. 486 STANDARD EDITION: Fully Automated AI Malware (Binary and Web), My Debate with Marcus Hutchins on AI and more
55:03
55:03
Play later
Play later
Lists
Like
Liked
55:03UL NO. 486: STANDARD EDITION: Fully Automated AI Malware (Binary and Web), My Debate with Marcus Hutchins on AI, The 'Did You Notice?' Psyop, The METR AI Metric for Longterm Tasks, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclus…
…
continue reading

1
Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks
3:07:13
3:07:13
Play later
Play later
Lists
Like
Liked
3:07:13Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blindi…
…
continue reading

1
UL NO. 485: STANDARD EDITION: Netflix RCE, My Current AI Stack, All-in on Claude Code, and more...
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45STANDARD EDITION: Netflix RCE, My Current AI Stack, All-in on Claude Code, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Read this episode online: https://newslet…
…
continue reading

1
Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms
1:51:48
1:51:48
Play later
Play later
Lists
Like
Liked
1:51:48Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes. Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s…
…
continue reading

1
UL NO. 484: STANDARD EDITION: OpenAI's Malicious AI Report, Disappointed with WWDC, AI's First Actual Science Breakthrough, and more...
43:31
43:31
Play later
Play later
Lists
Like
Liked
43:31UL NO. 484: STANDARD EDITION: OpenAI's Malicious AI Report, Disappointed with WWDC, AI's First Actual Science Breakthrough, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/…
…
continue reading

1
Mikko Hypponen talks drone warfare, APT naming schemes
1:29:04
1:29:04
Play later
Play later
Lists
Like
Liked
1:29:04Three Buddy Problem - Episode 49: Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”. …
…
continue reading

1
UL NO. 483 | STANDARD EDITION: A Chrome 0-Day, Meta Automates Security Assessments, New Essays, My New Video on Hacking with AI, Ukraine's Asymmetrical Attack, Thoughts on My AI Skeptical Friends, The ...
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39A Chrome 0-Day, Meta Automates Security Assessments, New Essays, My New Video on Hacking with AI, Ukraine's Asymmetrical Attack, Thoughts on My AI Skeptical Friends, The Dangers of Winning the Wrong Game, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full versi…
…
continue reading
Sponsored by Vanta. Vanta takes the busywork out of GRC so you can focus on what actually matters—improving your security, not chasing compliance. https://ul.live/vanta This isn’t just another AI podcast. It’s about the deeper shift that’s happening in cybersecurity—away from individual tools and dashboards, and toward real-time, comprehensive worl…
…
continue reading