Drone Security podcast that covers hacking, hardening and counter-uas measures.
…
continue reading
Drone Infosec Podcasts
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
1
APTs pounce on React2Shell; BRICKSTORM backdoors; .gov surveillance
1:41:44
1:41:44
Play later
Play later
Lists
Like
Liked
1:41:44(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 75: We dig into a CVSS 10/10 unauthenticated RCE bug causing chaos across the internet and early signs that Chinese APTs are already launching exploits, the cascading patch chaos, and a long tail of …
…
continue reading
1
Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture
1:57:12
1:57:12
Play later
Play later
Lists
Like
Liked
1:57:12(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 74: We attempt to parse the rumor-fog around Microsoft’s CISO at CYBERWARCON and what it reveals about the company’s shifting posture…
…
continue reading
1
Gemini 3 reactions, Fortinet/Chrome zero-days, a Cloudflare monoculture and a billion-dollar crypto twist
2:19:41
2:19:41
Play later
Play later
Lists
Like
Liked
2:19:41(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 73: The buddies react to Google’s release of Gemini 3 and its early performance, new Chrome interface changes landing on users’ machi…
…
continue reading
1
Anthropic Claude Code automating APT hacks, KnownSec leak, Chinese buses with remote access
2:12:38
2:12:38
Play later
Play later
Lists
Like
Liked
2:12:38Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices. Three Buddy Problem - Episode 72: We unpack Anthropic’s conflicting self-promotion around the “first AI-orchestrated cyberattack” using Claude Code and the future of…
…
continue reading
1
LIVE from Ring0 COUNTERMEASURE: Google v FFmpeg, Ransomware Turncoats, Samsung 0days
1:09:59
1:09:59
Play later
Play later
Lists
Like
Liked
1:09:59Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices. Three Buddy Problem - Episode 71: The buddies travel to Canada for a live recording at the Countermeasure conference, discussing the Google v FFmpeg open-source patc…
…
continue reading
1
OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48Three Buddy Problem - Episode 70: Dave Aitel from OpenAI's technical staff joins the buddies to discuss the just-launched Aardvark, OpenAI’s agentic “security researcher” that claims to read code, finds bugs, validates exploits, and ships patches. We press him on where LLMs beat fuzzers, privacy boundaries, human-in-the-loop realities, SDLC budgets…
…
continue reading
1
Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA
2:11:23
2:11:23
Play later
Play later
Lists
Like
Liked
2:11:23Three Buddy Problem - Episode 69: We dig into news that Apple's iOS 26 has quietly killed the shutdown.log forensic artifact used to spot signs of infections and what it means for threat hunters. Plus, whispers of a million-dollar WhatsApp zero-click exploit that never materialized at Pwn2Own, a surreal court case linking a Trenchant exploit develo…
…
continue reading
1
JAGS LABScon 2025 keynote: Steps to an ecology of cyber
31:00
31:00
Play later
Play later
Lists
Like
Liked
31:00Three Buddy Problem (Episode 68): The buddies are trapped in timezone hell with cross-country travel this week. In this special episode, we present Juan Andres Guerrero-Saade's LABScon 2025 keynote-day presentation on the state of cybersecurity and why this phase of our collective project has failed, and how to build something smarter, more sustain…
…
continue reading
1
Apple Exploit-Chain Bounties, Wireless Proximity Exploits and Tactical Suitcases
2:23:02
2:23:02
Play later
Play later
Lists
Like
Liked
2:23:02Three Buddy Problem - Episode 67: We discuss the rise of automated red-teaming, Apple’s $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story o…
…
continue reading
1
Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54By Security Conversations
…
continue reading
1
Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout
2:03:28
2:03:28
Play later
Play later
Lists
Like
Liked
2:03:28Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. Plus, the TikTok–Oracle deal and the strange role …
…
continue reading
1
Cisco firewall zero-days and bootkits in the wild
1:54:49
1:54:49
Play later
Play later
Lists
Like
Liked
1:54:49Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the h…
…
continue reading
1
Live at LABScon: Aurora Johnson and Trevor Hilligoss on China's 'internet toilets'
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Three Buddy Problem - Episode 64: SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets," the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying tha…
…
continue reading
1
Live at LABScon: Visi Stark shares memories of creating the APT1 report
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Three Buddy Problem - Episode 63: Co-founder of the Vertex Project Visi Stark joins the buddies to reminisce about his work writing Mandiant's famous APT1 report, the China-nexus threat landscape, the value of cyber threat intelligence, APT-naming schemes, and more... (Recorded at LABScon 2025) Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Vis…
…
continue reading
1
Live at LABScon: Lindsay Freeman on tracking Wagner Group war crimes
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media pl…
…
continue reading
1
Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?
2:45:46
2:45:46
Play later
Play later
Lists
Like
Liked
2:45:46Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the va…
…
continue reading
1
Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click
2:24:48
2:24:48
Play later
Play later
Lists
Like
Liked
2:24:48Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn’t), and what’s actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs wer…
…
continue reading
1
Zero-day reality check: iOS exploits, MAPP in China and the hack-back temptation
2:32:15
2:32:15
Play later
Play later
Lists
Like
Liked
2:32:15Three Buddy Problem - Episode 59: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don’t, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geo…
…
continue reading
1
On AI’s future, security’s failures, and what comes next...
1:57:44
1:57:44
Play later
Play later
Lists
Like
Liked
1:57:44Three Buddy Problem - Episode 58: The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving ad…
…
continue reading
1
Live from Black Hat: Brandon Dixon parses the AI security hype
1:30:14
1:30:14
Play later
Play later
Lists
Like
Liked
1:30:14Three Buddy Problem - Episode 57: Brandon Dixon (PassiveTotal/RiskIQ, Microsoft) leads a deep-dive into the collision of AI and cybersecurity. We tackle Google’s “Big Sleep” project, XBOW’s HackerOne automation hype, the long-running tension between big tech ownership of critical security tools and the community’s need for open access. Plus, the fu…
…
continue reading
1
Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service
1:51:42
1:51:42
Play later
Play later
Lists
Like
Liked
1:51:42Three Buddy Problem - Episode 56: China-focused researcher Dakota Cary joins the buddies to dig into China’s sprawling cyber ecosystem, from the HAFNIUM indictments and MSS tasking pipelines to the murky world of APT contractors and the ransomware hustle. We break down China’s “entrepreneurial” model of intelligence collection, why public visibilit…
…
continue reading
1
Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days
1:55:13
1:55:13
Play later
Play later
Lists
Like
Liked
1:55:13Three Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware gr…
…
continue reading
1
Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’
1:48:45
1:48:45
Play later
Play later
Lists
Like
Liked
1:48:45Three Buddy Problem - Episode 54: Europol busted pro‑Russian hacktivist crew NoName 057(16), the Brits announce sanctions on Russia’s GRU cyber units, Wagner‑linked “war influencers” streamed atrocities from Africa, and fresh tech worries ranged from a $500 RF flaw that can hijack U.S. train brakes. Plus, ProPublica on Microsoft’s China‑based “digi…
…
continue reading
1
How did China get Microsoft's zero-day exploits?
1:49:05
1:49:05
Play later
Play later
Lists
Like
Liked
1:49:05Three Buddy Problem - Episode 53: We dig into news of the first-ever arrest of a Chinese intelligence-linked hacker in Italy, unpack the mystery behind HAFNIUM and how they somehow got their hands on the same Microsoft Exchange zero-days that researcher Orange Tsai discovered - was it coincidence, inside access, or something more sinister? Plus, Ch…
…
continue reading
1
Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT
1:34:16
1:34:16
Play later
Play later
Lists
Like
Liked
1:34:16Three Buddy Problem - Episode 52: Fresh intelligence reports out of Europe and China: France’s ANSSI documents a string of Ivanti VPN zero-days ('Houken'), and Quanxin frames a stealth Microsoft Exchange-zero-day chain linked to a North American 'Night Eagle' threat actor. We dissect the technical bread-crumbs, questions the attribution math, and c…
…
continue reading
1
Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks
3:07:13
3:07:13
Play later
Play later
Lists
Like
Liked
3:07:13Three Buddy Problem - Episode 51: Former Immunity/Trail of Bits researcher Hamid Kashfi joins the buddies for a fast-moving tour of cyber activities in the Israel-Iran war. The crew unpacks who 'Predatory Sparrow' is, why Sepah Bank and the Nobitex crypto exchange were hit, and what a $90 million cryptocurrency burn really means. Plus, radar-blindi…
…
continue reading
1
Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms
1:51:48
1:51:48
Play later
Play later
Lists
Like
Liked
1:51:48Three Buddy Problem - Episode 50: This week, we dissect cyber flashpoints in the Iran-Israel war, revisit the “magnet of threats” server in Iran that attracted APTs from multiple nation-states, and react to Israel's Mossad sneaking explosive drone swarms deep into Iran to support airstrikes. Plus, Stealth Falcon’s new WebDAV zero-day, SentinelOne’s…
…
continue reading
1
Mikko Hypponen talks drone warfare, APT naming schemes
1:29:04
1:29:04
Play later
Play later
Lists
Like
Liked
1:29:04Three Buddy Problem - Episode 49: Cybersecurity veteran Mikko Hypponen joins the show to discuss the fast-changing life and times on NATO’s newest frontline, how Ukraine’s long-range “Spiderweb” drone swarms punched holes in Russian air bases, the cyber connections to the escalating drone warfare, and the coming wave of autonomous “killer robots”. …
…
continue reading
1
The dark hole of 'friendlies' and Western APTs
2:11:19
2:11:19
Play later
Play later
Lists
Like
Liked
2:11:19Three Buddy Problem - Episode 48: We unpack a Dutch intelligence agencies report on ‘Laundry Bear’ and Microsoft’s parallel ‘Void Blizzard’ write-up, finding major gaps and bemoaning the absence of IOCs. Plus, discussion on why threat-intel naming is so messy, how initial-access brokers are powering even nation-state break-ins, and whether customer…
…
continue reading
1
Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate
2:30:37
2:30:37
Play later
Play later
Lists
Like
Liked
2:30:37Three Buddy Problem - Episode 47: We unpack a multi-agency report on Russia’s APT28/Fancy Bear hacking and spying on Ukraine war supply lines, CISA’s sloppy YARA rules riddled with false positives, the ethics of full-disclosure after Akamai dropped Windows Server “BadSuccessor” exploit details, and Sekoia’s discovery of thousands of hijacked edge d…
…
continue reading
1
A Coinbase breach with bribes, rogue contractors and a $20M ransom demand
2:23:34
2:23:34
Play later
Play later
Lists
Like
Liked
2:23:34Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability datab…
…
continue reading
1
JAGS keynote: The intricacies of wartime cyber threat intelligence
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging informat…
…
continue reading
1
Signalgate redux, OpenAI's Aardvark, normalizing cyber offense
2:38:40
2:38:40
Play later
Play later
Lists
Like
Liked
2:38:40Three Buddy Problem - Episode 44: We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors. Plus, …
…
continue reading
1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading
1
China doxxes NSA, CVE's funding crisis, Apple's zero-day troubles
1:39:19
1:39:19
Play later
Play later
Lists
Like
Liked
1:39:19Three Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games. Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days. Pl…
…
continue reading
1
NSA director fired, Ivanti's 0day screw-up, backdoor in robot dogs
1:36:57
1:36:57
Play later
Play later
Lists
Like
Liked
1:36:57Three Buddy Problem - Episode 41: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang's keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti's misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploit…
…
continue reading
1
Signalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returns
1:52:34
1:52:34
Play later
Play later
Lists
Like
Liked
1:52:34Three Buddy Problem - Episode 40: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who's behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtega…
…
continue reading
1
China exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cuts
1:56:22
1:56:22
Play later
Play later
Lists
Like
Liked
1:56:22Three Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets …
…
continue reading
1
A half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit hunting
2:05:43
2:05:43
Play later
Play later
Lists
Like
Liked
2:05:43Three Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek. Plus, discussion on a Binarly technical paper wit…
…
continue reading
1
Revisiting the Lamberts, i-Soon indictments, VMware zero-days
1:39:32
1:39:32
Play later
Play later
Lists
Like
Liked
1:39:32Three Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Tr…
…
continue reading
1
Lazarus ByBit $1.4B heist was supply chain attack on developer
1:53:22
1:53:22
Play later
Play later
Lists
Like
Liked
1:53:22Three Buddy Problem - Episode 36: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. We also cover the latest on the $1.4 billion ByB…
…
continue reading
1
North Korea's biggest ever crypto heist: $1.4B stolen from Bybit
2:07:07
2:07:07
Play later
Play later
Lists
Like
Liked
2:07:07Three Buddy Problem - Episode 35: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK. We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espion…
…
continue reading
1
An 'extremely sophisticated' iPhone hack; Google flags major AMD microcode bug
1:25:12
1:25:12
Play later
Play later
Lists
Like
Liked
1:25:12Three Buddy Problem - Episode 34: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity,…
…
continue reading
1
Unpacking the UK government's secret iCloud backdoor demand
2:22:42
2:22:42
Play later
Play later
Lists
Like
Liked
2:22:42Three Buddy Problem - Episode 33: In this episode, we unpack the UK government's secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale. Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hac…
…
continue reading
1
Inside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devices
2:19:44
2:19:44
Play later
Play later
Lists
Like
Liked
2:19:44Three Buddy Problem - Episode 32: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoin…
…
continue reading
1
Death of the CSRB, zero-days storms at the edge, Juniper router backdoors
1:48:59
1:48:59
Play later
Play later
Lists
Like
Liked
1:48:59Three Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen…
…
continue reading
1
Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day
1:59:52
1:59:52
Play later
Play later
Lists
Like
Liked
1:59:52Three Buddy Problem - Episode 30: We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeti…
…
continue reading
1
Hijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vuln
1:48:21
1:48:21
Play later
Play later
Lists
Like
Liked
1:48:21Three Buddy Problem - Episode 29: Another day, another Ivanti zero-day being exploited in the wild. Plus, China's strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter's reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors a…
…
continue reading
1
US Treasury hacked via BeyondTrust, MISP and the threat actor naming mess
1:49:16
1:49:16
Play later
Play later
Lists
Like
Liked
1:49:16Three Buddy Problem - Episode 28: In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the Xdr33 …
…
continue reading
1
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights
1:53:11
1:53:11
Play later
Play later
Lists
Like
Liked
1:53:11Three Buddy Problem - Episode 27: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade, Costin R…
…
continue reading