Look for any podcast host, guest or anyone
Showing episodes and shows of

Juan Andres Guerrero-Saade

Shows

Three Buddy ProblemThree Buddy ProblemJAGS keynote: The intricacies of wartime cyber threat intelligenceThree Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be...2025-05-0931 minThree Buddy ProblemThree Buddy ProblemSignalgate redux, OpenAI's Aardvark, normalizing cyber offenseThree Buddy Problem - Episode 44: We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors. Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)US government using obscure app to archive Signal messagesReuters photo of Mike Wa...2025-05-032h 38Three Buddy ProblemThree Buddy ProblemThomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware securityThree Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. Cast: Thomas Rid, Juan Andres Guerrero-Saade and...2025-04-251h 33Three Buddy ProblemThree Buddy ProblemChina doxxes NSA, CVE's funding crisis, Apple's zero-day troublesThree Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games. Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days. Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.2025-04-171h 39Three Buddy ProblemThree Buddy ProblemNSA director fired, Ivanti's 0day screw-up, backdoor in robot dogsThree Buddy Problem - Episode 41: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang's keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti's misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices. Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh. We also discuss Microsoft touting AI's value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a...2025-04-041h 36Three Buddy ProblemThree Buddy ProblemSignalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returnsThree Buddy Problem - Episode 40: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who's behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)The Atlantic: The Trump admin accidentally texted me its war plansThe Atlantic: Here are the attack plans shared on SignalSignal statement on SignalGateOur experts separate Signal from noise...2025-03-281h 52Three Buddy ProblemThree Buddy ProblemChina exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cutsThree Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs. Cast: Katie Moussouris, Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)China's MSS discloses Taiwan APTs Antiy report Taiwan's "Green Spot" attack groupCitizen Lab on Paragon’s Proliferating Spyware Operat...2025-03-211h 56Three Buddy ProblemThree Buddy ProblemA half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit huntingThree Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek. Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Microsoft...2025-03-142h 05Three Buddy ProblemThree Buddy ProblemRevisiting the Lamberts, i-Soon indictments, VMware zero-daysThree Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections. Cast: Juan Andres Gu...2025-03-081h 39Three Buddy ProblemThree Buddy ProblemLazarus ByBit $1.4B heist was supply chain attack on developerThree Buddy Problem - Episode 36: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S...2025-03-011h 53Three Buddy ProblemThree Buddy ProblemNorth Korea's biggest ever crypto heist: $1.4B stolen from BybitThree Buddy Problem - Episode 35: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK. We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espionage against China’s top universities, Chinese hacking gangs moonlighting as ransomware criminals, and Russian APTs abusing Signal’s “linked devices” feature. Plus, Costin explains Microsoft’s quantum computing breakthrough. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript...2025-02-232h 07Three Buddy ProblemThree Buddy ProblemAn 'extremely sophisticated' iPhone hack; Google flags major AMD microcode bugThree Buddy Problem - Episode 34: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Apple iOS 18.3.1 zero-day bulletinApple Says iPhone USB Restricted Mode Exploited in ‘Extremely Sophisticated’ AttackQuarkslab: Analysis of USB Restricted Mode bypass (CVE-2025-24200)ZDI Patch Tuesda...2025-02-151h 25Three Buddy ProblemThree Buddy ProblemUnpacking the UK government's secret iCloud backdoor demandThree Buddy Problem - Episode 33: In this episode, we unpack the UK government's secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale. Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hacking, and TikTok-powered election disinformation and interference. From wormable exploits like Eternal Bue to the realities of AI-based spying, the episode offers a detailed look into how government oversight, private sector collaboration, and shifting market forces have reshaped the way we think about cybersecurity. Ca...2025-02-082h 22CyberWire DailyCyberWire DailyA Digital Eye on supply-chain-based espionage attacks. [Research Saturday]This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from SentinelOne's SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations....2025-02-0127 minResearch SaturdayResearch SaturdayA Digital Eye on supply-chain-based espionage attacks.This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from SentinelOne's SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations....2025-02-0127 minThree Buddy ProblemThree Buddy ProblemInside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devicesThree Buddy Problem - Episode 32: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoing debate over IP theft and innovation, and the challenges that come with a Chinese company shipping an open-source alternative. Beyond AI, we dig into some of the latest headlines; from a Chinese ‘backdoor’ in medical devices, problems with CISA’s backdoor b...2025-01-312h 19Three Buddy ProblemThree Buddy ProblemDeath of the CSRB, zero-days storms at the edge, Juniper router backdoorsThree Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. Cast: Juan Andres Guerrero-Saade, Costin...2025-01-241h 48Three Buddy ProblemThree Buddy ProblemInside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0dayThree Buddy Problem - Episode 30: We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. ComputersPlugX removal affidavitSekoia -- PlugX worm disinfection campaignJen Easterly: Building a secure by Design ecosystem Trump zeroes in on Se...2025-01-171h 59Three Buddy ProblemThree Buddy ProblemHijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vulnThree Buddy Problem - Episode 29: Another day, another Ivanti zero-day being exploited in the wild. Plus, China's strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter's reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors and Ukrainian hacktivists wiping a major Russian ISP. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Ivanti Connect Secure zero-day advisoryMandiant report on new Ivanti zero-dayChina Daily responds to Volt Typhoon attributionJapan warns about Chinese 'MirrorFace' attacksWho is...2025-01-101h 48Three Buddy ProblemThree Buddy ProblemUS Treasury hacked via BeyondTrust, MISP and the threat actor naming messThree Buddy Problem - Episode 28: In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the Xdr33 CIA Hive malware, and exclusive new information on the Cyberhaven Chrome extension security incident. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)BeyondTrust statement on hack investigationU.S. Treasury says it was hacked by China-backed actorsAnother...2025-01-031h 49Three Buddy ProblemThree Buddy ProblemPalo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlightsThree Buddy Problem - Episode 27: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor Palo Alto: Operation Lunar PeekInvestigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts“A Digital Prison”: Surveillance and the suppression of civil society in Serb...2024-12-271h 53Three Buddy ProblemThree Buddy ProblemUS government's VPN advice, dropping bombs on ransomware gangsThree Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:...2024-12-231h 58Three Buddy ProblemThree Buddy ProblemSurveillance economics, Turla and Careto, and the AI screenshots nobody asked forThree Buddy Problem - Episode 25: An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader issues around surveillance capitalism and micro-targeting. Plus, news on Turla piggybacking on cybercriminal malware to hit Ukraine, the return of Careto and the absence of IOCs, Claroty report on an Iran-linked cyberweapon targeting critical infrastructure, ethical considerations in cyberwarfare, and the implications of quantum computing on security and cryptocurrencies. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Turla using tools of other groups to attack Uk...2024-12-132h 14Three Buddy ProblemThree Buddy ProblemInside the Turla Playbook: Hijacking APTs and fourth-party espionageThree Buddy Problem - Episode 24: In this episode, we did into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution. We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok. Cast: Juan Andres Guerrero-Saade, Costin Raiuand Ryan Naraine.Links:Transcript (unedited, AI-generated)Russian APT Turla Caught Stealing From Paki...2024-12-071h 47Three Buddy ProblemThree Buddy ProblemVolexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectabilityThree Buddy Problem - Episode 23: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions. We also cover news on a Firefox zero-day exploited on the Tor browser, the professionalization of ransomware, ESET's discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmwa...2024-11-301h 18Three Buddy ProblemThree Buddy ProblemRussian APT weaponized nearby Wi-Fi networks in DC, new macOS zero-days, DOJ v ChromeThree Buddy Problem - Episode 22: We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks. We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and...2024-11-221h 28Changelog Master FeedChangelog Master FeedUnpop roundup! 2023 (Go Time #338)Go Time producer, Jerod Santo, ranks & reviews the most (un)popular opinions of 2023. Join the discussionChangelog++ members save 9 minutes on this episode because they made the ads disappear. Join today!Sponsors:Fly.io – The home of Changelog.com — Deploy your apps close to your users — global Anycast load-balancing, zero-configuration private networking, hardware isolation, and instant WireGuard VPN connections. Push-button deployments that scale to thousands of instances. Check out the speedrun to get started in minutes. Timescale – Purpose-built performance for AI Build RAG, search, and AI agents on the cloud and with Pos...2024-11-2138 minGo Time: Golang, Software EngineeringGo Time: Golang, Software EngineeringUnpop roundup! 2023Go Time producer, Jerod Santo, ranks & reviews the most (un)popular opinions of 2023. Join the discussionChangelog++ members save 9 minutes on this episode because they made the ads disappear. Join today!Sponsors:Fly.io – The home of Changelog.com — Deploy your apps close to your users — global Anycast load-balancing, zero-configuration private networking, hardware isolation, and instant WireGuard VPN connections. Push-button deployments that scale to thousands of instances. Check out the speedrun to get started in minutes. Timescale – Purpose-built performance for AI Build RAG, search, and AI agents on the cloud and with Pos...2024-11-2138 minThree Buddy ProblemThree Buddy ProblemWhat happens to CISA now? Is deterrence in cyber possible?Three Buddy Problem - Episode 21: We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happen...2024-11-151h 53Three Buddy ProblemThree Buddy ProblemMysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacksThree Buddy Problem - Episode 20: We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:Transcript (unedited, AI-generated)iPhones mysteriously rebooting themselvesApple quietly ships iPhone reboot codeFBI on China hacking US pre...2024-11-091h 37Three Buddy ProblemThree Buddy ProblemThe Sophos kernel implant, 'hack-back' implications, CIA malware in VenezuelaThree Buddy Problem - Episode 19: We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:Transcript (unedited, AI-generated)Ivan Kwiatkowski: Threat intel truths insideJAG-S LABScon keynoteSophos Used Custom Implants to Surveil Chinese HackersSophos Pacific Rim reportNCSC details ‘Pygmy Goat’ ne...2024-11-031h 54Three Buddy ProblemThree Buddy ProblemFortinet 0days, Appin hack-for-hire exposé, crypto heists, Russians booted from Linux kernelThree Buddy Problem - Episode 18: This week’s show covers the White House's new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed from Linux kernel maintenance and China’s Antiy beefing with Sentinel One over APT reporting. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:Transcript (AI-generated)White House TLP guidanceApplin -- How an Indian startup hacked the worldBurning Zero Days: Fort...2024-10-251h 26Three Buddy ProblemThree Buddy ProblemESET Israel wiper malware, China's Volt Typhoon response, Kaspersky sanctions and isolationThree Buddy Problem - Episode 17: News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China's strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:ESET Israel wiper attacksESET comment on Israel wiper incidentDakota Cary on China’s Volt Typhoon Influence OpsVolt Typhoon III (PDF)US Sanctions 12 Kaspersky ExecutivesKaspersky cl...2024-10-181h 38Three Buddy ProblemThree Buddy ProblemTyphoons and Blizzards: Cyberespionage and national security on front burnerThree Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:NC...2024-10-111h 09Three Buddy ProblemThree Buddy ProblemCareto returns, IDA Pro pricing controversy, crypto's North Korea problemThree Buddy Problem - Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (Secu...2024-10-041h 30Three Buddy ProblemThree Buddy ProblemExploding beepers, critical CUPS flaws, Windows Recall rebuilt for securityThree Buddy Problem - Episode 14: The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon. (This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.) Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:The Consolation of Threat Intel (JAG-S LA...2024-09-281h 19Three Buddy ProblemThree Buddy ProblemEp13: The Consolation of Threat Intel (JAG-S LABScon keynote)Three Buddy Problem - Episode 13: This is a special edition of the show, featuring Juan Andres Guerrero-Saade's full keynote day remarks at LABScon2024. In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disenfranchisement among professionals, the void in meaningful work, and the importance of reclaiming control and value in cybersecurity. Juan emphasizes the need for researchers, journalists, and even VCs, to be the change to reinvigorate the industry and ensure its relevance and impact. Cast: Juan Andres...2024-09-2131 minThree Buddy ProblemThree Buddy ProblemEp12: Security use-cases for AI chain-of-thought reasoningThree Buddy Problem - Episode 12: Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity. We discuss the hype around OpenAI's new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed source AI models. Cast: Gabriel Bernadett-Shapiro , Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek). Costin Raiu is on vacation. Links:TranscriptGabe Bernadett-Shapiro at the Alperovitch InstituteIntroducing OpenAI o1OpenAI's o1 model 'cheated' on an impossible testOpenAI o1 System CardLearning to Reason with LLMsLABScon 2024 Full Agenda2024-09-141h 14Three Buddy ProblemThree Buddy ProblemEp11: Cyberwarfare takes an ominous turnThree Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)Links:Transcript (unedited)CISA advisory on GRU Unit 29155 — Russian Military Cyber Actors Target US and Global Critical InfrastructureRussian Military Unit Tied to Assassinations Caught Do...2024-09-061h 15Three Buddy ProblemThree Buddy ProblemEp10: Volt Typhoon zero-day, Russia's APT29 reusing spyware exploits, Pavel Durov's arrestThree Buddy Problem - Episode 10: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France. Plus, the NSA is launching a podcast. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)Links:Transcript (unedited)China's Volt...2024-08-301h 18Three Buddy ProblemThree Buddy ProblemEp9: The blurring lines between nation-state APTs and the ransomware epidemicThree Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage. Hosts: Juan Andres Guerrero-Saade...2024-08-231h 06Three Buddy ProblemThree Buddy ProblemEp8: Microsoft's zero-days and a wormable Windows TCP/IP flaw known to ChinaThree Buddy Problem - Episode 8: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)Links:Episode 8 TranscriptSix Windows Zero-Days Being Actively ExploitedCVE-2024-38063 - Windows Ping of DeathWormable TCP/IP flaw known to China — Chinese researcher Xiao Wei of Cyber KunLun said he...2024-08-171h 17Three Buddy ProblemThree Buddy ProblemEp7: Crowd2K and the kernel, PKFail supply chain failures, Paris trains sabotage and Russian Olympic attacksThree Buddy Problem - Episode 7: In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms. The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the impo...2024-08-021h 10Three Buddy ProblemThree Buddy ProblemEp6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?Three Buddy Problem - Episode 6: As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel. Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hosp...2024-07-261h 16Three Buddy ProblemThree Buddy ProblemEp5: CrowdStrike's faulty update shuts down global networksThree Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding...2024-07-1959 minThree Buddy ProblemThree Buddy ProblemEp4: The AT&T mega-breach, iPhone mercenary spyware, Microsoft zero-daysThree Buddy Problem - Episode 4: The boys delve into the massive AT&T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets. Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins, AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).Links:Transcript (unedited, AI-generated)AT&T SEC Filing on mega-breachCNN: Nearly...2024-07-131h 11Three Buddy ProblemThree Buddy ProblemEp3: Dave Aitel joins debate on nation-state hacking responsibilitiesThe 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future...2024-07-051h 04Three Buddy ProblemThree Buddy ProblemEp2: A deep-dive on disrupting and exposing nation-state malware opsThe 'Three Buddy Problem' Podcast Episode 2: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware. We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io...2024-06-291h 08Three Buddy ProblemThree Buddy ProblemEp1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud ComputeWelcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week. Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game. Oh, we also talk about the KL ban.Links:Microsoft’s embarrassing RecallBrad Smith CSRB testimonyInside Apple Private Cloud ComputeLABScon - Security Research in Real TimeFollow Costin Ra...2024-06-2246 minCyber BriefingCyber BriefingMarch 19, 2024 - Cyber Briefing 👉 What's the latest in the cyber world today? 🚨 #CyberAlerts New Phishing Attack Deploys NetSupport RAT via Clever Microsoft Office Trick  Source :  Ariel Davidpur via Perception Point Windows Users Targeted by Advanced DEEP#GOSU Malware  Source :  D. Iuzvyk, T. Peck, O. Kolesnikov via Securonix AcidPour Unleashes Threat Upon Linux x86 Devices  Source : Juan Andres Guerrero-Saade via SentinelOne Three Critical Vulnerabilities Exposed Within Argo System  Source :  Nadav Aharon-Nov via Trust Research AZORult Campaign Exploits Google Sites for Malware Distribution Source...2024-03-1908 minMichael Gale\'s Futures In FocusMichael Gale's Futures In FocusJuan Andres Guerrero-Saade - Rapid Evolution of Cyber Warfare In an imminent future of interconnected technology, cyber warfare is rapidly evolving. With the growing Internet of Things and advances in AI, cyber attacks become more sophisticated, blurring the lines between espionage and warfare. Nations engage in offensive cyber operations, complicating attribution, while non-state actors may act as proxies, challenging response strategies. The consequences extend beyond service disruptions, potentially affecting civilians and reshaping global internet access based on alliances. This evolution presents complex challenges in security and regulation in a highly connected digital world. Read Michael's corresponding article on Forbes here: https://www.forbes.com/s...2024-03-0143 minTo The Point - CybersecurityTo The Point - Cybersecurity"Roided-out Sitting Duck" Part Two with Juan Andres Guerrero-SaadeWant to know what this week’s episode title means? Listen to our two-part episode with Juan Andrés Guerrero Saade (aka JAGS), principal researcher at SentinelOne and Adjunct Professor of Strategic Studies at Johns Hopkins School of Advanced International Studies (SAIS). JAGS takes us on an exciting and educational ride through his research efforts on Moonlight Maze, one of the first widely known cyber espionage campaigns in world history, and how he came to be a featured hologram in the International Spy Museum in Washington, D.C. He also shares insights on the epic trolling endeavor through the rec...2024-01-3038 minTo The Point - CybersecurityTo The Point - CybersecurityRoided-out Sitting Duck Part One with Juan Andres Guerrero-SaadeWant to know what this week’s episode title means? Listen to our two-part episode with Juan Andrés Guerrero Saade (aka JAGS), principal researcher at SentinelOne and Adjunct Professor of Strategic Studies at Johns Hopkins School of Advanced International Studies (SAIS). JAGS takes us on an exciting and educational ride through his research efforts on Moonlight Maze, one of the first widely known cyber espionage campaigns in world history, and how he came to be a featured hologram in the International Spy Museum in Washington, D.C. He also shares insights on the epic trolling endeavor through the rec...2024-01-2335 minSafe Mode PodcastSafe Mode PodcastLive from Black Hat: Juan Andres Guerrero-Saade on Microsoft’s recent cybersecurity problemsA string of breaches involving Microsoft infrastructure has left many within the security community frustrated with the company’s approach to securing its systems. CyberScoop Senior Editor Elias Groll sat down at the Black Hat security conference in Las Vegas with Juan Andres Guerrero-Saade, a principal threat researcher at SentinelOne, to discuss the key role Microsoft products play in the computing ecosystem and why breaches involving its infrastructure have such devastating consequences. Also on the episode, CyberScoop reporter talks about a newly active hacker group calling itself Kitten Sec.2023-08-2456 minSafe Mode PodcastSafe Mode PodcastLive from Black Hat: Juan Andres Guerrero-Saade on Microsoft’s recent cybersecurity problemsA string of breaches involving Microsoft infrastructure has left many within the security community frustrated with the company’s approach to securing its systems. CyberScoop Senior Editor Elias Groll sat down at the Black Hat security conference in Las Vegas with Juan Andres Guerrero-Saade, a principal threat researcher at SentinelOne, to discuss the key role Microsoft products play in the computing ecosystem and why breaches involving its infrastructure have such devastating consequences. Also on the episode, CyberScoop reporter talks about a newly active hacker group calling itself Kitten Sec.---------Show Timestamps:(00:00) AJ Vicens on th...2023-08-2456 minCyberWire DailyCyberWire DailyRunning away from operation Tainted Love. [Research Saturday]Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.The research can be found here:Operation...2023-05-1322 minResearch SaturdayResearch SaturdayRunning away from operation Tainted Love.Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.The research can be found here:Operation...2023-05-1322 minChangelog Master FeedChangelog Master FeedHacking with Go: Part 4 (Go Time #270)Our “Hacking with Go” series continues! This time Natalie & Johnny are joined by Ivan Kwiatkowski & Juan Andrés Guerrero-Saade and the conversation is we’re focused around generics and AI. Discuss on Changelog News Changelog++ members save 1 minute on this episode because they made the ads disappear. Join today! Sponsors: Fastly – Our bandwidth partner. Fastly powers fast, secure, and scalable digital experiences. Move beyond your content delivery network to their powerful edge cloud platform. Learn more at fastly.com Fly.io – The home of Changelog.com — Deploy your apps and databases close to your u...2023-03-231h 01Go Time: Golang, Software EngineeringGo Time: Golang, Software EngineeringHacking with Go: Part 4Our “Hacking with Go” series continues! This time Natalie & Johnny are joined by Ivan Kwiatkowski & Juan Andrés Guerrero-Saade and the conversation is we’re focused around generics and AI. Join the discussionChangelog++ members save 1 minute on this episode because they made the ads disappear. Join today!Sponsors:Fastly – Our bandwidth partner. Fastly powers fast, secure, and scalable digital experiences. Move beyond your content delivery network to their powerful edge cloud platform. Learn more at fastly.com Fly.io – The home of Changelog.com — Deploy your apps and databases close to your users...2023-03-231h 01DEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichCan ChatGPT Help Malware Analysts?In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work. 2023-03-0837 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichCan ChatGPT Help Malware Analysts?In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work. 2023-03-0837 minThree Buddy ProblemThree Buddy ProblemJAG-S on big-game malware hunting and a very mysterious APT Episode sponsors: Binarly and FwHunt - Protecting devices from emerging firmware and hardware threats using modern artificial intelligence. SentinelLabs malware hunter Juan Andres Guerrero-Saade (JAG-S) returns to the show to discuss how big-game attribution has changed over the years, the nation-state APT landscape, Mudge and the nightmares facing CISOs, and a mysterious actor named Metador.Links:Report: The Mystery of MetadorJ. A. Guerrero-Saade on TwitterLABScon - Security Research in Real TimeResearchers Crowdsourcing Effort to Identify Mysterious Metador APT2022-10-1752 minDecipher Security PodcastDecipher Security PodcastJuan Andres Guerrero-SaadeDennis Fisher talks with Juan Andres Guerrero-Saade, senior director at SentinelLabs, about the investigation into the new Metador APT group that he and his colleagues unveiled at LabsCon recently.2022-10-0552 minThe Defender\'s Advantage PodcastThe Defender's Advantage PodcastThreat Trends: Metador, Mercenaries, and LABScon with SentinelOneThe latest episode of The Defender’s Advantage Podcast features SentinelOne researchers Tom Hegel and Juan Andres Guerrero-Saade who joined host Luke McNamara to discuss some of the latest research they presented at LABScon, September 20-24.  Juan shares details around his team’s findings on Metador, a threat actor that primarily targets telecommunications and internet services providers, as well as universities in the Middle East and Africa. He discusses a few of the group’s unusual characteristics and also their awareness of operations security and deployment of countermeasures to thwart attribution efforts. Tom joins the discussi...2022-09-2940 minChangelog Master FeedChangelog Master FeedHacking with Go (Go Time #205)Natalie and Mat explore hacking in Go from the eyes of 2 security researchers. Joakim Kennedy and JAGS have both used Go for hacking: writing malware, hardware hacking, reverse engineering Go code, and more.2021-11-111h 13Go Time: Golang, Software EngineeringGo Time: Golang, Software EngineeringHacking with Go: Part 1Natalie and Mat explore hacking in Go from the eyes of 2 security researchers. Joakim Kennedy and JAGS have both used Go for hacking: writing malware, hardware hacking, reverse engineering Go code, and more. Join the discussionChangelog++ members save 6 minutes on this episode because they made the ads disappear. Join today!Sponsors:Teleport – Securely access any computing resource anywhere. Engineers and security teams can unify access to SSH servers, Kubernetes clusters, web applications, and databases across all environments. Try Teleport today in the cloud, self-hosted, or open source at goteleport.com In...2021-11-111h 13To The Point - CybersecurityTo The Point - Cybersecurity"Roided-out Sitting Duck", Part Two With Juan Andres Guerrero-SaadeWant to know what this week’s episode title means? Listen to our two-part episode with Juan Andrés Guerrero Saade (aka JAGS), principal researcher at SentinelOne and Adjunct Professor of Strategic Studies at Johns Hopkins School of Advanced International Studies (SAIS). JAGS takes us on an exciting and educational ride through his research efforts on Moonlight Maze, one of the first widely known cyber espionage campaigns in world history, and how he came to be a featured hologram in the International Spy Museum in Washington, D.C. He also shares insights on the epic trolling endeavor through the rec...2021-09-2838 minTo The Point - CybersecurityTo The Point - Cybersecurity"Roided-out Sitting Duck", Part One - With Juan Andres Guerrero-SaadeWant to know what this week’s episode title means? Listen to our two-part episode with Juan Andrés Guerrero Saade (aka JAGS), principal researcher at SentinelOne and Adjunct Professor of Strategic Studies at Johns Hopkins School of Advanced International Studies (SAIS). JAGS takes us on an exciting and educational ride through his research efforts on Moonlight Maze, one of the first widely known cyber espionage campaigns in world history, and how he came to be a featured hologram in the International Spy Museum in Washington, D.C. He also shares insights on the epic trolling endeavor through the rec...2021-09-2135 minResearch SaturdayResearch SaturdayA fresh look at GOSSIPGIRL and the Supra Threat Actors.Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. Juan Andres Guerrero Saade joins us to share their findings.The research can be found here:https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0 Learn more about your ad choices. Visit megaphone.fm/adchoices2019-05-2531 minCyberWire DailyCyberWire DailyA fresh look at GOSSIPGIRL and the Supra Threat Actors. [Research Saturday]Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors.  Juan Andres Guerrero Saade joins us to share their findings. The research can be found here: https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c02019-05-2529 minThree Buddy ProblemThree Buddy ProblemJuan Andrés Guerrero-Saade, Principal Security Researcher, Recorded FuturePrincipal Security Researcher at Recorded Future’s Insikt Group, Juan Andrés Guerrero-Saade (juanandres_gs), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don’t have to be “sophisticated” to launch successful attacks.   https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp32018-05-141h 01Security ConversationsSecurity ConversationsJuan Andrés Guerrero-Saade, Principal Security Researcher, Recorded FuturePrincipal Security Researcher at Recorded Future’s Insikt Group, Juan Andrés Guerrero-Saade (juanandres_gs), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don’t have to be “sophisticated” to launch successful attacks. https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3 Get on the email list at ryanaraine.substack.com2018-05-141h 01El MétodoEl MétodoUna de hackers rusos en el CaribeEsta semana hablo con Juan Andrés Guerrero Saade, investigador de Kaspersky Labs, sobre su improbable camino desde la filosofía y la lógica a dedicarse a luchar contra el cibercrimen internacional a las órdenes de uno de los tipos más célebres de la industria, Eugene Kaspersky. Encuentra más en www.elmetodo.fm y una versión en vídeo de esta conversación en www.ntn24.com Si quieres más podcast independientes y en español, visita www.cuonda.com y descubre Politibot, Binarios, Geocastaway y mucho, mucho más. Comparte este...2017-04-1030 min