Look for any podcast host, guest or anyone
Showing episodes and shows of

Ryan Naraine

Shows

Three Buddy ProblemThree Buddy ProblemMicrosoft Sharepoint security crisis: Faulty patches, Toolshell zero-daysThree Buddy Problem - Episode 55: A SharePoint zero-day exploit chain from Pwn2Own Berlin becomes a full-blown security crisis with Chinese nation-state actors exploiting vulnerabilities that Microsoft struggled to patch properly, leading to trivial bypasses and a cascade of new CVEs. The timeline is messy, the patches are faulty, and ransomware groups are lining up to join the party. We also revisit the ProPublica bombshell about Microsoft's "digital escorts" and U.S. government data exposure to Chinese adversaries and the company's "oops, we will stop" response. Plus, trusting Google's Big Sleep AI claims and a cautionary tale...2025-07-251h 55Three Buddy ProblemThree Buddy ProblemA Coinbase breach with bribes, rogue contractors and a $20M ransom demandThree Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)Coinbase on $20m ransom demandSEC filing on Coinbase breachCoinbase Rogue Contractors Bribed to Leak Customer DataIvanti 0day exploit chain (CVE-2025-4427 and CVE-2025...2025-05-162h 23Three Buddy ProblemThree Buddy ProblemJAGS keynote: The intricacies of wartime cyber threat intelligenceThree Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging information gaps between adversaries. Includes talk on the ethical challenges in CTI, questioning the impact of intelligence-sharing and how cyber operations affect real-world conflicts. He pointed to Ukraine and Israel as examples where CTI plays a critical, yet complicated, role. His message: cybersecurity pros need to be...2025-05-0931 minThree Buddy ProblemThree Buddy ProblemSignalgate redux, OpenAI's Aardvark, normalizing cyber offenseThree Buddy Problem - Episode 44: We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors. Plus, fresh SentinelOne threat-intel notes, France’s attribution of GRU activity and a head-scratching $330 million Bitcoin heist. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)US government using obscure app to archive Signal messagesReuters photo of Mike Wa...2025-05-032h 38Three Buddy ProblemThree Buddy ProblemThomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware securityThree Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national security, and the philosophical questions surrounding AI consciousness and rights. Plus, TP-Link under US government investigation and the broader issues of consumer trust in hardware security, the need for regulation and inspectability of technology, and the struggles with patching network devices. Cast: Thomas Rid, Juan Andres Guerrero-Saade and...2025-04-251h 33Three Buddy ProblemThree Buddy ProblemChina doxxes NSA, CVE's funding crisis, Apple's zero-day troublesThree Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games. Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days. Plus, the effectiveness of Lockdown Mode, the rising costs of mobile exploits, Chris Krebs' exit from SentinelOne after a presidential executive order, and the value and effectiveness of security clearances. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.2025-04-171h 39Three Buddy ProblemThree Buddy ProblemNSA director fired, Ivanti's 0day screw-up, backdoor in robot dogsThree Buddy Problem - Episode 41: Costin and Juanito join the show from Black Hat Asia in Singapore. We discuss Bunnie Huang's keynote on hardware supply chains and a classification system to establish a grounded perspective on trust in hardware, Ivanti's misdiagnosis of a critical VPN applicance flaw and Mandiant reporting on a Chinese APT exploiting Ivanti devices. Plus, breaking news on the sudden firing of NSA director and head of Cyber Command Tim Haugh. We also discuss Microsoft touting AI's value in finding open-source bootloader bugs, Silent Push report on a RUssian APT impersonating the CIA, a...2025-04-041h 36Three Buddy ProblemThree Buddy ProblemSignalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returnsThree Buddy Problem - Episode 40: On the show this week, we look at the technical deficiencies and opsec concerns around the use of Signal for ultra-sensitive communications. Plus, some speculation on who's behind Kaspersky’s ‘Operation Forum Troll’ report, Chinese discussion on NSA/CIA mobile networks exploitation, and the return of ‘Lab Dookhtegan’ hack-and-leak exposures. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)The Atlantic: The Trump admin accidentally texted me its war plansThe Atlantic: Here are the attack plans shared on SignalSignal statement on SignalGateOur experts separate Signal from noise...2025-03-281h 52Three Buddy ProblemThree Buddy ProblemChina exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cutsThree Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs. Cast: Katie Moussouris, Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)China's MSS discloses Taiwan APTs Antiy report Taiwan's "Green Spot" attack groupCitizen Lab on Paragon’s Proliferating Spyware Operat...2025-03-211h 56Three Buddy ProblemThree Buddy ProblemA half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit huntingThree Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek. Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Microsoft...2025-03-142h 05Three Buddy ProblemThree Buddy ProblemRevisiting the Lamberts, i-Soon indictments, VMware zero-daysThree Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. Plus, a dissection of ‘The Lamberts’ APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation’ and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China’s i-Soon ‘hackers-for-hire’ indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections. Cast: Juan Andres Gu...2025-03-081h 39Three Buddy ProblemThree Buddy ProblemLazarus ByBit $1.4B heist was supply chain attack on developerThree Buddy Problem - Episode 36: Ryan and Juanito join the show from the RE//verse conference with discussion on Natalie Silvanovic’s keynote on hunting for bugs in mobile messengers, the thrill of looking at exposed attack surfaces and the grueling “losses” bug hunters endure before a breakthrough. We also cover the latest on the $1.4 billion ByBit hack pinned on the Lazarus Group and the malicious JavaScript supply chain attack at the center of the cryptocurrency heist. Plus, the ethical gray zones of tethered exploits via Cellebrite, the whiplash of AI-driven threat intel, and the looming pivot in U.S...2025-03-011h 53Three Buddy ProblemThree Buddy ProblemNorth Korea's biggest ever crypto heist: $1.4B stolen from BybitThree Buddy Problem - Episode 35: Juanito is live from DistrictCon with notes on discussion of an elusive iOS zero-day by a company called QuaDream and Apple’s controversial removal of iCloud backup end-to-end encryption in the UK. We also cover a staggering $1.4 billion hack by the Lazarus Group against Bybit, new angles in NSA-linked cyber-espionage against China’s top universities, Chinese hacking gangs moonlighting as ransomware criminals, and Russian APTs abusing Signal’s “linked devices” feature. Plus, Costin explains Microsoft’s quantum computing breakthrough. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript...2025-02-232h 07Three Buddy ProblemThree Buddy ProblemAn 'extremely sophisticated' iPhone hack; Google flags major AMD microcode bugThree Buddy Problem - Episode 34: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it’s not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Apple iOS 18.3.1 zero-day bulletinApple Says iPhone USB Restricted Mode Exploited in ‘Extremely Sophisticated’ AttackQuarkslab: Analysis of USB Restricted Mode bypass (CVE-2025-24200)ZDI Patch Tuesda...2025-02-151h 25Three Buddy ProblemThree Buddy ProblemUnpacking the UK government's secret iCloud backdoor demandThree Buddy Problem - Episode 33: In this episode, we unpack the UK government's secret push for backdoor access to encrypted iCloud data, Apple’s approach to iCloud encryption, and the broader implications for privacy and security on a global scale. Plus, how security agencies handle zero-day vulnerabilities, surveillance spyware and mercenary hacking, and TikTok-powered election disinformation and interference. From wormable exploits like Eternal Bue to the realities of AI-based spying, the episode offers a detailed look into how government oversight, private sector collaboration, and shifting market forces have reshaped the way we think about cybersecurity. Ca...2025-02-082h 22Three Buddy ProblemThree Buddy ProblemInside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devicesThree Buddy Problem - Episode 32: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, why it’s stirring up existential controversies, and what it means for the broader tech landscape. We get into the privacy concerns, the geo-political implications, how AI models handle data, the ongoing debate over IP theft and innovation, and the challenges that come with a Chinese company shipping an open-source alternative. Beyond AI, we dig into some of the latest headlines; from a Chinese ‘backdoor’ in medical devices, problems with CISA’s backdoor b...2025-01-312h 19Three Buddy ProblemThree Buddy ProblemDeath of the CSRB, zero-days storms at the edge, Juniper router backdoorsThree Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. Cast: Juan Andres Guerrero-Saade, Costin...2025-01-241h 48Three Buddy ProblemThree Buddy ProblemInside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0dayThree Buddy Problem - Episode 30: We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, CISA leadership taking a victory lap using the ‘Secure by Design’ pledge as a trophy, the new Biden cybersecurity Executive Order, another Fortinet zero-day, the TikTok ban and Ukrainian hackers targeting Russian companies. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Court-Authorized Operation Removes PlugX Malware from Over 4,200 Infected U.S. ComputersPlugX removal affidavitSekoia -- PlugX worm disinfection campaignJen Easterly: Building a secure by Design ecosystem Trump zeroes in on Se...2025-01-171h 59Three Buddy ProblemThree Buddy ProblemHijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vulnThree Buddy Problem - Episode 29: Another day, another Ivanti zero-day being exploited in the wild. Plus, China's strange response to Volt Typhoon attribution, Japan blames China for hacks, a Samsung 0-click vulnerability found by Project Zero, Kim Zetter's reporting on drone sightings and a nuclear scare. Plus, hijacking abandoned .gov backdoors and Ukrainian hacktivists wiping a major Russian ISP. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Ivanti Connect Secure zero-day advisoryMandiant report on new Ivanti zero-dayChina Daily responds to Volt Typhoon attributionJapan warns about Chinese 'MirrorFace' attacksWho is...2025-01-101h 48Three Buddy ProblemThree Buddy ProblemUS Treasury hacked via BeyondTrust, MISP and the threat actor naming messThree Buddy Problem - Episode 28: In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion caused by a lack of standardization, methodological inconsistencies and skewed, marketing-driven incentives. Plus, the US Treasury/BeyondTrust hack, the surge in 0day discoveries, a new variant of the Xdr33 CIA Hive malware, and exclusive new information on the Cyberhaven Chrome extension security incident. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)BeyondTrust statement on hack investigationU.S. Treasury says it was hacked by China-backed actorsAnother...2025-01-031h 49Three Buddy ProblemThree Buddy ProblemPalo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlightsThree Buddy Problem - Episode 27: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor Palo Alto: Operation Lunar PeekInvestigating Ivanti Connect Secure VPN Exploitation and Persistence Attempts“A Digital Prison”: Surveillance and the suppression of civil society in Serb...2024-12-271h 53Three Buddy ProblemThree Buddy ProblemUS government's VPN advice, dropping bombs on ransomware gangsThree Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government’s controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:...2024-12-231h 58Three Buddy ProblemThree Buddy ProblemSurveillance economics, Turla and Careto, and the AI screenshots nobody asked forThree Buddy Problem - Episode 25: An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader issues around surveillance capitalism and micro-targeting. Plus, news on Turla piggybacking on cybercriminal malware to hit Ukraine, the return of Careto and the absence of IOCs, Claroty report on an Iran-linked cyberweapon targeting critical infrastructure, ethical considerations in cyberwarfare, and the implications of quantum computing on security and cryptocurrencies. Cast: Juan Andres Guerrero-Saade, Costin Raiu and Ryan Naraine.Links:Transcript (unedited, AI-generated)Turla using tools of other groups to attack Uk...2024-12-132h 14Three Buddy ProblemThree Buddy ProblemInside the Turla Playbook: Hijacking APTs and fourth-party espionageThree Buddy Problem - Episode 24: In this episode, we did into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, and issues around fourth-party espionage and problems with threat actor attribution. We also discuss Citizen Lab’s findings on Monokle-like spyware implanted by Russian authorities, the slow pace of Salt Typhoon disinfection, the Solana web3.js supply chain attack affecting crypto projects, and the Romanian election crisis over Russian interference via TikTok. Cast: Juan Andres Guerrero-Saade, Costin Raiuand Ryan Naraine.Links:Transcript (unedited, AI-generated)Russian APT Turla Caught Stealing From Paki...2024-12-071h 47Three Buddy ProblemThree Buddy ProblemVolexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectabilityThree Buddy Problem - Episode 23: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical challenges associated with memory dumping and forensics. We dig into Volexity’s “nearest neighbor” Wi-Fi hack discovery, gaps in EDR detection and telemetry, and some real-talk on the Volt Typhoon intrusions. We also cover news on a Firefox zero-day exploited on the Tor browser, the professionalization of ransomware, ESET's discovery of a Linux bootkit (we have a scoop on the origins of this!), Binarly research on connections to LogoFAIL, and major visibility gaps in the firmwa...2024-11-301h 18Three Buddy ProblemThree Buddy ProblemRussian APT weaponized nearby Wi-Fi networks in DC, new macOS zero-days, DOJ v ChromeThree Buddy Problem - Episode 22: We discuss Volexity’s presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks. We also cover two new Apple zero-days being exploited in the wild, the US Government’s demand that Google sell the Chrome browser, and the value of data in the context of AI. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and...2024-11-221h 28Three Buddy ProblemThree Buddy ProblemWhat happens to CISA now? Is deterrence in cyber possible?Three Buddy Problem - Episode 21: We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happen...2024-11-151h 53Three Buddy ProblemThree Buddy ProblemMysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacksThree Buddy Problem - Episode 20: We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:Transcript (unedited, AI-generated)iPhones mysteriously rebooting themselvesApple quietly ships iPhone reboot codeFBI on China hacking US pre...2024-11-091h 37Three Buddy ProblemThree Buddy ProblemThe Sophos kernel implant, 'hack-back' implications, CIA malware in VenezuelaThree Buddy Problem - Episode 19: We explore Ivan Kwiatkowski’s essay on the limits of threat intelligence, Sophos using kernel implants to surveil Chinese hackers, the concept of ‘hack-back’ and legal implications, geopolitical layers of cyber espionage, CIA malware in Venezuela, Vatican/Mossad mentioned in high-profile Italy hacks, and Canada bracing for .gov attacks from India. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:Transcript (unedited, AI-generated)Ivan Kwiatkowski: Threat intel truths insideJAG-S LABScon keynoteSophos Used Custom Implants to Surveil Chinese HackersSophos Pacific Rim reportNCSC details ‘Pygmy Goat’ ne...2024-11-031h 54Three Buddy ProblemThree Buddy ProblemFortinet 0days, Appin hack-for-hire exposé, crypto heists, Russians booted from Linux kernelThree Buddy Problem - Episode 18: This week’s show covers the White House's new Traffic Light Protocol (TLP) guidance, Reuters expose of Appin as a hack-for-hire mercenary company, Fortinet zero-day exploitation and missing CSRB investigations, major cryptocurrency heists, Apple opening Private Cloud Compute to public inspection, Russians removed from Linux kernel maintenance and China’s Antiy beefing with Sentinel One over APT reporting. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:Transcript (AI-generated)White House TLP guidanceApplin -- How an Indian startup hacked the worldBurning Zero Days: Fort...2024-10-251h 26Three Buddy ProblemThree Buddy ProblemESET Israel wiper malware, China's Volt Typhoon response, Kaspersky sanctions and isolationThree Buddy Problem - Episode 17: News of a wiper malware attack in Israel implicating ESET, threats from wartime hacktivists, China's strange response to Volt Typhoon attribution and Section 702 messaging, an IE zero-day discovery and web browser rot in South Korea, the ongoing isolation of Kaspersky due to sanctions, and the geopolitical influences affecting cybersecurity reporting. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:ESET Israel wiper attacksESET comment on Israel wiper incidentDakota Cary on China’s Volt Typhoon Influence OpsVolt Typhoon III (PDF)US Sanctions 12 Kaspersky ExecutivesKaspersky cl...2024-10-181h 38Three Buddy ProblemThree Buddy ProblemTyphoons and Blizzards: Cyberespionage and national security on front burnerThree Buddy Problem - Episode 16: We break down the new GCHQ advisory on the history and tactics of Russia’s APT29, the challenges of tracking and defending against these sophisticated espionage programs, the mysterious Salt Typhoon intrusions, the absence of technical indicators (IOCs), the risks of supply chain attacks. We also touch on the surge in zero-day discoveries, the nonstop flow of exploited Ivanti security bugs, and why the CSRB should investigate these network edge device and appliance vendors. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:NC...2024-10-111h 09Three Buddy ProblemThree Buddy ProblemCareto returns, IDA Pro pricing controversy, crypto's North Korea problemThree Buddy Problem - Episode 15: Juanito checks in from Virus Bulletin with news on the return of Careto/Mask, a ‘milk-carton’ APT linked to Spain. We also cover the latest controversy surrounding IDA Pro's subscription model, a major new YARA update, and ongoing issues with VirusTotal's value and pricing. The conversation shifts to North Korean cyber operations, particularly the infiltration of prominent crypto companies, Tom Rid's essay on Russian disinformation results, and the US government's ICE department using commercial spyware from an Israeli vendor. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (Secu...2024-10-041h 30Three Buddy ProblemThree Buddy ProblemExploding beepers, critical CUPS flaws, Windows Recall rebuilt for securityThree Buddy Problem - Episode 14: The buddies are back together for a discussion on Juan’s LABScon keynote and mental health realities, Microsoft rewriting the Windows Recall security architecture, a new CVSS 9.9 Linux CUPS flaw, Kaspersky's controversial transition to Ultra AV, and the intelligence operations surrounding exploding pagers in Lebanon. (This episode is dedicated to the memory of Jeff Wade from Solis, who was an important part of the LABScon family.) Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).Links:The Consolation of Threat Intel (JAG-S LA...2024-09-281h 19Three Buddy ProblemThree Buddy ProblemEp13: The Consolation of Threat Intel (JAG-S LABScon keynote)Three Buddy Problem - Episode 13: This is a special edition of the show, featuring Juan Andres Guerrero-Saade's full keynote day remarks at LABScon2024. In this talk, Juanito addresses the current state of the threat intelligence industry, expressing a need for a difficult conversation about its direction and purpose. He discusses feelings of disenfranchisement among professionals, the void in meaningful work, and the importance of reclaiming control and value in cybersecurity. Juan emphasizes the need for researchers, journalists, and even VCs, to be the change to reinvigorate the industry and ensure its relevance and impact. Cast: Juan Andres...2024-09-2131 minThree Buddy ProblemThree Buddy ProblemEp12: Security use-cases for AI chain-of-thought reasoningThree Buddy Problem - Episode 12: Gabriel Bernadett-Shapiro joins the show for an extended conversation on artificial intelligence and cybersecurity. We discuss the hype around OpenAI's new o1 model, AI chain-of-thought reasoning and security use-cases, pervasive chatbots and privacy concerns, and the ongoing debate between open source and closed source AI models. Cast: Gabriel Bernadett-Shapiro , Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek). Costin Raiu is on vacation. Links:TranscriptGabe Bernadett-Shapiro at the Alperovitch InstituteIntroducing OpenAI o1OpenAI's o1 model 'cheated' on an impossible testOpenAI o1 System CardLearning to Reason with LLMsLABScon 2024 Full Agenda2024-09-141h 14Three Buddy ProblemThree Buddy ProblemEp11: Cyberwarfare takes an ominous turnThree Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)Links:Transcript (unedited)CISA advisory on GRU Unit 29155 — Russian Military Cyber Actors Target US and Global Critical InfrastructureRussian Military Unit Tied to Assassinations Caught Do...2024-09-061h 15Three Buddy ProblemThree Buddy ProblemEp10: Volt Typhoon zero-day, Russia's APT29 reusing spyware exploits, Pavel Durov's arrestThree Buddy Problem - Episode 10: Top stories this week -- Volt Typhoon zero-day exploitation of Versa Director servers, Chinese APT building botnets with EOL routers, the gap in security solutions for network devices and appliances, Russia's APT29 (Midnight Blizzard) caught reusing exploits from NSO Group and Intellexa, Microsoft’s upcoming Windows endpoint security summit in response to the CrowdStrike incident, and the arrest of Telegram’s Pavel Durov in France. Plus, the NSA is launching a podcast. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)Links:Transcript (unedited)China's Volt...2024-08-301h 18Three Buddy ProblemThree Buddy ProblemEp9: The blurring lines between nation-state APTs and the ransomware epidemicThree Buddy Problem - Episode 9: On this episode, we look at the hacking scene in Taiwan, the sad state of visibility into big malware campaigns, the absence of APTs linked to the prolific MIVD Dutch intelligence agency, the blurring lines between big ransomware heists and nation-state actors caught using ransomware as a tool for sabotage and misattribution. Plus, Chinese mobile OS vendor Xiaoimi caught disabling parts of its infrastructure -- including its global app store -- to thwart Pwn2Own contestants; and news of an addition to the LABScon 2024 keynote stage. Hosts: Juan Andres Guerrero-Saade...2024-08-231h 06Three Buddy ProblemThree Buddy ProblemEp8: Microsoft's zero-days and a wormable Windows TCP/IP flaw known to ChinaThree Buddy Problem - Episode 8: This week’s show digs into Microsoft’s in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran’s aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)Links:Episode 8 TranscriptSix Windows Zero-Days Being Actively ExploitedCVE-2024-38063 - Windows Ping of DeathWormable TCP/IP flaw known to China — Chinese researcher Xiao Wei of Cyber KunLun said he...2024-08-171h 17Three Buddy ProblemThree Buddy ProblemEp7: Crowd2K and the kernel, PKFail supply chain failures, Paris trains sabotage and Russian Olympic attacksThree Buddy Problem - Episode 7: In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston’s technical documentation and issues around kernel access and OS resilience. We also discuss Binarly’s PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms. The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the impo...2024-08-021h 10Three Buddy ProblemThree Buddy ProblemEp6: After CrowdStrike chaos, should Microsoft kick EDR agents out of Windows kernel?Three Buddy Problem - Episode 6: As the dust settles on the CrowdStrike incident that blue-screened 8.5 million Windows computers worldwide, we dig into CrowdStrike’s preliminary incident report, the lack of transparency in the update process and the need for more robust testing and validation. We also discuss Microsoft's responsibility to avoid infinite BSOD loops, risks of deploying EDR agents on critical systems, and how an EU settlement is being blamed for EDR vendors having access to the Windows kernel. Other topics on the show include Mandiant's attribution capabilities, North Korea’s gov-backed hacking teams launching ransomware on hosp...2024-07-261h 16Three Buddy ProblemThree Buddy ProblemEp5: CrowdStrike's faulty update shuts down global networksThree Buddy Problem - Episode 5: Hot off the press, we dive into the news of the CrowdStrike software update that caused blue screens on computers worldwide, the resulting chaos and potential connections to the Microsoft 365 outage, the fragility of modern computing and the risks of new software paradigms. We also discuss the AT&T mega-breach and the ransom paid to delete the stolen data; the challenges of ransomware and the uncertainty surrounding the deletion of stolen data; the FBI gaining access to a password-protected phone, the prices for zero-click exploits; and the resurgence of APT 41 with expanding...2024-07-1959 minThree Buddy ProblemThree Buddy ProblemEp4: The AT&T mega-breach, iPhone mercenary spyware, Microsoft zero-daysThree Buddy Problem - Episode 4: The boys delve into the massive AT&T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets. Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins, AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).Links:Transcript (unedited, AI-generated)AT&T SEC Filing on mega-breachCNN: Nearly...2024-07-131h 11Three Buddy ProblemThree Buddy ProblemEp3: Dave Aitel joins debate on nation-state hacking responsibilitiesThe 'Three Buddy Problem' Podcast Episode 3: Former NSA computer scientist Dave Aitel (Immunity Inc., Cordyceps Systems) joins Juan Andres Guerrero-Saade for a frank discussion on the OpenSSH unauthenticated remote code execution vulnerability and the challenges around patching and exploitation, the CISA 'secure-by-design' pledge and its impact on software vendor practices, Microsoft lobbying and the CSRB report, and changing face of government's attempts at cybersecurity regulations. We discuss the disruption caused by political changes and the potential implications for cybersecurity policies, impact from the Supreme Court Chevron ruling, security regulations and the challenges of writing laws for future...2024-07-051h 04Three Buddy ProblemThree Buddy ProblemEp2: A deep-dive on disrupting and exposing nation-state malware opsThe 'Three Buddy Problem' Podcast Episode 2: Ryan Naraine, Costin Raiu and Juan Andres Guerrero-Saade go all-in on the discussion around Google Project Zero disrupting counter-terrorism malware operations. A deep dive on disruption vs exposure, the effects of US government sanctions on private mercenary hacking companies, hypocricy and the tricky relationship between malware researchers are the intelligence community, and the lack of 'success stories' from so-called benevolent malware. We also discuss the implications of the TeamViewer breach by a skilled Russian APT, new Microsoft notifications to Midnight Blizzard victims and share thoughts on the Polyfill.io...2024-06-291h 08Three Buddy ProblemThree Buddy ProblemEp1: The Microsoft Recall debacle, Brad Smith and the CSRB, Apple Private Cloud ComputeWelcome to Episode 1 of a brand new cybersecurity podcast discussing the biggest news stories of the week. Ryan Naraine hosts a fast-moving conversation with Juan Andres Guerrero-Saade (LABScon) and Costin Raiu (Art of Noh) on the Microsoft Recall debacle, the dark patterns emerging as big-tech embraces AI, Brad Smith's testimony and the lingering effects of the CSRB report, Apple's new Private Cloud Compute (PCC) infrastructure and Cupertino's long game. Oh, we also talk about the KL ban.Links:Microsoft’s embarrassing RecallBrad Smith CSRB testimonyInside Apple Private Cloud ComputeLABScon - Security Research in Real TimeFollow Costin Ra...2024-06-2246 minDecipher Security PodcastDecipher Security PodcastThe Challenges of Reporting on Complex Intrusions With Ryan NaraineVeteran security journalist and podcaster Ryan Naraine joins the Decipher podcast to discuss the challenges of separating fact from fiction when reporting on complex incidents such as the Snowflake breach.2024-06-0626 minThree Buddy ProblemThree Buddy ProblemSidra Ahmed Lefort dishes on VC investments and cyber uncertaintiesEpisode sponsors: Binarly (https://binarly.io) FwHunt (https://fwhunt.run) Munich Re Ventures investment principal Sidra Ahmed Lefort joins Ryan Naraine for a frank discussion on the state of VC funding in cybersecurity, the rise (and coming correction) in the land of security 'unicorns', the massive early-stage funding rounds and what they mean, layoffs and contractions, and the places in security still ripe for innovation.Links:Sidra Ahmed Lefort on LinkedInPortfolio | Munich Re VenturesWhat's Going on With Cybersecurity VC Investments?Video: VC View - Trends in Cybersecurity Innovation2023-02-1531 minThree Buddy ProblemThree Buddy ProblemHaroon Meer on the business of cybersecurityThinkst founder and CEO Haroon Meer joins Ryan Naraine on the show to talk about building a successful cybersecurity company without venture capital investment, fast-moving attack surfaces and the never-ending battle to mitigate memory corruption issues.Links:Haroon Meer on TwitterThinkst: We bootstrapped to $11 million in ARRMemory Corruption and Hacker FolkloreThinkst CanaryPodcast: Haroon Meer, Thinkst Applied Research2022-03-191h 15Three Buddy ProblemThree Buddy ProblemNico Waisman, Head of Privacy & Security, LyftAfter a 20-year career working in the offensive security reseach trenches, security industry pioneer Nico Waisman made the transition to defense to head up privacy and security efforts at ride-sharing firm Lyft. Waisman joins Ryan Naraine on the show to talk about early hacking in Argentina, the contributions of non-Americans to the security industry, and much much more...2021-03-2656 minThree Buddy ProblemThree Buddy ProblemRon Brash on the water plant hacks and the state of ICS securityRon Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry -- and not worry -- about. Ron is Director of Cyber Security Insights at Verve Industrial Protection, a critical infrastructure-focused organisation that sells services and products that work across IT and OT environments for effective cyber security, controls and management. 2021-03-1150 minSecurity ConversationsSecurity ConversationsTim MalcomVetter, Red Team Lead, Walmart[ DISCLAIMER: These are the personal opinions of Tim MalcomVetter and do not construe an official endorsement or business relationship of his employer with any product or service. ]Walmart Red Team lead Tim MalcomVetter joins the podcast to talk about red-team/blue team dynamics, the adversarial relationship between the two sides, the mentality of a determined attacker, and why everyone in cybersecurity should give jiu-jitsu a try.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the...2020-05-0559 minSecurity ConversationsSecurity ConversationsMatt Suiche, Comae TechnologiesHacker-turned-entrepreneur Matt Suiche reminisces about the hacking scene in France, his introduction to memory forensics and how his research led to presenting at Microsoft's Blue Hat, the grind of building and selling a company, and his passion for supporting young security researchers in developing countries.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of its subsidiaries. Get on the email list at ryanaraine.substack.com2020-04-1742 minSecurity ConversationsSecurity ConversationsJaime Blasco, AT&T CybersecurityAT&T Cybersecurity's Jaime Blasco talks about falling in love with security as a high-school student in Spain, finding a career path in pen-testing and offense, shifting to building defensive technologies and his current passion for exploring the value of machine learning.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of its subsidiaries. Get on the email list at ryanaraine.substack.com2020-04-1531 minSecurity ConversationsSecurity ConversationsCollin Mulliner, Security Engineer, CruiseMobile security pioneer Collin Mulliner talks about the early days of hacking PalmOS devices, the current state of smartphone platforms, his work on securing self driving cars, and why he built and open-sourced a firmware analyzer tool.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of its subsidiaries. Get on the email list at ryanaraine.substack.com2020-04-0433 minSecurity ConversationsSecurity ConversationsMichael Piacente, Principal, Hitch PartnersHitch Partners principal Michael Piacente dishes on the cybersecurity job market during an economic crisis, the intricacies of recruiting top-flight security talent, the high rate of turnover among CISOs, and why companies should spend more time on writing better job descriptions.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of its subsidiaries. Get on the email list at ryanaraine.substack.com2020-03-3033 minSecurity ConversationsSecurity ConversationsDave Aitel, Founder and CEO, ImmunitySecurity industry pioneer Dave Aitel dishes on entrepreneurship, fostering a "one team, one parking lot" culture, how lessons from his time at the NSA still guides his decisions, and his approach to blunt, honest marketing. We also discuss a shared passion for Brazilian Jiu-Jitsu and his work supporting Project Grapple in Miami.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of its subsidiaries. Get on...2020-03-2337 minSecurity ConversationsSecurity ConversationsSounil Yu, Cyber Defense MatrixFormer Chief Security Scientist at Bank of America, Sounil Yu, explains why he created the Cyber Defense Matrix framework and how organizations are using it to drive visibility and security decisions in multiple places. We discuss securing "cattle vs pets," the next era of security innovation, and the increasing security poverty line that hurts small- and medium-sized businesses.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of...2020-03-1735 minSecurity ConversationsSecurity ConversationsAndy Ellis, Chief Security Officer, Akamai TechnologiesIn an industry where 10-15% of staff are women, Akamai's security team is 40% women and growing. Chief security officer Andy Ellis joins the podcast to share lessons on practical things -- some subtle, some major -- that pushed real diversity on Akamai's security team.Disclosure: Ryan Naraine is a security strategist at Intel Corp. Ryan produces this podcast in his personal capacity and the views and opinions expressed in these recordings do not necessarily reflect the positions and views of Intel Corp. or any of its subsidiaries. Get on the email list at ryanaraine.substack.com2020-03-1232 minSecurity ConversationsSecurity ConversationsCostin Raiu, Global Director, GReAT, Kaspersky LabVeteran malware hunter Costin Raiu talks about writing his own an anti-virus program as a teenager in Romania, his work tracking advanced threat actors globally, and why he assumes his computer is compromised by at least three APT groups. Get on the email list at ryanaraine.substack.com2018-09-0351 minSecurity ConversationsSecurity ConversationsJosh Lefkowitz, Founder and CEO, FlashpointFlashpoint chief executive Josh Lefkowitz talks about how his previous work as a counter-terrorism analyst underscored the value of contextual threat-intelligence, his company's approach to gathering and analyzing data, and his mission to be an extension of a client's security team. Get on the email list at ryanaraine.substack.com2018-08-2832 minSecurity ConversationsSecurity ConversationsChristine Gadsby, Director of Product Security Operations, BlackBerryBlackBerry security response executive Christine Gadsby joins the podcast to talk about tough decisions around shipping secure software, the challenges of securing supply chain dependencies, BlackBerry's new ransomware recovery feature, and her upcoming Black Hat 2018 presentation. Get on the email list at ryanaraine.substack.com2018-08-0627 minSecurity ConversationsSecurity ConversationsChad Loder, co-founder and CEO, Habitu8Cybersecurity industry veteran Chad Loder talks about his time as co-founder of Rapid7, the decision to acquire Metasploit, lessons learned from moving to the CISO chair and why the industry still struggles with security awareness training. Get on the email list at ryanaraine.substack.com2018-07-3153 minSecurity ConversationsSecurity ConversationsChris Castaldo, Senior Director of Cybersecurity, 2UChris Castaldo, senior director of cybersecurity at 2U, Inc., joins Ryan on the podcast to talk about building a threat model for digitizing the education sector, his top priorities as a defender, new solutions that impress him, and why it's important to get independent third-party security assessments. Get on the email list at ryanaraine.substack.com2018-07-2639 minSecurity ConversationsSecurity ConversationsWim Remes, CEO and Principal Researcher, Wire SecurityFounder and CEO of Wire Security, Wim Remes, joins the podcast to discuss the intricacies of penetration testing, red-teaming, bug bounty programs, and calls for defenders to embrace continuous pen-testing. Get on the email list at ryanaraine.substack.com2018-07-2340 minSecurity ConversationsSecurity ConversationsDan Hubbard, Chief Security Architect, LaceworkLacework Chief Security Architect Dan Hubbard joins the podcast to discuss his new research on container security, the challenges of securing cloud deployments, and why technological advancements have widened attack surfaces. Get on the email list at ryanaraine.substack.com2018-07-1638 minSecurity ConversationsSecurity ConversationsDavid Weston, Principal Security Engineering Manager, MicrosoftDavid Weston manages the Windows Device and Offensive Security Research teams at Microsoft. He joins the podcast to talk about how proactive red-team exercises push major mitigations to Microsoft's products and the current state of security in the Windows ecosystem. Get on the email list at ryanaraine.substack.com2018-06-2546 minSecurity ConversationsSecurity ConversationsRich Seiersen, SVP and CISO, Lending ClubSVP and Chief Information Security Officer (CISO) at Lending Club, Rich Seiersen, digs into the nuts and bolts of defending a financial services firm, his approach to finding quality cybersecurity talent, and the importance of confronting security with data. (Recorded during fireside chat at SecurityWeek’s CISO Forum). https://securityconversations.com/wp-content/uploads/2018/06/rich_seierson.mp3 Get on the email list at ryanaraine.substack.com2018-06-1837 minSecurity ConversationsSecurity ConversationsAndrew Morris, Founder and CEO, GreyNoise IntelligenceFounder and CEO of GreyNoise Intelligence Andrew Morris (andrew___morris) talks about his “anti threat-intelligence” company, the ways SOCs are using it to filter through scanning noise and the trials and tribulations of bootstrapping a start-up. https://securityconversations.com/wp-content/uploads/2018/05/andrew_morris.mp3 Get on the email list at ryanaraine.substack.com2018-06-0137 minSecurity ConversationsSecurity ConversationsYoav Leitersdorf, Managing Partner , YL VenturesManaging Partner at YL Ventures, Yoav Leitersdorf (ylventures), explains the surge in cybersecurity investments in Israel, the priorities for his $75 million fund and which sectors are ripe for the picking. https://securityconversations.com/wp-content/uploads/2018/05/ep30-yoav_leitersdorf.mp3 Get on the email list at ryanaraine.substack.com2018-05-2226 minSecurity ConversationsSecurity ConversationsJuan Andrés Guerrero-Saade, Principal Security Researcher, Recorded FuturePrincipal Security Researcher at Recorded Future’s Insikt Group, Juan Andrés Guerrero-Saade (juanandres_gs), explains the nuances of good threat intelligence, sheds light on nation-state hacker activity and warns that adversaries don’t have to be “sophisticated” to launch successful attacks. https://securityconversations.com/wp-content/uploads/2018/05/juan_andres_guerrero_saade.mp3 Get on the email list at ryanaraine.substack.com2018-05-141h 01Security ConversationsSecurity ConversationsRobert M. Lee, Chief Executive Officer, Dragos Inc.The founder and CEO of Dragos, Inc. Robert M. Lee (RobertMLee) cuts through the hype around threats to critical infrastructure and offers a matter-of-fact take on active defense, “hacking-back,” and nation-state espionage operations. https://securityconversations.com/wp-content/uploads/2018/05/ep28-robert-m-lee.mp3 Get on the email list at ryanaraine.substack.com2018-05-1054 minSecurity ConversationsSecurity ConversationsBrandon Dixon, Vice President, RiskIQVP of Product at RiskIQ Brandon Dixon (@9bplus) delves into nation-state cyber operations, explains why it’s dangerous to underestimate North Korea’s capabilities, and his passion for roasting the perfect coffee bean.https://securityconversations.com/wp-content/uploads/2018/05/ep27-brandon-dixon.mp3 Get on the email list at ryanaraine.substack.com2018-05-091h 03Security ConversationsSecurity ConversationsRyan Huber, Security Architect, SlackSlack security architect Ryan Huber talks about the gargantuan task of defending an organization with 8 million daily active users, burnout, and fatigue in security teams and a range of issues around bug bounties and penetration testing. Get on the email list at ryanaraine.substack.com2018-05-091h 04Security ConversationsSecurity ConversationsIvan Arce, CTO at QuarkslabChief Technology Officer at Quarkslab Ivan Arce (@4dgifts) tells stories about the birth of penetration testing platforms, the concentration of hacking talent in Argentina, and his focus on security problems in the Android ecosystem.https://securityconversations.com/wp-content/uploads/2018/05/ivan_arce_01.mp3 Get on the email list at ryanaraine.substack.com2018-05-051h 00Security ConversationsSecurity ConversationsSinan Eren, Founder and CEO, FydeFounder and CEO of Fyde (@FydeApp) Sinan Eren discusses the “iOS-ification” of platforms and the security ramifications, the dangers of running AV software, the iOS vs. Android security argument, and his new venture to address mobile phishing attacks.https://securityconversations.com/wp-content/uploads/2018/05/Ep-24-sinan_eren.mp3 Get on the email list at ryanaraine.substack.com2018-05-0244 minSecurity ConversationsSecurity ConversationsStephen Ridley, Founder and CTO, SenrioFounder and CTO at Senrio Stephen Ridley (@s7ephen) talks about the abysmal state of IoT security, his recent exploitation of an IP camera, and router to exfiltrate corporate data and his experience as a minority in the security industry.https://securityconversations.com/wp-content/uploads/2018/04/Ep23-stephen-ridley.mp3 Get on the email list at ryanaraine.substack.com2018-04-3049 minSecurity ConversationsSecurity ConversationsMischel Kwon, Founder and CEO, MKA CyberFounder and CEO at MKACyber Mischel Kwon joins the podcast to address the state of the SOC (Security Operations Center) and how businesses should deal with issues around excessive alerts, incident response times, and outdated metrics. Get on the email list at ryanaraine.substack.com2018-04-2739 minSecurity ConversationsSecurity ConversationsRick Holland, CISO and VP of Strategy, Digital ShadowsCISO and VP of Strategy at Digital Shadows Rick Holland discusses his path in the information security industry, advancements in the threat intel space, and his passion for good bar-b-que. Get on the email list at ryanaraine.substack.com2018-04-2535 minSecurity ConversationsSecurity ConversationsThomas Ptacek, Founder, LatacoraLatacora Security founder Thomas Ptacek joins the podcast to weigh in on the cybersecurity skills shortage, his approach to recruiting and hiring, and what needs to be done to address diversity in the industry. Get on the email list at ryanaraine.substack.com2018-04-2448 minSecurity ConversationsSecurity ConversationsZane Lackey, Chief Security Officer, Signal SciencesCo-founder and Chief Security Officer at Signal Sciences Zane Lackey riffs on DevOps, the almost impossible task of defending organizations from intruders, bug bounties versus penetration testing, and the pros and cons of launching a company with venture capital investment. Get on the email list at ryanaraine.substack.com2018-04-1741 minSecurity ConversationsSecurity ConversationsHaroon Meer, CEO, Thinkst Applied ResearchThinkst founder Haroon Meer talks about building a security company from scratch without VC funding, using Canaries to pinpoint signs of intruder activity, advancements in security research, and the state of the bug bounty market. Get on the email list at ryanaraine.substack.com2018-04-131h 00Security ConversationsSecurity ConversationsDavid (int eighty), Dual CoreRed teamer and security researcher by day, nerdcore rapper by night, ‘int eighty’ joins the podcast to talk about his work breaking into computer systems, common security mistakes that people make, and his double life as a musician in Dual Core. Get on the email list at ryanaraine.substack.com2018-04-1239 minSecurity ConversationsSecurity ConversationsDennis Fisher, Editor-in-Chief, DecipherVeteran cybersecurity writer Dennis Fisher joins the podcast to talk about his new journalism venture at decipher.sc, his preference for long-form writing, and the trends worth following in the security space. Get on the email list at ryanaraine.substack.com2018-04-0643 minSecurity ConversationsSecurity ConversationsTim Maurer, Scholar, Carnegie Endowment for International PeaceTim Maurer, a scholar at the Carnegie Endowment for International Peace, talks about nation state-backed hacking activity and the dangers of breaking trust in the global financial system. Get on the email list at ryanaraine.substack.com2018-03-0532 minSecurity ConversationsSecurity ConversationsWill Lin, Principal and Founding Investor, ForgePoint CapitalPrincipal and founding investor at ForgePoint Capital Cybersecurity William Lin talks about venture capital activity in the security space, sectors that are ripe for investment, missed bets on successful companies, and the cybersecurity talent shortage. Get on the email list at ryanaraine.substack.com2018-03-0255 minSecurity ConversationsSecurity ConversationsPete Chronis, CISO, Turner BroadcastingChief Information Security Officer at Turner Broadcasting Pete Chronis discusses his new book on solving the cybersecurity conundrum, the day-to-day grind of securing a global media organization, and the role of the CISO in the modern world. Get on the email list at ryanaraine.substack.com2018-02-2645 minSecurity ConversationsSecurity ConversationsBrad Arkin, Chief Security Officer, AdobeAdobe’s Chief Security Officer Brad Arkin talks about setting and managing risk management priorities, protecting company infrastructure, the challenges of securing software, and the looming death of Adobe Flash Player. Get on the email list at ryanaraine.substack.com2018-02-2347 minSecurity ConversationsSecurity ConversationsAanchal Gupta, Director of Security, FacebookDirector of Security at Facebook Aanchal Gupta joins the podcast to share her story and provide guidance for young women struggling to overcome societal obstacles. Get on the email list at ryanaraine.substack.com2018-02-1435 minSecurity ConversationsSecurity ConversationsTom Conklin, Director of Security and Compliance, Vera SecuritySenior Director of Security and Compliance at Vera Security Tom Conklin talks about the pros and cons of using bug bounty programs, the challenges of managing risk in smaller companies, and why user awareness training is an ongoing headache for security administrators. Get on the email list at ryanaraine.substack.com2018-02-0833 minSecurity ConversationsSecurity ConversationsJohn Terrill, CISO, Fox News, Fox Business and Fox TelevisionChief Information Security Officer at Fox News, Fox Business, and Fox Television John Terrill joins the podcast to talk about life in the CISO trenches and makes a bold prediction that could significantly change the cybersecurity narrative. Get on the email list at ryanaraine.substack.com2018-02-0647 minSecurity ConversationsSecurity ConversationsChristopher Ahlberg, CEO, Recorded FutureCo-founder and CEO of Recorded Future Christopher Ahlberg discusses the emergence of threat intelligence as a valuable security tool, the morals and ethics surrounding disclosure of nation-state attacks and the importance of tracking adversaries beyond the wall. Get on the email list at ryanaraine.substack.com2018-01-3029 minSecurity ConversationsSecurity ConversationsMasha Sedova, co-founder, Elevate SecurityAs businesses struggle with security awareness training for employees, Elevate Security co-founder Masha Sedova argues that the focus should be on “behavior change” and recommends the use of positive motivation and available tools to get employees to make better security decisions. Get on the email list at ryanaraine.substack.com2018-01-2630 minSecurity ConversationsSecurity ConversationsPaul Roberts, Editor-in-Chief, Security LedgerVeteran security journalist Paul Roberts talks about the creation of Security Ledger, his work covering cybersecurity, the democratization of media, and hiccups with IoT legislation. Get on the email list at ryanaraine.substack.com2018-01-1940 minSecurity ConversationsSecurity ConversationsDino Dai Zovi, co-founder and CTO, Capsule8Dino Dai Zovi, co-founder and CTO of Capsule8, joins the podcast to talk about the fallout from the Meltdown and Spectre vulnerabilities, the transition from security research to managing a VC-funded start-up and reminisce about his time as a famous Pwn2Own MacBook hacker. Get on the email list at ryanaraine.substack.com2018-01-1139 minSecurity ConversationsSecurity ConversationsSharon Anolik, President and Founder, Privacy PanaceaSharon Anolik, President and Founder of Privacy Panacea, talks about her work advising corporate clients on privacy and data protection issues, the looming chaos surrounding the European Union’s GDPR (General Data Protection Regulation) and the role she plays on ‘Silicon Valley.’ Get on the email list at ryanaraine.substack.com2018-01-0443 minSecurity ConversationsSecurity ConversationsKim Zetter, Journalist and AuthorAward-winning security journalist and author Kim Zetter talks about her work tracking cyber-espionage campaigns, why she uses an old school cassette player to record sensitive interviews and the dramatic changes sweeping the security industry. Get on the email list at ryanaraine.substack.com2017-12-2952 minSecurity ConversationsSecurity ConversationsKelly Jackson Higgins, Executive Editor, Dark ReadingDark Reading executive editor Kelly Jackson Higgins joins the podcast to tell security journalism war stories, talk about her new WiFi-enabled refrigerator and some trends worth following closely. Get on the email list at ryanaraine.substack.com2017-12-2039 minSecurity ConversationsSecurity ConversationsKatie Moussouris, co-founder and CEO, Luta SecurityComputer security researcher and CEO of Luta Security, Katie Moussouris. talks about her life in the penetration testing trenches, advocating responsible security research, building bug bounty programs and the challenges of succeeding as a woman in the industry. Get on the email list at ryanaraine.substack.com2017-12-0652 min