PodcastsNoticiasThree Buddy Problem

Three Buddy Problem

Security Conversations
Three Buddy Problem
Último episodio

220 episodios

  • Three Buddy Problem

    The AI-powered 10x patch tsunami has arrived. Now what?

    15/05/2026 | 1 h 50 min
    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 98: We dive back into the fast16 malware discovery with fresh speculation that it's targeting spherical implosion simulations for Iran's nuclear program, and wonder who on earth is qualified to confirm this.

    Plus, thoughts on OpenAI's new three-tier cyber access program, Microsoft's MDASH harness, the 10x Patch Tuesday tsunami, Cloudflare's 1,100 layoffs blamed on AI, and why frontier-lab guardrails may just be elaborate security theater.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 - Introductory banter

    3:19 - fast16 update: spherical implosion simulations?

    9:01 - Manhattan Project precedent — why this matches Iran

    12:28 - Who can actually reproduce the FAST 16 attack?

    19:32 - Google GTIG's "AI-written" zero-day

    22:13 - The rise of AI-backend "silent detections"

    25:54 - Guardrails as security theater

    38:47 - Are the 10x patch numbers real defense?

    43:48 - OpenAI's Trusted Access tiers + Microsoft MDASH

    53:35 - End of the ‘patch-and-pray’ model

    57:50 - Sean Heelan: strict harnesses can make models worse

    1:03:51 - Pwn2Own Berlin overflow and bug-density debate

    1:12:24 - Cloudflare's 1,100 layoffs and AI as scapegoat

    1:27:42 - RCS encryption, Android Intrusion Logging, Seedworm & Kazuar
  • Three Buddy Problem

    The disappointing death of big-game APT reporting

    10/05/2026 | 2 h 2 min
    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 97: We discuss the disappearing art of Windows APT paleontology, the absence of complex malware documentation, and why so much threat-intel research has slipped behind paywalls and into private rooms.

    Plus, a surge in AI-discovered bugs in Firefox and Chrome, a rough week for Linux security flaw disclosures, and the usual Ivanti and Palo Alto zero-day bulletins that ship without a single IOC.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 - Introductory banter

    1:17 - Inside TLP-Red: writing hashes by hand

    3:57- fast16 fallout and the threat intel trust collapse

    9:17 - The death of cyber paleontology on Windows

    14:49 - Mobile is the new paleontology frontier

    15:48 - When threat intel went private: the CrowdStrike effect

    23:29 - Falling sideways into intelligence brokerage

    36:05 -- AI, Easter eggs, and the loss of malware artistry

    47:22 -- Will the Frontier Labs publish threat intel?

    51:43 -- fast16 follow-up reports coming

    1:09:38 - Mythos, Aardvark, and the patch tsunami

    1:15:33 - CopyFail and the Linux reboot crisis

    1:51:05 - UAPs, Pulitzers, last-ever LabsCon, and shoutouts
  • Three Buddy Problem

    Cracking the Fast16 sabotage malware mystery

    01/05/2026 | 1 h 47 min
    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 96: We're joined by WIRED writer Andy Greenberg to dig into SentinelLabs' bombshell FAST16 research, a newly deciphered piece of sabotage malware that predates Stuxnet by five years and quietly tampered with physics modeling software likely tied to Iran's nuclear program.

    We discuss the attribution rabbit hole (NSA? Israel? someone else?), the eerie "spiritual warfare" implications of corrupting scientific calculations, and Antiy Labs' very dialectical Chinese rebuttal. Plus, what AI reverse-engineering means for the next decade of cyber paleontology.

    Cast: Andy Greenberg, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 - WIRED’s Andy Greenberg joins the show

    1:53 - How the FAST16 scoop landed in Andy's lap

    6:45 - JAGS sat on this sample for 7 years

    10:33 - How Costin and the Kaspersky team missed the sabotage routine

    15:20 - The "holy moly" moment: what FAST16 actually does

    18:26 - Territorial Dispute, Shadow Brokers, and the driver list

    24:11 - The targets: MOHID, PKPM, and LS-DYNA's link to Iran

    28:13 - No C&C, no victims: a worm built for air-gapped networks

    34:45 - Was this part of a larger anti-Iran toolkit?

    37:55 - Attribution: NSA, Israel, or someone else entirely?

    51:39 - What was the actual sabotage? Unanswered questions

    55:48 - "Spiritual warfare": the psychological angle and trust in computers

    1:20:05 - Equities, going public, and the case for AI-powered reversing

    1:32:19 - Antiy Labs' Chinese rebuttal and the apparatchik tone

    1:43:04 - Shoutouts: Sergey Mineev, LabsCon CFP, PivotCon, and Ekoparty
  • Three Buddy Problem

    Mark Dowd on AI hacking, exploit chains, zero-day sales

    24/04/2026 | 2 h 2 min
    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 95: Vigilant Labs director Mark Dowd joins the show to shed light on the state of offensive research, the economics of the exploit market, and why "Mark Dowd in a box" isn't quite the threat the AI hype machine suggests. He talks through the daily stresses of running an offensive shop, how AI is reshaping vulnerability discovery, exploit development, and the pricing of full exploit chains.

    Plus, thoughts on Lockdown Mode and Apple's MIE, whether mitigations actually work or just push attackers toward less access, the rise of HarmonyOS and the Balkanization of device security, persistence, baseband attacks, GrapheneOS, and Samsung Knox.

    We discuss customer vetting and OpSec fears, policymakers who've never written an exploit, and the strange afterlife of The Art of Software Security Assessment, the 20-year-old book now possibly training data for the very tools coming for his job.

    Cast: Mark Dowd, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 Introductions

    4:28 The origin story of Azimuth: why go offensive?

    6:26 Stresses of running an offensive research business

    12:10 "Mark Dowd in a box" — is AI an existential threat to vuln research?

    16:13 Using AI in workflow: frontier models vs. local models

    22:05 AI in bug-finding vs. exploit implementation

    30:30 Watching AI tear through a firmware backdoor

    38:23 Artificial guardrails and the "POC" wall

    43:25 Will AI commoditize 0days? The high-end vs. low-end vendor split

    57:30 How AI disrupts exploit chain pricing

    1:05:18 Does persistence still matter? Should you reboot your phone?

    1:09:33 Lockdown Mode, MIE, and Apple's "never been compromised" claim

    1:14:25 Do mitigations really work, or are we stuck in an endless loop?

    1:23:25 Android vs. iOS vs. Huawei's HarmonyOS Next

    1:34:44 Exploit leaks, customer vetting, and OpSec fears

    1:41:37 GrapheneOS, Samsung Knox and baseband attacks

    1:53:56 Did the exploit market save us from encryption backdoors?

    1:55:11 What does the threat-intel community get wrong about vuln research?
  • Three Buddy Problem

    The Angry Spark APT Mystery: A Year-Long Backdoor, One Victim, Zero Attribution

    18/04/2026 | 2 h 35 min
    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 94: We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage.

    Plus, connecting the dots across AI-driven vulnerability discovery, Microsoft’s massive Patch Tuesday, Jensen Huang talks cybersecurity, Mythos dangers and Chinese chips, and the quiet erosion of CVE enrichment at NIST.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 – Intros + AI news whiplash

    5:10 – Patch Tuesday breakdown: Microsoft's second-largest CVE release ever

    7:32 – AI accelerating vulnerability discovery at record pace

    10:00 – Frontier lab cyber models, fine-tuning, guardrail removal & KYC

    12:37 – FreeBSD NFS bug: Opus 4.6 was already finding critical vulns

    14:26 – Anthropic's infrastructure strain: Is Opus being nerfed?

    21:05 – OpenAI's Trusted Access for Cyber vs. Anthropic's Mythos cabal

    28:45 – SharePoint zero-day CVE-2026-32201: The endless Microsoft tax

    34:36 – Adobe Acrobat zero-day: A rare, real, Russia-linked exploit in the wild

    41:36 – VirusTotal mining: The golden age of threat intel hunting

    50:03 – ZionSiphon: Vibe-coded OT malware targeting Israeli water infrastructure

    55:04 – Paleontology of threat research: When do you publish? Who do you trust?

    1:13:53 – Angry Spark: A one-machine, one-year backdoor raises eyebrows

    1:49:25 – Jensen Huang vs. Dwarkesh Patel on Mythos, China and chips

    2:14:32 – Chinese AI distillation: 24,000 fake Anthropic accounts, DeepSeek & the catch-up question
Más podcasts de Noticias
Acerca de Three Buddy Problem
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers. Connect with Ryan on Twitter (Open DMs).
Sitio web del podcast

Escucha Three Buddy Problem, Huevos Revueltos con Política y muchos más podcasts de todo el mundo con la aplicación de radio.net

Descarga la app gratuita: radio.net

  • Añadir radios y podcasts a favoritos
  • Transmisión por Wi-Fi y Bluetooth
  • Carplay & Android Auto compatible
  • Muchas otras funciones de la app