Three Buddy Problem

Security Conversations
undefined
Dec 20, 2025 • 2h 2min

What's behind US gov push to 'privatize' cyber operations?

The discussion delves into the U.S. government's new strategy to enlist private firms for offensive cyber operations. They explore the implications of legal complexities surrounding letters of marque for cartels. Insight is provided on the emergence of vulnerabilities, including Apple and Cisco zero-days. Uncoveries of Belarusian spyware targeting journalists are alarming. Amazon's detection of a North Korean infiltrator through unique keystroke lag adds a twist, showcasing the intersection of advanced technology with security challenges.
undefined
5 snips
Dec 11, 2025 • 2h 12min

Legal corruption, React2Shell exploitation, dual-use AI risks

A Romanian documentary ignites nationwide protests, exposing the insidious nature of legal corruption and the public's demand for accountability. The conversation shifts to the growing threat of React2Shell exploitation, detailing technical challenges and the difficulties of patching vulnerable components. The hosts critique Microsoft's transparency issues and highlight the evolving landscape where advanced persistent threats meet criminal exploits. They also explore the dual-use risks of AI, questioning its rapid advancements in penetration testing capabilities.
undefined
18 snips
Dec 6, 2025 • 1h 42min

APTs pounce on React2Shell; BRICKSTORM backdoors; .gov surveillance

Hosts dive into alarming cybersecurity topics, starting with a critical React vulnerability wreaking havoc online as Chinese APTs pounce. They explore the chaos of patching, the hidden complexities, and the risk of missed server logs. The discussion shifts to the BrickStorm backdoor and the implications of a secret U.S. task force combating cybercrime. Additionally, the impact of AI on smart-contract vulnerabilities surfaces, linking technology advancements to ongoing cyber thefts. There's also commentary on Chrome's data collection controversies and the evolving U.S. national security strategy.
undefined
14 snips
Nov 29, 2025 • 1h 57min

Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture

The hosts dive into Microsoft's shifting stance on intel sharing and what it means for the security landscape. They dissect the Shai-Hulud 2.0 npm supply-chain attack and its implications for trust in package ecosystems. CISA's guidance on mobile spyware elicits strong opinions, while NSO's legal troubles reveal the complexities of cyber capabilities. Arctic Wolf's report on GRU-linked intrusions shines a light on geopolitical cyber threats, and the FCC's rollback of telecom cybersecurity rules sparks vital debates on regulation and accountability.
undefined
42 snips
Nov 21, 2025 • 2h 20min

Gemini 3 reactions, Fortinet/Chrome zero-days, a Cloudflare monoculture and a billion-dollar crypto twist

The hosts dive into the release of Gemini 3 and its performance, sparking debates on coding comparisons with other AI models. They highlight a significant Cloudflare outage and the risks of dependence on monocultures. Discussions around the implications of Iranian cyber activities and new APT reports reveal emerging threats. The episode includes a surprising twist about billions in seized Bitcoin linked to a mining hack, raising questions on the future of these funds. An engaging mix of tech insights and cybersecurity dilemmas keeps listeners on their toes.
undefined
50 snips
Nov 14, 2025 • 2h 13min

Anthropic Claude Code automating APT hacks, KnownSec leak, Chinese buses with remote access

The hosts dive into Anthropic's claims of the first AI-orchestrated cyberattack using Claude Code. They unpack skepticism about the evidence provided, questioning the motives behind the self-promotion. The discussion touches on the potential misuse of automation in Cybersecurity and the dangers of rapid exploitation. They also explore a major data breach at Chinese vendor KnownSec and China's accusation against the U.S. regarding a Bitcoin heist. Insights about Amazon's detection of zero-days and Google's Private AI Compute further fuel the conversation.
undefined
Nov 10, 2025 • 1h 10min

LIVE from Ring0 COUNTERMEASURE: Google v FFmpeg, Ransomware Turncoats, Samsung 0days

This engaging conversation dives into the rising tension between Google and FFmpeg over open-source patching. The hosts discuss the legal repercussions facing ransomware negotiators, highlighting insider risks. A mysterious APT attack named LANDFALL is revealed, linked to a Samsung mobile zero-day. They also touch on the potential ban of TP-Link in the U.S., exploring security implications in consumer hardware. With insights into AI-driven bug reports and their impact on maintainers, the episode is packed with timely tech discussions!
undefined
15 snips
Oct 31, 2025 • 2h 11min

OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs

Dave Aitel, an experienced security researcher at OpenAI, joins the discussion to unveil Aardvark, a groundbreaking AI designed to identify and fix code vulnerabilities. He shares insights on the interplay between AI and bug-hunting, emphasizing its advantages over traditional methods like fuzzing. The conversation also delves into the evolving landscape of cybersecurity, including recent legal issues around exploit sales and proposed legislation in Russia affecting vulnerability disclosures. Aitel offers valuable advice for startups in this rapidly changing field.
undefined
14 snips
Oct 24, 2025 • 2h 11min

Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA

Delve into the implications of iOS 26 cutting off crucial forensic tools for identifying iPhone malware. Discover the mystery behind a million-dollar WhatsApp zero-click exploit that fizzled at Pwn2Own. Explore a surreal court case involving a Trenchant developer accused of selling attack secrets to Russia. Unearth tensions as China’s cyber intelligence implicates the NSA in espionage activities. Finally, hear discussions on the need for a structured legal framework for offensive cyber operations in the U.S.
undefined
12 snips
Oct 18, 2025 • 31min

JAGS LABScon 2025 keynote: Steps to an ecology of cyber

Join Juan Andres Guerrero-Saade, a senior threat intelligence researcher renowned for his insights on wartime cyber threats, as he explores the future of cybersecurity. He discusses the shift from chaos to a more sustainable, interconnected approach. Guerrero-Saade highlights the importance of systems thinking and introduces dyadic cybernetics, emphasizing the synergy between human and artificial evaluators. He challenges industry norms, urging practitioners to reclaim their worth and focus on tangible outcomes over mere compliance. It's a thought-provoking call to action in the evolving landscape of security.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app