Three Buddy Problem

Security Conversations
undefined
Aug 15, 2025 • 1h 58min

On AI’s future, security’s failures, and what comes next...

Three Buddy Problem - Episode 58: The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving advantage of incumbents. We revisit the Chinese "cyber militia" discussion and the looming AI “dot-com bubble,” the value of owning infrastructure, Nvidia and export controls, China’s manufacturing edge, and the geopolitics of supply chains. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)Live from Black Hat: Brandon DixonPSIRT | FortiGuard LabsSonicWall Firewalls – SSLVPN Recent Threat ActivityCisco CVSS 1.0 RCEMargin Research: Cyber Militias ReduxRussia Is Suspected to Be Behind Breach of Federal Court Filing SystemRussian hackers seized control of Norwegian damPoland foiled cyberattack on big city's water supplyEU Parliament pressing for agreement on chat scanning billLABScon 2025
undefined
Aug 7, 2025 • 1h 30min

Live from Black Hat: Brandon Dixon parses the AI security hype

Brandon Dixon, a veteran in the threat intelligence community and former Microsoft employee, dives into the intersection of AI and cybersecurity. He discusses Google's Big Sleep project and the potential of AI in code analysis and automation. The conversation critiques modern software development inefficiencies and the impact of corporate acquisitions on cybersecurity tools. Dixon emphasizes the need for collaboration between tech giants and the community while exploring the future of SOC automation and geopolitical issues affecting AI technologies.
undefined
5 snips
Aug 1, 2025 • 1h 52min

Rethinking APT Attribution: Dakota Cary on Chinese Contractors and Espionage-as-a-Service

Dakota Cary, a China-focused consultant at SentinelOne and a fellow at the Atlantic Council, dives deep into the dark waters of China's cyber ecosystem. He sheds light on APT contractors and their links to espionage-as-a-service. The discussion reveals the intricate ties between hackers and the state security apparatus, complicating attribution efforts. Cary reflects on the need for a cultural shift in U.S. intelligence to tackle these evolving threats while also examining the geopolitical fallout of recent cyber intrusions targeting places like Singapore.
undefined
4 snips
Jul 25, 2025 • 1h 55min

Microsoft Sharepoint security crisis: Faulty patches, Toolshell zero-days

A critical vulnerability in Microsoft SharePoint sparks national security concerns, with state-sponsored hackers exploiting faulty patches. The discussion highlights the chaotic landscape of cybersecurity practices and the challenges posed by outdated collaboration tools. Privacy issues are further scrutinized, including Microsoft’s past responses to data exposures. Plus, a humorous, cautionary tale unfolds about AI mishaps in coding, underscoring the need for robust protocols in tech development. Insights on consciousness and its links to language also provide a thought-provoking twist.
undefined
6 snips
Jul 18, 2025 • 1h 49min

Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’

Discover the shocking vulnerability in U.S. train braking systems that could allow remote hijacking. Unravel the impact of new UK sanctions against Russia's GRU and the scrutiny on pro-Russian hacktivists. Delve into the dark world of 'war influencers' sharing graphic content online and the challenges of international accountability. Explore Microsoft's controversial reliance on Chinese engineers for U.S. cloud systems, and the rapid evolution of AI technologies and their security implications, all packed with humor and insightful commentary.
undefined
27 snips
Jul 10, 2025 • 1h 49min

How did China get Microsoft's zero-day exploits?

Discover the fascinating case of the first arrest of a Chinese intelligence-linked hacker in Italy. The discussion delves into the notorious HAFNIUM group, uncovering how they accessed Microsoft Exchange zero-days. Analyze the competitive cyber capabilities between the U.S. and China, and explore the rise of 'cyber militias' in the region. The episode also tackles cybersecurity challenges related to young offenders, the impact of drone technology in warfare, and the effectiveness of current cybersecurity tools.
undefined
34 snips
Jul 3, 2025 • 1h 34min

Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT

Dive into the latest cybersecurity revelations, highlighting France's exposure to Ivanti VPN zero-days and the intricate links to a North American threat actor known as 'Night Eagle.' Explore the complexities of cyber attribution, particularly amid geopolitical tensions and the reliability of threat intelligence from different regions. The hosts also discuss significant breaches, like Iran's Nobitex crypto-exchange hack, and ponder the implications of containment claims surrounding China's 'Salt Typhoon.' It's a fascinating look at the evolving landscape of cyber threats!
undefined
94 snips
Jun 20, 2025 • 3h 7min

Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks

Hamid Kashfi, a former researcher at Immunity/Trail of Bits with expertise in the Iran-Israel cyber conflict, joins the discussion. They delve into the shadowy group Predatory Sparrow and its cyber operations during the Israel-Iran war. The conversation covers a shocking $90 million cryptocurrency disappearance linked to hacktivism, the human impact of ATM outages, and the blurred lines between grassroots cyber activism and state-sponsored attacks. Kashfi offers on-the-ground insights into Iran's cyber capabilities amid ongoing geopolitical tensions.
undefined
15 snips
Jun 13, 2025 • 1h 52min

Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms

Delve into the cyber battlefield between Israel and Iran, where explosive drone swarms meet advanced hacking threats. Discover the 'magnet of threats' server in Iran that's drawing attention from multiple nation-states. Get insights into zero-day exploits and the implications of recent spyware targeting journalists. Explore the risks of de-anonymization in Android devices and how innovative solutions like Tailscale are reshaping digital security. This engaging discussion intertwines geopolitics with the latest in cybersecurity advancements.
undefined
Jun 6, 2025 • 1h 29min

Mikko Hypponen talks drone warfare, APT naming schemes

Mikko Hypponen, a cybersecurity veteran and Chief Research Officer at Sensofusion, dives into the cutting-edge world of drone warfare. He discusses Ukraine's innovative Operation Spiderweb, where drone swarms targeted Russian airbases, highlighting the changing landscape of military strategy. The conversation also touches on the ethical implications of autonomous drones and the challenges of naming cyber threats. With insights into the cyber tactics employed in the Ukraine-Russia conflict, Hypponen shares a unique perspective on the intersection of technology and modern warfare.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app