

Three Buddy Problem
Security Conversations
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks.
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Episodes
Mentioned books

Dec 20, 2025 • 2h 2min
What's behind US gov push to 'privatize' cyber operations?
The discussion delves into the U.S. government's new strategy to enlist private firms for offensive cyber operations. They explore the implications of legal complexities surrounding letters of marque for cartels. Insight is provided on the emergence of vulnerabilities, including Apple and Cisco zero-days. Uncoveries of Belarusian spyware targeting journalists are alarming. Amazon's detection of a North Korean infiltrator through unique keystroke lag adds a twist, showcasing the intersection of advanced technology with security challenges.

5 snips
Dec 11, 2025 • 2h 12min
Legal corruption, React2Shell exploitation, dual-use AI risks
A Romanian documentary ignites nationwide protests, exposing the insidious nature of legal corruption and the public's demand for accountability. The conversation shifts to the growing threat of React2Shell exploitation, detailing technical challenges and the difficulties of patching vulnerable components. The hosts critique Microsoft's transparency issues and highlight the evolving landscape where advanced persistent threats meet criminal exploits. They also explore the dual-use risks of AI, questioning its rapid advancements in penetration testing capabilities.

18 snips
Dec 6, 2025 • 1h 42min
APTs pounce on React2Shell; BRICKSTORM backdoors; .gov surveillance
Hosts dive into alarming cybersecurity topics, starting with a critical React vulnerability wreaking havoc online as Chinese APTs pounce. They explore the chaos of patching, the hidden complexities, and the risk of missed server logs. The discussion shifts to the BrickStorm backdoor and the implications of a secret U.S. task force combating cybercrime. Additionally, the impact of AI on smart-contract vulnerabilities surfaces, linking technology advancements to ongoing cyber thefts. There's also commentary on Chrome's data collection controversies and the evolving U.S. national security strategy.

14 snips
Nov 29, 2025 • 1h 57min
Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture
The hosts dive into Microsoft's shifting stance on intel sharing and what it means for the security landscape. They dissect the Shai-Hulud 2.0 npm supply-chain attack and its implications for trust in package ecosystems. CISA's guidance on mobile spyware elicits strong opinions, while NSO's legal troubles reveal the complexities of cyber capabilities. Arctic Wolf's report on GRU-linked intrusions shines a light on geopolitical cyber threats, and the FCC's rollback of telecom cybersecurity rules sparks vital debates on regulation and accountability.

42 snips
Nov 21, 2025 • 2h 20min
Gemini 3 reactions, Fortinet/Chrome zero-days, a Cloudflare monoculture and a billion-dollar crypto twist
The hosts dive into the release of Gemini 3 and its performance, sparking debates on coding comparisons with other AI models. They highlight a significant Cloudflare outage and the risks of dependence on monocultures. Discussions around the implications of Iranian cyber activities and new APT reports reveal emerging threats. The episode includes a surprising twist about billions in seized Bitcoin linked to a mining hack, raising questions on the future of these funds. An engaging mix of tech insights and cybersecurity dilemmas keeps listeners on their toes.

50 snips
Nov 14, 2025 • 2h 13min
Anthropic Claude Code automating APT hacks, KnownSec leak, Chinese buses with remote access
The hosts dive into Anthropic's claims of the first AI-orchestrated cyberattack using Claude Code. They unpack skepticism about the evidence provided, questioning the motives behind the self-promotion. The discussion touches on the potential misuse of automation in Cybersecurity and the dangers of rapid exploitation. They also explore a major data breach at Chinese vendor KnownSec and China's accusation against the U.S. regarding a Bitcoin heist. Insights about Amazon's detection of zero-days and Google's Private AI Compute further fuel the conversation.

Nov 10, 2025 • 1h 10min
LIVE from Ring0 COUNTERMEASURE: Google v FFmpeg, Ransomware Turncoats, Samsung 0days
This engaging conversation dives into the rising tension between Google and FFmpeg over open-source patching. The hosts discuss the legal repercussions facing ransomware negotiators, highlighting insider risks. A mysterious APT attack named LANDFALL is revealed, linked to a Samsung mobile zero-day. They also touch on the potential ban of TP-Link in the U.S., exploring security implications in consumer hardware. With insights into AI-driven bug reports and their impact on maintainers, the episode is packed with timely tech discussions!

15 snips
Oct 31, 2025 • 2h 11min
OpenAI’s Dave Aitel talks Aardvark, economics of bug-hunting with LLMs
Dave Aitel, an experienced security researcher at OpenAI, joins the discussion to unveil Aardvark, a groundbreaking AI designed to identify and fix code vulnerabilities. He shares insights on the interplay between AI and bug-hunting, emphasizing its advantages over traditional methods like fuzzing. The conversation also delves into the evolving landscape of cybersecurity, including recent legal issues around exploit sales and proposed legislation in Russia affecting vulnerability disclosures. Aitel offers valuable advice for startups in this rapidly changing field.

14 snips
Oct 24, 2025 • 2h 11min
Apple’s iOS forensics freeze, WhatsApp zero-click, China outs NSA
Delve into the implications of iOS 26 cutting off crucial forensic tools for identifying iPhone malware. Discover the mystery behind a million-dollar WhatsApp zero-click exploit that fizzled at Pwn2Own. Explore a surreal court case involving a Trenchant developer accused of selling attack secrets to Russia. Unearth tensions as China’s cyber intelligence implicates the NSA in espionage activities. Finally, hear discussions on the need for a structured legal framework for offensive cyber operations in the U.S.

12 snips
Oct 18, 2025 • 31min
JAGS LABScon 2025 keynote: Steps to an ecology of cyber
Join Juan Andres Guerrero-Saade, a senior threat intelligence researcher renowned for his insights on wartime cyber threats, as he explores the future of cybersecurity. He discusses the shift from chaos to a more sustainable, interconnected approach. Guerrero-Saade highlights the importance of systems thinking and introduces dyadic cybernetics, emphasizing the synergy between human and artificial evaluators. He challenges industry norms, urging practitioners to reclaim their worth and focus on tangible outcomes over mere compliance. It's a thought-provoking call to action in the evolving landscape of security.


