

Three Buddy Problem
Security Conversations
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks.
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Episodes
Mentioned books

7 snips
Jan 30, 2026 • 2h 53min
A destructive cyberattack in Poland raises NATO 'red-line' questions
A detailed report on a rare destructive wiper attack against Polish infrastructure and why it may cross NATO red lines. Conversations about precise attribution, vendor responsibility, and how compromised VPN and Fortinet appliances enabled persistence. Coverage of urgent patches, new exploited zero-days, and the resurfacing of the mysterious KasperSekrets account.

Jan 23, 2026 • 2h 9min
Cheap, AI-generated zero-days and the real meaning of ‘advanced’ malware
They unpack claims that a malware framework may have been built by AI and what artifacts reveal about its creation. They debate whether AI lets low-cost actors produce advanced exploits and why verification and benchmarks matter. They cover a surge of noisy AI bug reports, new CISA YARA rules, a wiper used against Poland's grid, and risks around cloud keys and edge device compromises.

20 snips
Jan 16, 2026 • 2h 25min
Google Pixel 'zero-click' exploit caused by AI, mysterious Poland grid attacks, China bans US cybersecurity software
The hosts dive into intriguing discussions on the precision of U.S. cyber operations in Venezuela and the implications of private sector involvement in offensive cyber tactics. They uncover a mysterious, failed cyber attack on Poland's power grid, exploring its technical nuances and the need for better forensic understanding. The episode also highlights China's ban on U.S. cybersecurity software and the unsettling zero-click vulnerabilities linked to AI features in Google's Pixel. An engaging look at emerging threats and geopolitical cyber dynamics unfolds!

17 snips
Jan 9, 2026 • 2h 14min
Hamid Kashfi on the situation in Iran; Did cyber cause Venezuela blackouts?
Hamid Kashfi, a security researcher focused on Iran's cyber operations, dives into the current tensions in Iran, discussing the economic factors behind the protests and the impact of government surveillance. He unpacks how censorship and information control play a role in shaping public sentiment. Additionally, the conversation shifts to Venezuela, where they explore whether cyber operations contributed to widespread blackouts amid ongoing political turmoil. Kashfi also touches on the implications of leaked data and strategies for undermining regime surveillance.

4 snips
Jan 2, 2026 • 3h 1min
A special mailbag episode with book recommendations
The hosts dive into the controversial landscape of AI, debating its misuse and the need for guiding principles. They tackle the alarming MongoBleed vulnerabilities and their impact on security. Insights into ransomware response and the ethics surrounding synthetic content spark lively discussions. In a special mailbag segment, they share book recommendations, revealing their favorite reads and the merits of audiobooks versus physical books. Tune in for a blend of tech insights and literary suggestions!

21 snips
Dec 26, 2025 • 3h 19min
Quiet Wins, Loud Failures: A Year-End Cybersecurity Reckoning
This podcast dives into the bizarre fallout from a CISA polygraph scandal and highlights key cybersecurity stories of the year. It explores vital yet underfunded ransomware pre-notification efforts and discusses the implications of the FCC's foreign drone ban. AI advancements are debated, focusing on coding reliability and security research. The hosts also analyze the troubling intersection of commercial spyware and geopolitics, along with a deep dive into North Korean crypto operations and innovative edge honeypots used in Chinese cyber campaigns.

12 snips
Dec 20, 2025 • 2h 2min
What's behind US gov push to 'privatize' offensive cyber operations?
The discussion delves into the U.S. government's new strategy to enlist private firms for offensive cyber operations. They explore the implications of legal complexities surrounding letters of marque for cartels. Insight is provided on the emergence of vulnerabilities, including Apple and Cisco zero-days. Uncoveries of Belarusian spyware targeting journalists are alarming. Amazon's detection of a North Korean infiltrator through unique keystroke lag adds a twist, showcasing the intersection of advanced technology with security challenges.

5 snips
Dec 11, 2025 • 2h 12min
Legal corruption, React2Shell exploitation, dual-use AI risks
A Romanian documentary ignites nationwide protests, exposing the insidious nature of legal corruption and the public's demand for accountability. The conversation shifts to the growing threat of React2Shell exploitation, detailing technical challenges and the difficulties of patching vulnerable components. The hosts critique Microsoft's transparency issues and highlight the evolving landscape where advanced persistent threats meet criminal exploits. They also explore the dual-use risks of AI, questioning its rapid advancements in penetration testing capabilities.

31 snips
Dec 6, 2025 • 1h 42min
APTs pounce on React2Shell; BRICKSTORM backdoors; .gov surveillance
Hosts dive into alarming cybersecurity topics, starting with a critical React vulnerability wreaking havoc online as Chinese APTs pounce. They explore the chaos of patching, the hidden complexities, and the risk of missed server logs. The discussion shifts to the BrickStorm backdoor and the implications of a secret U.S. task force combating cybercrime. Additionally, the impact of AI on smart-contract vulnerabilities surfaces, linking technology advancements to ongoing cyber thefts. There's also commentary on Chrome's data collection controversies and the evolving U.S. national security strategy.

25 snips
Nov 29, 2025 • 1h 57min
Shai-Hulud 2.0, Russia GRU Intrusions, and Microsoft’s Regulatory Capture
The hosts dive into Microsoft's shifting stance on intel sharing and what it means for the security landscape. They dissect the Shai-Hulud 2.0 npm supply-chain attack and its implications for trust in package ecosystems. CISA's guidance on mobile spyware elicits strong opinions, while NSO's legal troubles reveal the complexities of cyber capabilities. Arctic Wolf's report on GRU-linked intrusions shines a light on geopolitical cyber threats, and the FCC's rollback of telecom cybersecurity rules sparks vital debates on regulation and accountability.


