

Three Buddy Problem
Security Conversations
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks.
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporate defenders, CISOs, and policymakers.
Connect with Ryan on Twitter (Open DMs).
Episodes
Mentioned books

Oct 18, 2025 • 31min
JAGS LABScon 2025 keynote: Steps to an ecology of cyber
Join Juan Andres Guerrero-Saade, a senior threat intelligence researcher renowned for his insights on wartime cyber threats, as he explores the future of cybersecurity. He discusses the shift from chaos to a more sustainable, interconnected approach. Guerrero-Saade highlights the importance of systems thinking and introduces dyadic cybernetics, emphasizing the synergy between human and artificial evaluators. He challenges industry norms, urging practitioners to reclaim their worth and focus on tangible outcomes over mere compliance. It's a thought-provoking call to action in the evolving landscape of security.

6 snips
Oct 11, 2025 • 2h 23min
Apple Exploit-Chain Bounties, Wireless Proximity Exploits and Tactical Suitcases
Explore the intriguing realm of automated red-teaming and Apple's ambitious $2 million exploit bounties aimed at thwarting spyware brokers. Discover the rise of wireless proximity attacks and the curious case of tactical suitcases for Wi-Fi exploits. The discussion delves into Paragon spyware's targeting of European executives and the controversial NSO Group buyout rumors. Additionally, critiques of Oracle's patch delays and the ethics surrounding journalists on ransomware leak sites spark thoughtful debate.

14 snips
Oct 7, 2025 • 45min
Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity
Chris Eng, an experienced application security leader and former Chief Research Officer at Veracode, shares captivating insights from his extensive cybersecurity career, including his beginnings at the NSA and the founding of Veracode. He discusses the evolution of security culture, the challenges of software supply chains, and why companies must focus on programmatic support instead of just tools. Eng emphasizes the importance of meaningful security metrics for leaders and the impact of AI on development, while offering guidance on vetting AI solutions from startups.

9 snips
Oct 3, 2025 • 2h 3min
Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout
Drones are stirring up chaos across European airports, revealing deeper concerns about hybrid warfare. Oracle faces a severe ransomware crisis linked to unpatched vulnerabilities, raising questions about its security role amidst the TikTok deal. OpenAI unveils Sora 2, promising to reshape social media and creative expression with AI-generated content. Meanwhile, Palo Alto's Phantom Taurus report highlights a concerning new threat landscape, with discussions around Cisco's recent cybersecurity missteps. The U.S. government shutdown adds another layer of complexity for agencies like CISA.

Sep 27, 2025 • 1h 55min
Cisco firewall zero-days and bootkits in the wild
Three Buddy Problem - Episode 65: We zero in on one of the biggest security stories of the year: the discovery of a persistent multi-stage bootkit implanting malware on Cisco ASA firewalls. Details on a new campaign, tied to the same threat actors behind ArcaneDoor, exploiting zero-days in Cisco’s 5500-X series appliances, devices that sit at the heart of government and enterprise networks worldwide.
Plus, Cisco’s controversial handling of these disclosures, CISA's emergency deadlines for patching, the absence of IOCs and samples, and China’s long-term positioning. Plus, thoughts on the Secret Service SIM farm discovery in New York and evidence of Russians APTs Turla and Gamaredon collaborating to hit Ukraine targets.
Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.Links:Transcript (unedited, AI-generated)Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal SectorsMandiant Brickstorm ScannerCisco advisory: Continued Attacks Against Cisco FirewallsNCSC report on Cisco ASA bootkit in the wildU.S. government scrambles to stop new hacking campaign blamed on ChinaUS Secret Service Statement on SIM Farm DiscoveryNYTimes: Cache of Devices Capable of Crashing Cell Network Is Found Near U.N.Airport chaos: Ransomware hits airport check-in systemsNCSC statement: Incident impacting Collins AerospaceGamaredon X Turla collab

Sep 24, 2025 • 22min
Live at LABScon: Aurora Johnson and Trevor Hilligoss on China's 'internet toilets'
Three Buddy Problem - Episode 64: SpyCloud Labs researchers Aurora Johnson and Trevor Hilligoss discuss the world of “internet toilets," the toxic online communities in China where harassment, stalking, and sextortion thrive. We explore how these groups operate, from doxing ex-lovers and enemies to running coordinated campaigns of cyberbullying that often spill into real-world harm. (Recorded at LABScon 2025).
Cast: Aurora Johnson, Trevor Hilligoss, Ryan Naraine and Juan Andres Guerrero-Saade.Links:Plunging China's internet toilets (LABScon)SpyCloud Labs

11 snips
Sep 24, 2025 • 29min
Live at LABScon: Visi Stark shares memories of creating the APT1 report
Visi Stark, co-founder of the Vertex Project and intelligence expert behind the groundbreaking APT1 report, shares insights from his impactful career in cyber threat intelligence. He discusses the intricate process of selecting data for the report and the philosophy behind its naming. Stark reflects on how APT1 transformed the threat landscape and the challenges of revealing identities. He also critiques the current state of public threat intelligence, exposing the market's influence on reporting standards.

Sep 24, 2025 • 32min
Live at LABScon: Lindsay Freeman on tracking Wagner Group war crimes
Three Buddy Problem - Episode 62: Lindsay Freeman, Director of the Technology, Law & Policy program at the Human Rights Center, UC Berkeley School of Law, joins the show to discuss her team's meticulous work to document the Wagner Group's chain of command, military operations in parts of Africa, and the broadcasting of war crimes on social media platforms like Telegram. (Recorded at LABScon 2025)
Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Lindsay Freeman.Links:LABScon Speaker 2025: Lindsay FreemanWar Crimes for Fun and Profit (Lawfare)Mali: Army, Wagner Group Atrocities Against CiviliansThe Wagner Group’s Atrocities in Africa: Lies and Truth Massacres, Executions, and Falsified Graves: The Wagner Group’s Mounting Humanitarian Cost in Mali

5 snips
Sep 9, 2025 • 2h 46min
Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?
The podcast dives into recent software supply chain breaches, raising alarms about security vulnerabilities at major companies. They explore Apple's new Memory Integrity Enforcement technology and its potential against spyware attacks. The discussion also critiques China's role in global tech security, touching on ethical dilemmas faced by American firms. Lastly, there's an engaging debate on a controversial Huntress disclosure, underscoring the complexities of transparency in cybersecurity.

60 snips
Aug 29, 2025 • 2h 25min
Salt Typhoon IOCs, Google floats ‘cyber disruption unit’, WhatsApp 0-click
The podcast dives into the implications of the Salt Typhoon advisory, analyzing its delayed release and useful insights for defenders. Discussion revolves around Google’s new cyber disruption unit and the ethical dilemmas it presents. The role of AI in enhancing threat detection is examined, along with the troubling vulnerabilities in WhatsApp that threaten user security. Additional topics include a new Chinese APT report, Amazon's disruption of APT29, and the importance of precise terminology in understanding evolving cyber threats.