Podcast Episodes

Back to Search
Inside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devices
Inside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devices

Three Buddy Problem - Episode 32: In this episode, we rummage through the DeepSeek hype and break down what makes it different from OpenAI’s models, …

1 year, 1 month ago

Short Long
View Episode
Death of the CSRB, zero-days storms at the edge, Juniper router backdoors
Death of the CSRB, zero-days storms at the edge, Juniper router backdoors

Three Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig i…

1 year, 1 month ago

Short Long
View Episode
Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day
Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day

Three Buddy Problem - Episode 30: We discuss French threat-intel Sekoia creating a portal to handle “sovereign disinfections” of the PlugX malware, …

1 year, 1 month ago

Short Long
View Episode
Hijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vuln
Hijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vuln

Three Buddy Problem - Episode 29: Another day, another Ivanti zero-day being exploited in the wild. Plus, China's strange response to Volt Typhoon …

1 year, 2 months ago

Short Long
View Episode
US Treasury hacked via BeyondTrust, MISP and the threat actor naming mess
US Treasury hacked via BeyondTrust, MISP and the threat actor naming mess

Three Buddy Problem - Episode 28: In this episode, we explore the ongoing challenges of threat actor naming in cybersecurity and the confusion cause…

1 year, 2 months ago

Short Long
View Episode
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights

Three Buddy Problem - Episode 27: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network ed ge device backdoor (LITT…

1 year, 2 months ago

Short Long
View Episode
US government's VPN advice, dropping bombs on ransomware gangs
US government's VPN advice, dropping bombs on ransomware gangs

Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explos…

1 year, 2 months ago

Short Long
View Episode
Surveillance economics, Turla and Careto, and the AI screenshots nobody asked for
Surveillance economics, Turla and Careto, and the AI screenshots nobody asked for

Three Buddy Problem - Episode 25: An update on Romania’s cancelled election, the implications of TikTok on democratic processes, and the broader iss…

1 year, 3 months ago

Short Long
View Episode
Inside the Turla Playbook: Hijacking APTs and fourth-party espionage
Inside the Turla Playbook: Hijacking APTs and fourth-party espionage

Three Buddy Problem - Episode 24: In this episode, we did into Lumen/Microsoft’s revelations on Russia's Turla APT stealing from a Pakistani APT, an…

1 year, 3 months ago

Short Long
View Episode
Volexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectability
Volexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectability

Three Buddy Problem - Episode 23: Volexity founder Steven Adair joins the show to explore the significance of memory analysis and the technical chall…

1 year, 3 months ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us