Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 America’s Sweethearts: Dallas Cowboys Cheerleaders Season 2 - Tryouts, Tears, & Texas 32:48
Mysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacks
Manage episode 449276171 series 2416144
Three Buddy Problem - Episode 20: We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.
Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).
Links:
- Transcript (unedited, AI-generated)
- iPhones mysteriously rebooting themselves
- Apple quietly ships iPhone reboot code
- FBI on China hacking US presidential campaigns iPhones
- Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns
- Palo Alto: EDR Bypass Testing Reveals Threat Actor's Toolkit
- Palo Alto CVE-2024-5910 marked as exploited
- Toronto crypto company CEO kidnapped
- A list of known 'meatspace' crypto attacks
- North Korea crypto thieves targets macOS
172 episodes
Manage episode 449276171 series 2416144
Three Buddy Problem - Episode 20: We revisit the ‘hack-back’ debate, the threshold for spying on adversaries, Palo Alto watching EDR bypass research to track threat actors, hot nuggets in Project Zero’s Clem Lecinge’s Hexacon talk, Apple’s new iOS update rebooting iPhones in law enforcement custody, the mysterious GoblinRAT backdoor, and physical ‘meatspace’ Bitcoin attacks and more details on North Korean cryptocurrency theft.
Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek).
Links:
- Transcript (unedited, AI-generated)
- iPhones mysteriously rebooting themselves
- Apple quietly ships iPhone reboot code
- FBI on China hacking US presidential campaigns iPhones
- Chinese hackers Targeted Phones of Trump, Vance, Harris Campaigns
- Palo Alto: EDR Bypass Testing Reveals Threat Actor's Toolkit
- Palo Alto CVE-2024-5910 marked as exploited
- Toronto crypto company CEO kidnapped
- A list of known 'meatspace' crypto attacks
- North Korea crypto thieves targets macOS
172 episodes
All episodes
×
1 Train brake hack, GRU sanctions, Wagner war crimes, Microsoft's Chinese ‘digital escorts’ 1:48:45

1 How did China get Microsoft's zero-day exploits? 1:49:05

1 Who’s hacking who? Ivanti 0-days in France, China outs 'Night Eagle' APT 1:34:16

1 Israel-Iran cyberwar: Predatory Sparrow, vanishing crypto, destructive bank hacks 3:07:13

1 Cyber flashpoints in Israel-Iran war, the 'magnet of threats', Mossad drone swarms 1:51:48

1 Mikko Hypponen talks drone warfare, APT naming schemes 1:29:04

1 The dark hole of 'friendlies' and Western APTs 2:11:19

1 Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate 2:30:37

1 A Coinbase breach with bribes, rogue contractors and a $20M ransom demand 2:23:34

1 JAGS keynote: The intricacies of wartime cyber threat intelligence 31:07

1 Signalgate redux, OpenAI's Aardvark, normalizing cyber offense 2:38:40

1 Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security 1:33:42

1 China doxxes NSA, CVE's funding crisis, Apple's zero-day troubles 1:39:19

1 NSA director fired, Ivanti's 0day screw-up, backdoor in robot dogs 1:36:57

1 Signalgate and ID management hiccups, PuzzleMaker and Chrome 0days, Lab Dookhtegan returns 1:52:34

1 China exposing Taiwan hacks, Paragon spyware and WhatsApp exploits, CISA budget cuts 1:56:22

1 A half-dozen Microsoft zero-days, Juniper router backdoors, advanced bootkit hunting 2:05:43

1 Revisiting the Lamberts, i-Soon indictments, VMware zero-days 1:39:32

1 Lazarus ByBit $1.4B heist was supply chain attack on developer 1:53:22

1 North Korea's biggest ever crypto heist: $1.4B stolen from Bybit 2:07:07

1 An 'extremely sophisticated' iPhone hack; Google flags major AMD microcode bug 1:25:12

1 Unpacking the UK government's secret iCloud backdoor demand 2:22:42

1 Inside the DeepSeek AI existential crisis, Chinese 'backdoor' in medical devices 2:19:44

1 Death of the CSRB, zero-days storms at the edge, Juniper router backdoors 1:48:59

1 Inside the PlugX malware removal operation, CISA takes victory lap and another Fortinet 0day 1:59:52

1 Hijacking .gov backdoors, Ivanti 0days and a Samsung 0-click vuln 1:48:21

1 US Treasury hacked via BeyondTrust, MISP and the threat actor naming mess 1:49:16

1 Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights 1:53:11

1 US government's VPN advice, dropping bombs on ransomware gangs 1:58:40

1 Surveillance economics, Turla and Careto, and the AI screenshots nobody asked for 2:14:07

1 Inside the Turla Playbook: Hijacking APTs and fourth-party espionage 1:47:08

1 Volexity’s Steven Adair on Russian Wi-Fi hacks, memory forensics, appliance 0days and network inspectability 1:18:33

1 Sid Trivedi on the RSA Innovation Sandbox $5 million investment gambit 1:01:12

1 Russian APT weaponized nearby Wi-Fi networks in DC, new macOS zero-days, DOJ v Chrome 1:28:22

1 What happens to CISA now? Is deterrence in cyber possible? 1:53:51

1 Mysterious rebooting iPhones, EDR vendors spying on hackers, Bitcoin 'meatspace' attacks 1:37:00

1 The Sophos kernel implant, 'hack-back' implications, CIA malware in Venezuela 1:54:14

1 Fortinet 0days, Appin hack-for-hire exposé, crypto heists, Russians booted from Linux kernel 1:26:44

1 ESET Israel wiper malware, China's Volt Typhoon response, Kaspersky sanctions and isolation 1:38:18

1 Typhoons and Blizzards: Cyberespionage and national security on front burner 1:09:09

1 Careto returns, IDA Pro pricing controversy, crypto's North Korea problem 1:30:38

1 Exploding beepers, critical CUPS flaws, Windows Recall rebuilt for security 1:19:07

1 Ep13: The Consolation of Threat Intel (JAG-S LABScon keynote) 31:41

1 Ep12: Security use-cases for AI chain-of-thought reasoning 1:14:20

1 Ep11: Cyberwarfare takes an ominous turn 1:15:13
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.