• The AI-powered 10x patch tsunami has arrived. Now what?
    May 15 2026

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 98: We dive back into the fast16 malware discovery with fresh speculation that it's targeting spherical implosion simulations for Iran's nuclear program, and wonder who on earth is qualified to confirm this.

    Plus, thoughts on OpenAI's new three-tier cyber access program, Microsoft's MDASH harness, the 10x Patch Tuesday tsunami, Cloudflare's 1,100 layoffs blamed on AI, and why frontier-lab guardrails may just be elaborate security theater.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:
    0:00 - Introductory banter
    3:19 - fast16 update: spherical implosion simulations?
    9:01 - Manhattan Project precedent — why this matches Iran
    12:28 - Who can actually reproduce the FAST 16 attack?
    19:32 - Google GTIG's "AI-written" zero-day
    22:13 - The rise of AI-backend "silent detections"
    25:54 - Guardrails as security theater
    38:47 - Are the 10x patch numbers real defense?
    43:48 - OpenAI's Trusted Access tiers + Microsoft MDASH
    53:35 - End of the ‘patch-and-pray’ model
    57:50 - Sean Heelan: strict harnesses can make models worse
    1:03:51 - Pwn2Own Berlin overflow and bug-density debate
    1:12:24 - Cloudflare's 1,100 layoffs and AI as scapegoat
    1:27:42 - RCS encryption, Android Intrusion Logging, Seedworm & Kazuar

    Show More Show Less
    1 hr and 51 mins
  • The disappointing death of big-game APT reporting
    May 10 2026

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 97: We discuss the disappearing art of Windows APT paleontology, the absence of complex malware documentation, and why so much threat-intel research has slipped behind paywalls and into private rooms.

    Plus, a surge in AI-discovered bugs in Firefox and Chrome, a rough week for Linux security flaw disclosures, and the usual Ivanti and Palo Alto zero-day bulletins that ship without a single IOC.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:
    0:00 - Introductory banter
    1:17 - Inside TLP-Red: writing hashes by hand
    3:57- fast16 fallout and the threat intel trust collapse
    9:17 - The death of cyber paleontology on Windows
    14:49 - Mobile is the new paleontology frontier
    15:48 - When threat intel went private: the CrowdStrike effect
    23:29 - Falling sideways into intelligence brokerage
    36:05 -- AI, Easter eggs, and the loss of malware artistry
    47:22 -- Will the Frontier Labs publish threat intel?
    51:43 -- fast16 follow-up reports coming
    1:09:38 - Mythos, Aardvark, and the patch tsunami
    1:15:33 - CopyFail and the Linux reboot crisis
    1:51:05 - UAPs, Pulitzers, last-ever LabsCon, and shoutouts

    Show More Show Less
    2 hrs and 3 mins
  • Cracking the Fast16 sabotage malware mystery
    May 1 2026

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 96: We're joined by WIRED writer Andy Greenberg to dig into SentinelLabs' bombshell FAST16 research, a newly deciphered piece of sabotage malware that predates Stuxnet by five years and quietly tampered with physics modeling software likely tied to Iran's nuclear program.

    We discuss the attribution rabbit hole (NSA? Israel? someone else?), the eerie "spiritual warfare" implications of corrupting scientific calculations, and Antiy Labs' very dialectical Chinese rebuttal. Plus, what AI reverse-engineering means for the next decade of cyber paleontology.

    Cast: Andy Greenberg, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:

    0:00 - WIRED’s Andy Greenberg joins the show
    1:53 - How the FAST16 scoop landed in Andy's lap
    6:45 - JAGS sat on this sample for 7 years
    10:33 - How Costin and the Kaspersky team missed the sabotage routine
    15:20 - The "holy moly" moment: what FAST16 actually does
    18:26 - Territorial Dispute, Shadow Brokers, and the driver list
    24:11 - The targets: MOHID, PKPM, and LS-DYNA's link to Iran
    28:13 - No C&C, no victims: a worm built for air-gapped networks
    34:45 - Was this part of a larger anti-Iran toolkit?
    37:55 - Attribution: NSA, Israel, or someone else entirely?
    51:39 - What was the actual sabotage? Unanswered questions
    55:48 - "Spiritual warfare": the psychological angle and trust in computers
    1:20:05 - Equities, going public, and the case for AI-powered reversing
    1:32:19 - Antiy Labs' Chinese rebuttal and the apparatchik tone
    1:43:04 - Shoutouts: Sergey Mineev, LabsCon CFP, PivotCon, and Ekoparty

    Show More Show Less
    1 hr and 48 mins
  • Mark Dowd on AI hacking, exploit chains, zero-day sales
    Apr 24 2026

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 95: Vigilant Labs director Mark Dowd joins the show to shed light on the state of offensive research, the economics of the exploit market, and why "Mark Dowd in a box" isn't quite the threat the AI hype machine suggests. He talks through the daily stresses of running an offensive shop, how AI is reshaping vulnerability discovery, exploit development, and the pricing of full exploit chains.

    Plus, thoughts on Lockdown Mode and Apple's MIE, whether mitigations actually work or just push attackers toward less access, the rise of HarmonyOS and the Balkanization of device security, persistence, baseband attacks, GrapheneOS, and Samsung Knox.

    We discuss customer vetting and OpSec fears, policymakers who've never written an exploit, and the strange afterlife of The Art of Software Security Assessment, the 20-year-old book now possibly training data for the very tools coming for his job.

    Cast: Mark Dowd, Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:
    0:00 Introductions
    4:28 The origin story of Azimuth: why go offensive?
    6:26 Stresses of running an offensive research business
    12:10 "Mark Dowd in a box" — is AI an existential threat to vuln research?
    16:13 Using AI in workflow: frontier models vs. local models
    22:05 AI in bug-finding vs. exploit implementation
    30:30 Watching AI tear through a firmware backdoor
    38:23 Artificial guardrails and the "POC" wall
    43:25 Will AI commoditize 0days? The high-end vs. low-end vendor split
    57:30 How AI disrupts exploit chain pricing
    1:05:18 Does persistence still matter? Should you reboot your phone?
    1:09:33 Lockdown Mode, MIE, and Apple's "never been compromised" claim
    1:14:25 Do mitigations really work, or are we stuck in an endless loop?
    1:23:25 Android vs. iOS vs. Huawei's HarmonyOS Next
    1:34:44 Exploit leaks, customer vetting, and OpSec fears
    1:41:37 GrapheneOS, Samsung Knox and baseband attacks
    1:53:56 Did the exploit market save us from encryption backdoors?
    1:55:11 What does the threat-intel community get wrong about vuln research?

    Show More Show Less
    2 hrs and 2 mins
  • The Angry Spark APT Mystery: A Year-Long Backdoor, One Victim, Zero Attribution
    Apr 18 2026

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 94: We discuss a mysterious, VM-obfuscated backdoor that lived undetected on a single U.K. machine for a year before disappearing, finding clues pointing to an elite-level APT intrusion that still evades broader industry coverage.

    Plus, connecting the dots across AI-driven vulnerability discovery, Microsoft’s massive Patch Tuesday, Jensen Huang talks cybersecurity, Mythos dangers and Chinese chips, and the quiet erosion of CVE enrichment at NIST.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    Timestamps:
    0:00 – Intros + AI news whiplash
    5:10 – Patch Tuesday breakdown: Microsoft's second-largest CVE release ever
    7:32 – AI accelerating vulnerability discovery at record pace
    10:00 – Frontier lab cyber models, fine-tuning, guardrail removal & KYC
    12:37 – FreeBSD NFS bug: Opus 4.6 was already finding critical vulns
    14:26 – Anthropic's infrastructure strain: Is Opus being nerfed?
    21:05 – OpenAI's Trusted Access for Cyber vs. Anthropic's Mythos cabal
    28:45 – SharePoint zero-day CVE-2026-32201: The endless Microsoft tax
    34:36 – Adobe Acrobat zero-day: A rare, real, Russia-linked exploit in the wild
    41:36 – VirusTotal mining: The golden age of threat intel hunting
    50:03 – ZionSiphon: Vibe-coded OT malware targeting Israeli water infrastructure
    55:04 – Paleontology of threat research: When do you publish? Who do you trust?
    1:13:53 – Angry Spark: A one-machine, one-year backdoor raises eyebrows
    1:49:25 – Jensen Huang vs. Dwarkesh Patel on Mythos, China and chips
    2:14:32 – Chinese AI distillation: 24,000 fake Anthropic accounts, DeepSeek & the catch-up question

    Show More Show Less
    2 hrs and 35 mins
  • The Claude Mythos, Project Glasswing Shockwave
    Apr 10 2026

    (Presented by TLPBLACK: A cybersecurity intelligence platform focused on sharing curated, high-sensitivity threat insights and research with trusted security professionals.)

    Three Buddy Problem - Episode 93: We discuss Anthropic's release of Claude Mythos Preview (an AI model so capable and dangerous they won't release it publicly) and debate the looming patching crisis, bug bounty extinction, possible US government nationalization of frontier labs, and why the NSA might not be thrilled about all this bug-fixing.

    Plus, North Korea's six-month Drift Protocol con job, APT28's retro DNS hijacking campaign, and Microsoft's driver signing mess hitting WireGuard and VeraCrypt.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    00:00 — Opening banter
    01:36 — Anthropic Mythos Preview + Project Glasswing
    06:17 — USG reaction + Wall Street emergency meeting
    10:54 — Mythos capabilities vs hype (technical reality check)
    13:44 — PR stunt? Skepticism of Anthropic narrative
    20:42 — The patching crisis + “defender advantage”
    27:41 — Bug bounty model under threat from AI
    33:37 — Mythos practical workflows
    45:09 — Geopolitics, NSA angle, and nationalization discussion
    01:40:18 — Fortinet zero-day + ongoing failures
    01:42:39 — Drift Protocol heist ($285M) + long-term social engineering
    01:44:07 — Revisiting XZ Utils / Jia Tan attribution
    01:54:07 — Crypto security gaps + need for real CTI in blockchain
    02:04:22 — APT28 DNS hijacking + router compromise campaign
    02:18:57 — Microsoft driver signing meltdown + ecosystem impact

    Show More Show Less
    2 hrs and 35 mins
  • LLMs writing exploits, engineers losing skills, and a case for the generative OS
    Apr 3 2026

    (Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

    Three Buddy Problem - Episode 92: Costin walks through real-world ransomware incident response while Juanito makes the case for AI-generated operating systems that never run anyone else's code. Plus, debates on whether vulnerability research is cooked, why nobody should pay ransoms, and what the security industry looks like after the massive AI flood.

    Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.

    0:00 – Introductory banter
    2:00 – Costin's ransomware incident response work
    3:30 – How attackers break in: Fortinet vulnerabilities everywhere
    6:30 – Hunting for ransomware decryption keys
    9:00 – Breaking into ransomware C2s and monitoring leak sites
    12:00 – The ransom payment debate: should you ever pay?
    16:00 – Why "don't pay the ransom" is overgeneralized
    21:00 – How ransomware gangs price their demands
    24:00 – The AI-pilling of the security industry
    28:30 – Nicholas Carlini, Ptacek, and "vulnerability research is cooked"
    35:00 – Towards a generative-first operating system
    41:00 – Code factories, trusted computing, and killing dependencies
    48:00 – Microsoft and Apple's AI positioning
    56:00 – Chris St. Myers' "Cognitive Rust Belt" essay
    1:18:00 – Choice, The Matrix, and the illusion of control
    1:38:00 – Supply chain attacks, North Korea, and dependency sprawl

    Show More Show Less
    2 hrs and 20 mins
  • Jeremy Banon: Personal Exec Compromise as Corporate Incident
    Apr 1 2026

    (Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.)

    Security Conversations: Jeremy Bannon, founder/CEO of The Cyber Health Company, joins Ryan Naraine to discuss why executive personal cybersecurity is a growing blind spot for organizations, and real-world incidents where personal compromises became corporate crises.

    Plus, why CISOs struggle to secure the C-suite's personal lives, and how a healthcare-inspired model (complete with risk scores, care plans, and concierge support) can help companies close the gap.

    0:00 — Introduction to The Cyber Health Company
    1:00 — Why personal security is a blind spot for organizations
    2:00 — Real examples: Disney hack, Instagram compromise, productivity loss
    6:50 — Executives circumventing IT policy and Shadow-AI
    8:43 — Digital immunity: resilience and incident response readiness
    10:25 — The healthcare model for cybersecurity communication
    12:14 — How the Cyber Health Score and risk coefficient work
    15:34 — OSINT intake: why your social security number isn't private
    17:26 — The state of executive security hygiene and the concierge model
    35:00 — AI, deepfakes, and the scaling of commodity attacks

    Show More Show Less
    36 mins