Talos Takes

Talos Takes

Podkast av Cisco Talos

Tidsbegrenset tilbud

1 Måned for 9 kr

Deretter 99 kr / MånedAvslutt når som helst.

Kom i gang
Phone screen with podimo app open surrounded by emojis

Mer enn 1 million lyttere

Du vil elske Podimo, og du er ikke alene

Rated 4.7 in the App Store

Les mer Talos Takes

Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.

Alle episoder

215 Episoder
episode Breaking Down Chaos: Tactics and Origins of a New RaaS Operation artwork
Breaking Down Chaos: Tactics and Origins of a New RaaS Operation

Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s likely connections to former BlackSuit operators. James also shares what defenders should be watching for and how to stay ahead of evolving ransomware tactics. Read the full research blog: https://blog.talosintelligence.com/new-chaos-ransomware [https://blog.talosintelligence.com/new-chaos-ransomware]

01. aug. 2025 - 15 min
episode Why Attackers Love Your Remote Access Tools artwork
Why Attackers Love Your Remote Access Tools

Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these legitimate tools have become such an effective tactic for adversaries. Pierre explains how the flexibility, legitimacy, and built-in capabilities of remote access management tools make them ideal for attackers who want to stay under the radar. They discuss trends Talos Incident Response is seeing in the field, examples of commonly abused tools, and the challenges defenders face when trying to detect misuse. You'll also hear practical advice on what defenders and IT teams can do today to better secure their environments — and what the rise of remote access management tool abuse tells us about attacker behavior and the current state of cybercrime. Resources mentioned: * Talos Incident Response Quarterly Trends Report [https://blog.talosintelligence.com/ir-trends-q1-2025/] * When Legitimate Tools Go Rogue (Talos Blog) [https://blog.talosintelligence.com/when-legitimate-tools-go-rogue/]

17. juli 2025 - 14 min
episode Teaching LLMs to spot malicious PowerShell scripts artwork
Teaching LLMs to spot malicious PowerShell scripts

Hazel welcomes back Ryan Fetterman from the SURGe team to explore his new research on how large language models (LLMs) can assist those who work in security operations centers to identify malicious PowerShell scripts. From teaching LLMs through examples, to using retrieval-augmented generation and fine-tuning specialized models, Ryan walks us through three distinct approaches, with surprising performance gains. For the full research, head to https://www.splunk.com/en_us/blog/security/guiding-llms-with-security-context.html [https://www.splunk.com/en_us/blog/security/guiding-llms-with-security-context.html]

26. juni 2025 - 16 min
episode How cybercriminals are camouflaging threats as fake AI tool installers artwork
How cybercriminals are camouflaging threats as fake AI tool installers

Chetan Raghuprasad joins Hazel to discuss his threat hunting research into fake AI tool installers, which criminals are using to distribute ransomware, RATS, stealers and other destructive malware. He discusses the attack chain of three different campaigns, including one which even tries to justify its ransom as "humanitarian aid." For the full research, read Chetan's blog at https://blog.talosintelligence.com/fake-ai-tool-installers/ [https://blog.talosintelligence.com/fake-ai-tool-installers/]

05. juni 2025 - 17 min
episode Inside the attack chain: A new methodology for tracking compartmentalized threats artwork
Inside the attack chain: A new methodology for tracking compartmentalized threats

Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it comes to attribution and reporting. He then discusses several solutions which seek to evolve traditional threat modelling, and help provide clarity to defenders. More details can be found in this blog https://blog.talosintelligence.com/compartmentalized-threat-modeling/ [https://blog.talosintelligence.com/compartmentalized-threat-modeling/] If you're interested in our other blog on initial access groups, that can be found at https://blog.talosintelligence.com/redefining-initial-access-brokers/ [https://blog.talosintelligence.com/redefining-initial-access-brokers/]

22. mai 2025 - 16 min
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Enkelt å finne frem nye favoritter og lett å navigere seg gjennom innholdet i appen
Liker at det er både Podcaster (godt utvalg) og lydbøker i samme app, pluss at man kan holde Podcaster og lydbøker atskilt i biblioteket.
Bra app. Oversiktlig og ryddig. MYE bra innhold⭐️⭐️⭐️
Phone screen with podimo app open surrounded by emojis

Rated 4.7 in the App Store

Tidsbegrenset tilbud

1 Måned for 9 kr

Deretter 99 kr / MånedAvslutt når som helst.

Eksklusive podkaster

Uten reklame

Gratis podkaster

Lydbøker

20 timer i måneden

Kom i gang

Bare på Podimo

Populære lydbøker