Player FM - Internet Radio Done Right
28 subscribers
Checked 1d ago
Hozzáadva négy éve
Innehåll tillhandahållet av Cisco Talos. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Cisco Talos eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !
Gå offline med appen Player FM !
Talos Takes
Markera alla som (o)spelade ...
Manage series 2800269
Innehåll tillhandahållet av Cisco Talos. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Cisco Talos eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
207 episoder
Markera alla som (o)spelade ...
Manage series 2800269
Innehåll tillhandahållet av Cisco Talos. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Cisco Talos eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
207 episoder
همه قسمت ها
×T
Talos Takes

1 A blueprint for protecting major events 13:43
13:43
Spela Senare
Spela Senare
Listor
Gilla
Gillad13:43
Have you ever wondered what it takes to put on a major event like a World Cup or the Olympics, and all the cybersecurity and threat intelligence that needs to be done beforehand? Today’s episode is all about that. Hazel is joined by one of our global Cisco Talos Incident Response leaders, Yuri Kramarz, who has helped some of the biggest events around the world take place securely. We chat about risk factors, focus areas such as endpoint protection, threat hunting and incident response, and what to do in the hours and minutes leading up to the event. Check out the document we mention - a full blueprint on how to protect major events: https://blog.talosintelligence.com/protecting-major-events-blueprint-october-2024-update/…
T
Talos Takes

1 Why attackers are using hidden text salting to evade email filters 9:59
9:59
Spela Senare
Spela Senare
Listor
Gilla
Gillad9:59
In this episode Hazel chats with Omid Mirzaei, a security research lead in the email threat research team at Cisco Talos. Omid and several Talos teammates recently released a blog on hidden text salting (or poisoning) within emails and how attackers are increasingly using this technique to evade detection, confuse email scanners, and essentially try and get phishing emails to land in people’s inboxes. Hidden text salting is a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. The idea is to include some characters into the HTML source of an email that are not visually recognizable. For more, head to the Talos blog…
T
Talos Takes

1 How to establish a threat intelligence program (Cisco Live EMEA preview) 16:01
16:01
Spela Senare
Spela Senare
Listor
Gilla
Gillad16:01
It's an European takeover this week, as Hazel sits down with Talos EMEA threat researchers Martin Lee and Thorsten Rosendahl. They're heading to Cisco Live EMEA next week (February 9-14) to deliver a four hour session on how to establish a threat intelligence program. If you can't make it - here's a 15 minute version! Thorsten and Martin provide best practices for threat intelligence, the different flavors of it (tactical, operational, and strategic), and the significance of curiosity and learning from failures. If you haven't already, check out Martin's introductory course to threat intelligence in collaboration with Cisco’s Networking Academy. This course is free for all, and is intended to give an overview of the domain for someone without prior knowledge which can be used as a starting point for further study or employment.…
T
Talos Takes

1 Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024 13:59
13:59
Spela Senare
Spela Senare
Listor
Gilla
Gillad13:59
Joe Marshall and Craig Jackson join Hazel to discuss the biggest takeaways from Cisco Talos Incident Response's latest Quarterly Trends report. This time the spotlight is on web shells and targeted web applications – both have seen large increases. There’s a brand new ransomware actor on the scene – we’ll talk about the new Interlock ransomware and how we’ve seen this group show up this quarter. Plus, Talos IR observed threat actors using remote tooling in 100% of ransomware incidents this quarter – that’s a significant uptick. For the full report head to blog.talosintelligence.com/talos-ir-trends-q4-2024/…
T
Talos Takes

1 Exploring vulnerable Windows drivers 15:24
15:24
Spela Senare
Spela Senare
Listor
Gilla
Gillad15:24
Hazel sits down with Vanja Svajcer from Talos' threat research team. Vanja is a prolific malware hunter and this time he's here to talk about vulnerable Windows drivers. We've been covering these drivers quite a bit on the Talos blog over the last year, and during our research we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerable drivers only to later exploit them is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD). If you're curious about this topic and the recommendations our team has to help you address vulnerable drivers in your environment, then this episode is for you. The full research can be found at https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/…
T
Talos Takes

1 It's the 35th anniversary of ransomware - let's talk about the major shifts and changes 23:28
23:28
Spela Senare
Spela Senare
Listor
Gilla
Gillad23:28
Ransomware is 35 years old this month, which isn't exactly something to celebrate. But in any case, do join Hazel and special guest Martin Lee to discuss what happened in the very first ransomware incident in December 1989 and why IT "wasn't ready". They then discuss how ransomware evolved to become the criminal entity it is today, which involves looking back on the likes of SamSam, Maze and the emergence of crypto currencies. Plus, learn why Martin says we shouldn't feel powerless in the face of ransomware.…
T
Talos Takes

1 Unwrapping the emerging Interlock ransomware attack 15:02
15:02
Spela Senare
Spela Senare
Listor
Gilla
Gillad15:02
Chetan Raghuprasad is our guest today as he breaks down the relatively new Interlock ransomware attack. Cisco Talos Incident Response recently observed this attacker conducting big-game hunting and double extortion attacks. Chetan talks about the initial access tactics, deployment of the ransomware encryptor, and how Interlock communicates with its victims using their “Worldwide Secrets Blog”. For the full analysis, head to https://blog.talosintelligence.com/emerging-interlock-ransomware/…
T
Talos Takes

1 It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights 50:38
50:38
Spela Senare
Spela Senare
Listor
Gilla
Gillad50:38
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better. This is a great conversation facilitated by SURGe's Mick Baccio, with Joe Marshall and Nick Biasini from Talos, and Tamara Chacon and Audra Streetman from SURGe. Catch up on all the latest and greatest threat research from our friends at SURGe at https://www.splunk.com/en_us/surge.html…
T
Talos Takes

1 The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing 15:26
15:26
Spela Senare
Spela Senare
Listor
Gilla
Gillad15:26
The Talos IR Quarterly Trends Q3 2024 is out now! In this episode Hazel Burton, Craig Jackson and Bill Largent discuss three big themes: some new ransomware players, the 'Bring Your Own Vulnerable Driver' trend, and why password spray attacks are making a comeback. Check out the full report at https://blog.talosintelligence.com/incident-response-trends-q3-2024/…
T
Talos Takes

1 How Talos IR and Splunk are teaming up 21:21
21:21
Spela Senare
Spela Senare
Listor
Gilla
Gillad21:21
Hazel Burton steps in as guest host this week to talk to Brad Garnett, the head of Cisco Talos Incident Response, and JK Lialias, the head of cybersecurity product marketing for Splunk. Brad and JK share two exciting in which Talos is being incorporated into Splunk now, and what that means for the ways we can keep users more secure. They also talk about what better visibility into attacker trends means for the end user and defenders.…
T
Talos Takes

1 Why the BlackByte ransomware group may be more active than we initially thought 9:21
9:21
Spela Senare
Spela Senare
Listor
Gilla
Gillad9:21
James Nutland from Talos' Threat Intelligence team joins the show this week to talk to Jon about his report on the BlackByte ransomware group . They cover why this group is actually more active than we initially thought, and check on the general state of ransomware at this point in 2024.
T
Talos Takes

1 AI, critical infrastructure dominate conversation at Hacker Summer Camp 14:07
14:07
Spela Senare
Spela Senare
Listor
Gilla
Gillad14:07
It's quite the gang for Talos Takes this week with Joe Marshall, Nick Biasini and Mick Baccio (from Splunk's SURGe team) joining Jon this week to recap Black Hat and DEF CON. They share all the conversations and talking points they heard around AI, and the renewed importance of a software bill of goods for industrial control system environments.…
T
Talos Takes

1 A 1-on-1 with Talos VP Matt Watchinski 30:04
30:04
Spela Senare
Spela Senare
Listor
Gilla
Gillad30:04
He's been here since the beginning, and now he's ready to reflect on the past 10 years of Cisco Talos. Matt Watchinski, the Vice President of Talos for Cisco, joins Jon this week to talk about Talos' recently celebrated 10th birthday and talk about the company's origins, how we've managed to balance growth and culture, and his favorite memories from the past 10 years.…
T
Talos Takes

1 What should we be doing to better support open-source software? 11:03
11:03
Spela Senare
Spela Senare
Listor
Gilla
Gillad11:03
People who maintain, create and update open-source software are the unsung heroes of the internet. Their work keeps much of our networks running on a daily basis, and the vast majority of them do it for free! While there are some security pitfalls that can come with using OS software, Martin Lee and Jon get together to discuss what (if anything) we can be doing to better support OS software, and how to make our networks more resilient against vulnerabilities that can arise in these tools.…
T
Talos Takes

1 Threat actor trends and the most prevalent malware from the past quarter 15:57
15:57
Spela Senare
Spela Senare
Listor
Gilla
Gillad15:57
Hazel Burton guest hosts this week to recap the top threats observed by Cisco Talos Incident Response (Talos IR) in the second quarter of 2024. She’s then joined by Talos’ Joe Marshall and Craig Jackson to pick out some of the most interesting stories from the report.
Välkommen till Player FM
Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.