Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Enjoying the content? Let us know your feedback! In this week's episode, we are looking at the latest Cisco Talos’ 2024 report. In this comprehensive report, we will delve into the major cybersecurity trends and threats observed over the past year. Cisco Talos team, has compiled this report to provide valuable insights and guidance for organization…
…
continue reading

1
Inside the attack chain: A new methodology for tracking compartmentalized threats
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it…
…
continue reading

1
Follow the motive: Rethinking defense against Initial Access Groups
16:38
16:38
Play later
Play later
Lists
Like
Liked
16:38In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distinguishing between different types of IABs. We talk about the need for a new taxonomy to categorize IABs into three types: financially motivated (FIA), state-sponsored (SIA), and opportunistic (OIA) initia…
…
continue reading
Enjoying the content? Let us know your feedback! This is the part 2 of RSAC 2025 episode. If you have not listened to episode 1 (that episode 222), I would suggest you listen to episode 1 before you listen this episode. Before you we get into part 2, lets review what has been happening last week on the news front. - UK shares security tips after ma…
…
continue reading
Enjoying the content? Let us know your feedback! It was RSAC week and it would be remiss of me if I did not give you a highlight on what went on this year, 2025. After all, RSAC has a critical role in security. We will be reviewing the top key announcements from this year's event, including some exciting news from the major security players in the …
…
continue reading

1
Year in Review special pt. 4: How AI is influencing the threat landscape?
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19A jam packed episode of guests means a slightly longer Talos Takes for your feed today! We welcome Amy Chang and Omar Santos from Cisco, Vitor Ventura from Talos, and Ryan Fetterman from Splunk. Together, we discuss how AI isn't rewriting the cybercrime playbook, but it is turbo charging some of the old tricks, particularly on the social engineerin…
…
continue reading

1
221 - FBI’s 2024 Annual Internet Crime Report
32:16
32:16
Play later
Play later
Lists
Like
Liked
32:16Enjoying the content? Let us know your feedback! This week's episode looks at the FBI’s 2024 Annual Internet Crime Report -an analysis that not only highlights the scale of cybercrime but also reveals the evolving tactics of cybercriminals and the staggering financial impact on individuals and businesses alike. This of course relates to US but it i…
…
continue reading

1
Year in Review special part 3: Identity and MFA attacks
22:58
22:58
Play later
Play later
Lists
Like
Liked
22:58Steven Leung from Cisco Duo joins Hazel to discuss the prevalence of identity-based attacks, why they're happening, and the various methods attackers are using to circumvent MFA (Multi-Factor Authentication), based on data in Talos' 2024 Year in Review. Topics we touch on include phishing, push spray attacks, and Adversary-in-the Middle campaigns, …
…
continue reading

1
220 - Watering Hole Attacks-The Hidden Danger of Trusted Spaces
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Enjoying the content? Let us know your feedback! Imagine visiting your favorite website-one you trust, one you’ve browsed a hundred times before-only to discover it’s become a silent gateway for cybercriminals. What if the real danger wasn’t in suspicious emails or obvious scams, but lurking in the very places you feel safest online? In today’s epi…
…
continue reading

1
Year in Review special part 2: The biggest ransomware trends
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41Azim Khodjibaev and Lexi DiScola join Hazel to discuss some of the most prolific ransomware groups (and why LockBit may end this year very differently to how they ended 2024). They also discuss the dominant techniques of ransomware actors, where low-profile tactics led to high-impact consequences. For the full analysis, download Talos' 2024 Year in…
…
continue reading
Enjoying the content? Let us know your feedback! In this week's episode we are touching an intriguing topic. We're going to explore Agentic AI, a fascinating area within artificial intelligence that focuses on autonomous systems capable of making decisions and performing tasks without human intervention. We'll break it down for those new to cyberse…
…
continue reading

1
Year in Review special part 1: vulnerabilities, email threats, and adversary tooling
18:15
18:15
Play later
Play later
Lists
Like
Liked
18:15Talos researchers Martin Lee and Thorsten Rosendahl join Hazel for the first of our dedicated episodes on the top findings from Talos' 2024 Year in Review. We discuss the vulnerabilities that attackers most targeted, how this compares with CISA's list, and how to protect network devices. Given how email lures are evolving, we spend some time chatti…
…
continue reading

1
218 - Fast Flux-The Cybercriminal's Hide and Seek
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49Enjoying the content? Let us know your feedback! This week, we re going to explore what Fast Flux is, a sophisticated technique used by cybercriminals to evade detection and maintain their malicious activities. We'll break it down for those new to cybersecurity, delve into some technical details, and use analogies to make it all clear. So without f…
…
continue reading
Joe, Hazel, Bill and Dave break down Talos' Year in Review 2024 and discuss how and why cybercriminals have been leaning so heavily on attacks that are routed in stealth in simplicity. The team also provide insights into some of the topics of the report, including the top-targeted vulnerabilities of the year, network-based attacks, adversary toolse…
…
continue reading

1
217 - Phishing the Expert-The Unexpected Cybersecurity Breach - Part 2
28:32
28:32
Play later
Play later
Lists
Like
Liked
28:32Enjoying the content? Let us know your feedback! This week's episode is continuation of Troy Hunt's cautionary tale , the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We'll continue to break down what happened, how it happened, and what we can al…
…
continue reading

1
216 - Phishing The Expert-The Unexpected Cybersecurity Breach - Part 1
32:15
32:15
Play later
Play later
Lists
Like
Liked
32:15Enjoying the content? Let us know your feedback! In this week's episode we have a fascinating and cautionary tale about none other than Troy Hunt, the creator of HaveIBeenPwned. Despite being a renowned security expert, Troy recently fell victim to a sophisticated phishing attack through Mailchimp. We'll break down what happened, how it happened, a…
…
continue reading

1
215 - Cyber Threat Emulation - Strategies for Staying Ahead Of Cyber Attacks
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04Enjoying the content? Let us know your feedback! In this episode, we’ll look into a cybersecurity assessment method that mimics real-world attacks to test an organization's security defenses and response capabilities: Threat emulation. It is one of the strategies to keep you ahead of the game. Threat emulation aims to identify and mitigate security…
…
continue reading

1
214 - What are polyglot files and how bad are they?
31:58
31:58
Play later
Play later
Lists
Like
Liked
31:58Enjoying the content? Let us know your feedback! In this episode, we’ll be exploring a particularly intriguing file types: polyglot files. These digital shapeshifters have become a powerful tool in the arsenal of cyber attackers, capable of bypassing security measures, confusing systems, and delivering malicious payloads in ways that are both creat…
…
continue reading

1
213 - Stealing Data in Plain Sight -How Cybercriminals Exfiltrate Your Secrets and How to Stop Them
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53Enjoying the content? Let us know your feedback! In today's episode, we're diving deep into Data Exfiltration; one of the most serious threats facing organizations today. We'll break down exactly what data exfiltration is, where it fits in the MITRE ATT&CK framework, the tools and techniques attackers use, and, most importantly, how organizations c…
…
continue reading

1
The truth about Tasmanian devils, and getting into cybersecurity
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09Bill springs a surprise topic on the team in this episode - how did you get into cybersecurity, and what skills have you brought with you throughout your career? What ensues is a rather lovely, vulnerable conversation that we hope will be helpful for anyone currently thinking about their next career move. Before that Dave has some surprising facts …
…
continue reading
Have you ever wondered what it takes to put on a major event like a World Cup or the Olympics, and all the cybersecurity and threat intelligence that needs to be done beforehand? Today’s episode is all about that. Hazel is joined by one of our global Cisco Talos Incident Response leaders, Yuri Kramarz, who has helped some of the biggest events arou…
…
continue reading

1
212 - Behind the login Screen - Understanding OS Authentication - Part 2
49:05
49:05
Play later
Play later
Lists
Like
Liked
49:05Enjoying the content? Let us know your feedback! We are continuing with part 2 of "Behind the Login Screen - Understanding OS Authentication." If you missed our first episode, I highly recommend giving it a listen before diving into today's content. In part one, we started to explore the fascinating world of operating system authentications, focusi…
…
continue reading

1
211 - Behind the login Screen: Understanding OS Authentication - Part 2
35:22
35:22
Play later
Play later
Lists
Like
Liked
35:22Enjoying the content? Let us know your feedback! In today's episode, we're going to explore the fascinating topic of operating systems authentications. We all use it but how many of us wondered how the behind the curtains machinery work. We'll be focusing on Windows, Linux/Unix, and Mac OS. We'll discuss how hashes are used in authentication, the c…
…
continue reading

1
Why attackers are using hidden text salting to evade email filters
9:59
9:59
Play later
Play later
Lists
Like
Liked
9:59In this episode Hazel chats with Omid Mirzaei, a security research lead in the email threat research team at Cisco Talos. Omid and several Talos teammates recently released a blog on hidden text salting (or poisoning) within emails and how attackers are increasingly using this technique to evade detection, confuse email scanners, and essentially tr…
…
continue reading

1
210 - Adversarial Misuse of Generative AI
50:21
50:21
Play later
Play later
Lists
Like
Liked
50:21Enjoying the content? Let us know your feedback! As AI-generated content becomes more advanced, the risk of adversarial misuse—where bad actors manipulate AI for malicious purposes—has skyrocketed. But what does this mean in practical terms? What risks do we face, and how one of the big players is addressing them? Stick around as we break Google’s …
…
continue reading

1
How to establish a threat intelligence program (Cisco Live EMEA preview)
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01It's an European takeover this week, as Hazel sits down with Talos EMEA threat researchers Martin Lee and Thorsten Rosendahl. They're heading to Cisco Live EMEA next week (February 9-14) to deliver a four hour session on how to establish a threat intelligence program. If you can't make it - here's a 15 minute version! Thorsten and Martin provide be…
…
continue reading
Enjoying the content? Let us know your feedback! Today, we’ve got something really exciting for you. If you’ve been following the world of artificial intelligence lately, you’ve probably heard a lot about a new player in town: DeepSeek. Now, let me tell you, DeepSeek is shaking things up. They’re doing something completely different that’s not only…
…
continue reading

1
Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024
13:59
13:59
Play later
Play later
Lists
Like
Liked
13:59Joe Marshall and Craig Jackson join Hazel to discuss the biggest takeaways from Cisco Talos Incident Response's latest Quarterly Trends report. This time the spotlight is on web shells and targeted web applications – both have seen large increases. There’s a brand new ransomware actor on the scene – we’ll talk about the new Interlock ransomware and…
…
continue reading

1
208 - Lets Encrypt on shortening certification lifetime to just 6 days!
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Enjoying the content? Let us know your feedback! In this episode we will detail the significant announcement from Let’s Encrypt – the trusted nonprofit Certificate Authority that has been at the forefront of making the web more secure. Let’s Encrypt has revealed its plans to drastically reduce the lifetime of its TLS certificates from 90 days to ju…
…
continue reading

1
207 - Microsoft Windows Actively Exploited Vulnerabilities
37:47
37:47
Play later
Play later
Lists
Like
Liked
37:47Enjoying the content? Let us know your feedback! This episode is one for you system admins out there! Today we’re discussing three actively exploited vulnerabilities you absolutely need to know about—CVE-2025-21333, CVE-2025-21334, and CVE-2025-21335. These vulnerabilities have been making headlines, and understanding them could mean the difference…
…
continue reading

1
Social Media Bans, Live Experiments, Cybersecurity Crosswords, and Nine Lives: The B team returns
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08More hijinks and silliness ensue in the second episode of the BWT B Team podcast. Joe shares his frustration with being involuntarily removed from a social media platform, Hazel conducts a live experiment, Dave talks about his newfound addiction to crossword puzzles and its parallels to cybersecurity, and Bill recommends the game "Nine Lives" and s…
…
continue reading
Hazel sits down with Vanja Svajcer from Talos' threat research team. Vanja is a prolific malware hunter and this time he's here to talk about vulnerable Windows drivers. We've been covering these drivers quite a bit on the Talos blog over the last year, and during our research we investigated classes of vulnerabilities typically exploited by threat…
…
continue reading

1
206 - Cybersecurity Resolutions for 2025 - Best Practices for Individuals and Organizations
32:56
32:56
Play later
Play later
Lists
Like
Liked
32:56Enjoying the content? Let us know your feedback! This is the podcast where we explore the ever-evolving world of cybersecurity and provide practical advice for staying ahead of threats. I’m your host, Yusuf, and today’s episode is all about starting the new year with a solid plan. We’re diving into _Cybersecurity Resolutions for 2025: Best Practice…
…
continue reading

1
205 - Vulnerability Scanners-The Heroes and Hidden Limits of Cybersecurity
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48Enjoying the content? Let us know your feedback! Today, we’re tackling a fundamental yet often misunderstood tool in every cybersecurity professional's arsenal—vulnerability scanners. What role do they play in protecting our organizations? Where do they shine, and where do they fall short? As always, we’ll cut through the jargon and break things do…
…
continue reading

1
204 - Recap of the best episodes of 2024
1:31:38
1:31:38
Play later
Play later
Lists
Like
Liked
1:31:38Enjoying the content? Let us know your feedback! This final episode of 2024, we recap the best the most listened to episodes of the year. And this year we have a great four back to back of the greatest of them all. Lets start with the first eisode 191 - Is The Browser The New Operating System? released on the 28th of September. Next is episode 172 …
…
continue reading

1
203 - Tips In Securing Your Organization - When the Security Team is Away
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04Enjoying the content? Let us know your feedback! It is a topical episode we’re diving into a high-stakes challenge every organization faces: It is holiday season, how do you manage threats when most of the security team is off duty. Imagine a holiday season, a long weekend, or even an unexpected emergency. With key team members unavailable, how do …
…
continue reading
Enjoying the content? Let us know your feedback! In this week's episode, we’re diving into a concerning and highly consequential topic: the Volt Typhoon espionage campaign—an advanced persistent threat that has sent shockwaves through the cybersecurity and telecommunications industries. Volt Typhoon, a state-backed APT group, has been making headli…
…
continue reading

1
It's the 35th anniversary of ransomware - let's talk about the major shifts and changes
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28Ransomware is 35 years old this month, which isn't exactly something to celebrate. But in any case, do join Hazel and special guest Martin Lee to discuss what happened in the very first ransomware incident in December 1989 and why IT "wasn't ready". They then discuss how ransomware evolved to become the criminal entity it is today, which involves l…
…
continue reading

1
201 - Digital Breadcrumbs - Tracing the Hidden Trails for Evidence
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20Enjoying the content? Let us know your feedback! This week episode, we dive into one of the most fascinating aspects of digital investigations: Windows forensic artifacts. It does not matter who you are: a security professional, an aspiring investigator, or simply curious about how experts uncover the digital breadcrumbs left on your computer, this…
…
continue reading

1
Misadventures, Rabbit Holes, and Turkey Lurkey Goes to the Movies
47:52
47:52
Play later
Play later
Lists
Like
Liked
47:52With Mitch, Matt and Lurene currently stuck in the void, the Beers with Talos B team duly elect themselves to reopen the sacred BWT airwaves with their own brand of nonsense. Hazel, Joe, Bill and Dave each share the security rabbit hole they went down this week - from analyst in-jokes about AI, oligarchs and bad actors refusing to learn good op sec…
…
continue reading

1
200 - Incident Response Playbook- Turning Chaos into Control
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Enjoying the content? Let us know your feedback! Today, we’re tackling a topic that every organization, big or small, absolutely must take seriously: Incident Response Playbook Imagine this: It’s 3 a.m., and your phone buzzes with an alert. A possible ransomware attack has been detected in your network. Do you panic, or do you execute a clear, stru…
…
continue reading

1
199 - FBI-CISA-NSA's list of the most exploited vulnerabilities of 2023
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37Enjoying the content? Let us know your feedback! This week, we’re diving into a hot-off-the-presses report from the FBI, CISA, and NSA —a breakdown of the most exploited vulnerabilities of 2023. Think of this as the hackers' “most wanted” list: the weaknesses in software and systems that bad actors love to exploit because they’re effective and wide…
…
continue reading
Enjoying the content? Let us know your feedback! Today, we’ll dive into what browser engines are, how they power your online experiences, and the security efforts shaping the modern web. We’ll also unpack extension security, with a spotlight on Google’s Manifest v3, and see how Safari and Firefox approach these challenges. Whether you’re a casual b…
…
continue reading

1
Unwrapping the emerging Interlock ransomware attack
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Chetan Raghuprasad is our guest today as he breaks down the relatively new Interlock ransomware attack. Cisco Talos Incident Response recently observed this attacker conducting big-game hunting and double extortion attacks. Chetan talks about the initial access tactics, deployment of the ransomware encryptor, and how Interlock communicates with its…
…
continue reading

1
197 - Advanced Malware evasion Techniques And Their Counter Measures
27:34
27:34
Play later
Play later
Lists
Like
Liked
27:34Enjoying the content? Let us know your feedback! It is another week and another podcast shaw on YusufOnSecurity where we deep dive into the complex world of cybersecurity that concerns both professionals and anyone interested in how attackers continue to evolve their methods. This week we will be covering advanced malware evasion techniques—strateg…
…
continue reading

1
196 - What are Shared Fate Model and Trust Anchors?
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46Enjoying the content? Let us know your feedback! In this week's episode I will unpack the complexities of the cybersecurity world and help you stay informed and secure. Today, we’re going to dig into some intriguing concepts shaping the cybersecurity landscape: the Shared Fate Model and Trust Anchors. Some say these concepts are becoming so vital i…
…
continue reading