Talos Takes
Podcast tekijän mukaan Cisco Talos
209 Jaksot
-
Year in Review special pt. 4: How AI is influencing the threat landscape?
Julkaistiin: 1.5.2025 -
Year in Review special part 3: Identity and MFA attacks
Julkaistiin: 24.4.2025 -
Year in Review special part 2: The biggest ransomware trends
Julkaistiin: 17.4.2025 -
Year in Review special part 1: vulnerabilities, email threats, and adversary tooling
Julkaistiin: 10.4.2025 -
A blueprint for protecting major events
Julkaistiin: 26.2.2025 -
Why attackers are using hidden text salting to evade email filters
Julkaistiin: 12.2.2025 -
How to establish a threat intelligence program (Cisco Live EMEA preview)
Julkaistiin: 5.2.2025 -
Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024
Julkaistiin: 31.1.2025 -
Exploring vulnerable Windows drivers
Julkaistiin: 15.1.2025 -
It's the 35th anniversary of ransomware - let's talk about the major shifts and changes
Julkaistiin: 11.12.2024 -
Unwrapping the emerging Interlock ransomware attack
Julkaistiin: 14.11.2024 -
It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights
Julkaistiin: 31.10.2024 -
The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing
Julkaistiin: 25.10.2024 -
How Talos IR and Splunk are teaming up
Julkaistiin: 13.9.2024 -
Why the BlackByte ransomware group may be more active than we initially thought
Julkaistiin: 6.9.2024 -
AI, critical infrastructure dominate conversation at Hacker Summer Camp
Julkaistiin: 23.8.2024 -
A 1-on-1 with Talos VP Matt Watchinski
Julkaistiin: 16.8.2024 -
What should we be doing to better support open-source software?
Julkaistiin: 2.8.2024 -
Threat actor trends and the most prevalent malware from the past quarter
Julkaistiin: 26.7.2024 -
You got a data breach notification. Now what?
Julkaistiin: 19.7.2024
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
