4 takeaways from what Talos IR is seeing in the field
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
20h ago
Hazel Burton steps in to host this week's episode as we cover the recent Cisco Talos Incident Response Quarterly Trends Report from the first quarter of this year. Hazel talks to different Talosians to find out why business email compromise is on the rise, how attackers are bypassing MFA, and more.  ..read more
Visit website
How to defend against brute force attacks
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
1w ago
After a recent spike in brute force attempts targeting SSH and VPN services, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just take passwords out of the equation entirely).  ..read more
Visit website
Why we need to stop calling as-a-service group takedowns "takedowns"
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
3w ago
Hazel Burton and Thorsten Rosendahl join Jon Munshaw on this week's episode to discuss the problem with threat actor "hydras." They recently wrote about the topic for the Talos blog, highlighting how law enforcement takedowns of these groups are closer to just disruptions or setbacks for these massive actors. They talk about what really needs to be done to stop ransomware actors and why RaaS is a breeding ground for "hydras ..read more
Visit website
Turla has been around for 20-plus years at this point, but they're still mixing things up
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
1M ago
Holger Unterbrink of Talos Outreach joins the show this week to discuss his recent Turla APT research. This Russian state-sponsored actor has been around for years but is regularly adding new tooling to its arsenal. Holger has new details about their latest tool, TinyTurlaNG, and insight into the types of organizations they're targeting ..read more
Visit website
Why more actors are starting to use Telegram for their communications
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
1M ago
Jon started noticing that Talos is finding more threat actors using Telegram nowadays for their communication and coordination, so he decided to bring Azim Khodjibaev on to ask him if he was just inventing this, or if it was a real trend. Turns out it's a real trend! Azim fills listeners in on why Telegram is becoming the app of choice for APTs to publish "news," threaten data leaks, and more.  ..read more
Visit website
Why no one should be relying on passive security in 2024
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
1M ago
Nick Biasini joins Jon this week to talk about passive security. He recently wrote about this topic for the Talos blog and joined Wendy Nather in discussing the merits of passive security versus active blocking. Nick defines what passive security is, exactly, and why it's not the way to go in the modern age.  ..read more
Visit website
What's new about GhostSec's ransomware-as-a-service model
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
2M ago
Chetan Raghuprasad from the Talos Outreach team joins Talos Takes this week to talk to Jon about the GhostSec threat actor that he and a few colleagues wrote about for the Talos blog. GhostSec has teamed up with another ransomware group to carry out double extortion attacks all over the globe, with increasing frequency over the past year. They discuss what's unique about this particular RaaS model, where GhostSec came from, and the benefits of going in on a team-up.  ..read more
Visit website
Why are "identity attacks" on the rise?
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
2M ago
Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics.  ..read more
Visit website
The tl;dr of NIS2
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
2M ago
Gergana Karadzhova-Dangela and Thorsten Rosendahl, our resident experts on all things European Union cybersecurity law, join the show this week to talk about the impending NIS2 regulations. Don't worry, you've still got plenty of time to work on them, but this is a good place to get started even if you've never seen the phrase "NIS2" before. Find more of their writing on NIS2 here and here.  ..read more
Visit website
Case study: How Talos IR helped a healthcare tech company avoid a ransomware attack
Cisco Talos Intelligence Group | Talos Takes
by Cisco Talos
2M ago
Reposted from the Cisco Security Stories feed: Meet Jeremy Maxwell, CISO of Veradigm, a healthcare IT company. Jeremy discusses how his organization proactively prepares for cybersecurity incidents within a highly regulated industry ..read more
Visit website

Follow Cisco Talos Intelligence Group | Talos Takes on FeedSpot

Continue with Google
Continue with Apple
OR