Podcast Episodes

Back to Search
You Can't Patch Burnout: When Cybersecurity Takes a Toll

You Can't Patch Burnout: When Cybersecurity Takes a Toll



Every October, Cybersecurity Awareness Month brings a wave of tips: update your software, enable MFA, use strong passwords. But what good is any of that if the people behind the defenses are feeling …


Published on 8 hours ago

No image available

Tampered Chef: When Malvertising Serves Up Infostealers



Imagine downloading a PDF Editor tool from the internet that works great...until nearly two months later, when it quietly steals your credentials. That’s the reality of “Tampered Chef,” a malvertisin…


Published on 2 weeks ago

No image available

Inside the Black Hat NOC: Lessons in Securing One of the Wildest Networks



How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica Oppenheimer, Director of Security Operations at Cis…


Published on 4 weeks, 1 day ago

No image available

Breaking Down Chaos: Tactics and Origins of a New RaaS Operation



Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements,…


Published on 2 months ago

No image available

Why Attackers Love Your Remote Access Tools



Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these leg…


Published on 2 months, 2 weeks ago

No image available

Teaching LLMs to spot malicious PowerShell scripts



Hazel welcomes back Ryan Fetterman from the SURGe team to explore his new research on how large language models (LLMs) can assist those who work in security operations centers to identify malicious P…


Published on 3 months ago

No image available

How cybercriminals are camouflaging threats as fake AI tool installers



Chetan Raghuprasad joins Hazel to discuss his threat hunting research into fake AI tool installers, which criminals are using to distribute ransomware, RATS, stealers and other destructive malware. H…


Published on 3 months, 3 weeks ago

No image available

Inside the attack chain: A new methodology for tracking compartmentalized threats



Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from ot…


Published on 4 months, 1 week ago

No image available

Follow the motive: Rethinking defense against Initial Access Groups



In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distinguishing between different types of IABs. We talk ab…


Published on 4 months, 2 weeks ago

Year in Review special pt. 4: How AI is influencing the threat landscape?

Year in Review special pt. 4: How AI is influencing the threat landscape?



A jam packed episode of guests means a slightly longer Talos Takes for your feed today! We welcome Amy Chang and Omar Santos from Cisco, Vitor Ventura from Talos, and Ryan Fetterman from Splunk. Toge…


Published on 5 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate