Podcast Episodes
Back to SearchInside the Black Hat NOC: Lessons in Securing One of the Wildest Networks
How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica O…
5 months, 3 weeks ago
Breaking Down Chaos: Tactics and Origins of a New RaaS Operation
Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. …
6 months, 3 weeks ago
Why Attackers Love Your Remote Access Tools
Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security…
7 months, 1 week ago
Teaching LLMs to spot malicious PowerShell scripts
Hazel welcomes back Ryan Fetterman from the SURGe team to explore his new research on how large language models (LLMs) can assist those who work in s…
8 months ago
How cybercriminals are camouflaging threats as fake AI tool installers
Chetan Raghuprasad joins Hazel to discuss his threat hunting research into fake AI tool installers, which criminals are using to distribute ransomwar…
8 months, 3 weeks ago
Inside the attack chain: A new methodology for tracking compartmentalized threats
Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.…
9 months ago
Follow the motive: Rethinking defense against Initial Access Groups
In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distingu…
9 months, 1 week ago
Year in Review special pt. 4: How AI is influencing the threat landscape?
A jam packed episode of guests means a slightly longer Talos Takes for your feed today! We welcome Amy Chang and Omar Santos from Cisco, Vitor Ventur…
9 months, 3 weeks ago
Year in Review special part 3: Identity and MFA attacks
Steven Leung from Cisco Duo joins Hazel to discuss the prevalence of identity-based attacks, why they're happening, and the various methods attackers…
10 months ago
Year in Review special part 2: The biggest ransomware trends
Azim Khodjibaev and Lexi DiScola join Hazel to discuss some of the most prolific ransomware groups (and why LockBit may end this year very differentl…
10 months, 1 week ago