Player FM - Internet Radio Done Right
28 subscribers
Checked 1d ago
Adicionado há quatro anos atrás
Conteúdo fornecido por Cisco Talos. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Cisco Talos ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Player FM - Aplicativo de podcast
Fique off-line com o app Player FM !
Fique off-line com o app Player FM !
Podcasts que valem a pena ouvir
PATROCINADO
E
Exile


1 Episode 21: The Heiress Who Helped End School Segregation 35:10
35:10
Mais Tarde
Mais Tarde
Listas
Like
Curtido35:10
Hilde Mosse comes from one of the wealthiest families in Berlin and stands to inherit an enormous fortune. But she longs for something more meaningful than the luxurious lifestyle her family provides. So Hilde decides to pursue her dream of becoming a doctor. As the Nazis take power in Germany and the Mosse family is forced to flee, Dr. Hilde Mosse lands in New York having nearly lost everything.. She finds her calling treating the mental health of Black youth – and the symptoms of a racist system. In addition to photographs, school records, and correspondence spanning Hilde Mosse’s entire lifetime, the Mosse Family Collection in the LBI Archives includes the diaries she kept between 1928 and 1934, from the ages of 16-22. Hilde’s papers are just part of the extensive holdings related to the Mosse Family at LBI. Learn more at lbi.org/hilde . Exile is a production of the Leo Baeck Institute, New York and Antica Productions. It’s narrated by Mandy Patinkin. This episode was written by Lauren Armstrong-Carter. Our executive producers are Laura Regehr, Rami Tzabar, Stuart Coxe, and Bernie Blum. Our producer is Emily Morantz. Research and translation by Isabella Kempf. Voice acting by Hannah Gelman. Sound design and audio mix by Philip Wilson. Theme music by Oliver Wickham. Please consider supporting the work of the Leo Baeck Institute with a tax-deductible contribution by visiting lbi.org/exile2025 . The entire team at Antica Productions and Leo Baeck Institute is deeply saddened by the passing of our Executive Producer, Bernie Blum. We would not have been able to tell these stories without Bernie's generous support. Bernie was also President Emeritus of LBI and Exile would not exist without his energetic and visionary leadership. We extend our condolences to his entire family. May his memory be a blessing. This episode of Exile is made possible in part by a grant from the Conference on Jewish Material Claims Against Germany, which is supported by the German Federal Ministry of Finance and the Foundation Remembrance, Responsibility and Future.…
Talos Takes
Marcar/Desmarcar tudo como reproduzido ...
Manage series 2800269
Conteúdo fornecido por Cisco Talos. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Cisco Talos ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
207 episódios
Marcar/Desmarcar tudo como reproduzido ...
Manage series 2800269
Conteúdo fornecido por Cisco Talos. Todo o conteúdo do podcast, incluindo episódios, gráficos e descrições de podcast, é carregado e fornecido diretamente por Cisco Talos ou por seu parceiro de plataforma de podcast. Se você acredita que alguém está usando seu trabalho protegido por direitos autorais sem sua permissão, siga o processo descrito aqui https://pt.player.fm/legal.
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
207 episódios
Todos os episódios
×T
Talos Takes

Have you ever wondered what it takes to put on a major event like a World Cup or the Olympics, and all the cybersecurity and threat intelligence that needs to be done beforehand? Today’s episode is all about that. Hazel is joined by one of our global Cisco Talos Incident Response leaders, Yuri Kramarz, who has helped some of the biggest events around the world take place securely. We chat about risk factors, focus areas such as endpoint protection, threat hunting and incident response, and what to do in the hours and minutes leading up to the event. Check out the document we mention - a full blueprint on how to protect major events: https://blog.talosintelligence.com/protecting-major-events-blueprint-october-2024-update/…
T
Talos Takes

1 Why attackers are using hidden text salting to evade email filters 9:59
9:59
Mais Tarde
Mais Tarde
Listas
Like
Curtido9:59
In this episode Hazel chats with Omid Mirzaei, a security research lead in the email threat research team at Cisco Talos. Omid and several Talos teammates recently released a blog on hidden text salting (or poisoning) within emails and how attackers are increasingly using this technique to evade detection, confuse email scanners, and essentially try and get phishing emails to land in people’s inboxes. Hidden text salting is a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. The idea is to include some characters into the HTML source of an email that are not visually recognizable. For more, head to the Talos blog…
T
Talos Takes

1 How to establish a threat intelligence program (Cisco Live EMEA preview) 16:01
16:01
Mais Tarde
Mais Tarde
Listas
Like
Curtido16:01
It's an European takeover this week, as Hazel sits down with Talos EMEA threat researchers Martin Lee and Thorsten Rosendahl. They're heading to Cisco Live EMEA next week (February 9-14) to deliver a four hour session on how to establish a threat intelligence program. If you can't make it - here's a 15 minute version! Thorsten and Martin provide best practices for threat intelligence, the different flavors of it (tactical, operational, and strategic), and the significance of curiosity and learning from failures. If you haven't already, check out Martin's introductory course to threat intelligence in collaboration with Cisco’s Networking Academy. This course is free for all, and is intended to give an overview of the domain for someone without prior knowledge which can be used as a starting point for further study or employment.…
T
Talos Takes

1 Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024 13:59
13:59
Mais Tarde
Mais Tarde
Listas
Like
Curtido13:59
Joe Marshall and Craig Jackson join Hazel to discuss the biggest takeaways from Cisco Talos Incident Response's latest Quarterly Trends report. This time the spotlight is on web shells and targeted web applications – both have seen large increases. There’s a brand new ransomware actor on the scene – we’ll talk about the new Interlock ransomware and how we’ve seen this group show up this quarter. Plus, Talos IR observed threat actors using remote tooling in 100% of ransomware incidents this quarter – that’s a significant uptick. For the full report head to blog.talosintelligence.com/talos-ir-trends-q4-2024/…
T
Talos Takes

Hazel sits down with Vanja Svajcer from Talos' threat research team. Vanja is a prolific malware hunter and this time he's here to talk about vulnerable Windows drivers. We've been covering these drivers quite a bit on the Talos blog over the last year, and during our research we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerable drivers only to later exploit them is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD). If you're curious about this topic and the recommendations our team has to help you address vulnerable drivers in your environment, then this episode is for you. The full research can be found at https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/…
T
Talos Takes

1 It's the 35th anniversary of ransomware - let's talk about the major shifts and changes 23:28
23:28
Mais Tarde
Mais Tarde
Listas
Like
Curtido23:28
Ransomware is 35 years old this month, which isn't exactly something to celebrate. But in any case, do join Hazel and special guest Martin Lee to discuss what happened in the very first ransomware incident in December 1989 and why IT "wasn't ready". They then discuss how ransomware evolved to become the criminal entity it is today, which involves looking back on the likes of SamSam, Maze and the emergence of crypto currencies. Plus, learn why Martin says we shouldn't feel powerless in the face of ransomware.…
T
Talos Takes

1 Unwrapping the emerging Interlock ransomware attack 15:02
15:02
Mais Tarde
Mais Tarde
Listas
Like
Curtido15:02
Chetan Raghuprasad is our guest today as he breaks down the relatively new Interlock ransomware attack. Cisco Talos Incident Response recently observed this attacker conducting big-game hunting and double extortion attacks. Chetan talks about the initial access tactics, deployment of the ransomware encryptor, and how Interlock communicates with its victims using their “Worldwide Secrets Blog”. For the full analysis, head to https://blog.talosintelligence.com/emerging-interlock-ransomware/…
T
Talos Takes

1 It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights 50:38
50:38
Mais Tarde
Mais Tarde
Listas
Like
Curtido50:38
What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better. This is a great conversation facilitated by SURGe's Mick Baccio, with Joe Marshall and Nick Biasini from Talos, and Tamara Chacon and Audra Streetman from SURGe. Catch up on all the latest and greatest threat research from our friends at SURGe at https://www.splunk.com/en_us/surge.html…
T
Talos Takes

1 The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing 15:26
15:26
Mais Tarde
Mais Tarde
Listas
Like
Curtido15:26
The Talos IR Quarterly Trends Q3 2024 is out now! In this episode Hazel Burton, Craig Jackson and Bill Largent discuss three big themes: some new ransomware players, the 'Bring Your Own Vulnerable Driver' trend, and why password spray attacks are making a comeback. Check out the full report at https://blog.talosintelligence.com/incident-response-trends-q3-2024/…
T
Talos Takes

Hazel Burton steps in as guest host this week to talk to Brad Garnett, the head of Cisco Talos Incident Response, and JK Lialias, the head of cybersecurity product marketing for Splunk. Brad and JK share two exciting in which Talos is being incorporated into Splunk now, and what that means for the ways we can keep users more secure. They also talk about what better visibility into attacker trends means for the end user and defenders.…
T
Talos Takes

1 Why the BlackByte ransomware group may be more active than we initially thought 9:21
9:21
Mais Tarde
Mais Tarde
Listas
Like
Curtido9:21
James Nutland from Talos' Threat Intelligence team joins the show this week to talk to Jon about his report on the BlackByte ransomware group . They cover why this group is actually more active than we initially thought, and check on the general state of ransomware at this point in 2024.
T
Talos Takes

1 AI, critical infrastructure dominate conversation at Hacker Summer Camp 14:07
14:07
Mais Tarde
Mais Tarde
Listas
Like
Curtido14:07
It's quite the gang for Talos Takes this week with Joe Marshall, Nick Biasini and Mick Baccio (from Splunk's SURGe team) joining Jon this week to recap Black Hat and DEF CON. They share all the conversations and talking points they heard around AI, and the renewed importance of a software bill of goods for industrial control system environments.…
T
Talos Takes

He's been here since the beginning, and now he's ready to reflect on the past 10 years of Cisco Talos. Matt Watchinski, the Vice President of Talos for Cisco, joins Jon this week to talk about Talos' recently celebrated 10th birthday and talk about the company's origins, how we've managed to balance growth and culture, and his favorite memories from the past 10 years.…
T
Talos Takes

1 What should we be doing to better support open-source software? 11:03
11:03
Mais Tarde
Mais Tarde
Listas
Like
Curtido11:03
People who maintain, create and update open-source software are the unsung heroes of the internet. Their work keeps much of our networks running on a daily basis, and the vast majority of them do it for free! While there are some security pitfalls that can come with using OS software, Martin Lee and Jon get together to discuss what (if anything) we can be doing to better support OS software, and how to make our networks more resilient against vulnerabilities that can arise in these tools.…
T
Talos Takes

1 Threat actor trends and the most prevalent malware from the past quarter 15:57
15:57
Mais Tarde
Mais Tarde
Listas
Like
Curtido15:57
Hazel Burton guest hosts this week to recap the top threats observed by Cisco Talos Incident Response (Talos IR) in the second quarter of 2024. She’s then joined by Talos’ Joe Marshall and Craig Jackson to pick out some of the most interesting stories from the report.
Bem vindo ao Player FM!
O Player FM procura na web por podcasts de alta qualidade para você curtir agora mesmo. É o melhor app de podcast e funciona no Android, iPhone e web. Inscreva-se para sincronizar as assinaturas entre os dispositivos.