<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://feeds.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/2018149.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Talos Takes</title>
  <lastBuildDate>Wed, 15 Jan 2025 09:05:18 -0500</lastBuildDate>
  <link>https://www.talosintelligence.com/podcasts</link>
  <language>en-us</language>
  <copyright>© 2025 Talos Takes</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>aa497bd0-84eb-59b0-9141-4461b1ddbd5a</podcast:guid>
    <itunes:author>Cisco Talos</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Cisco Talos</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/3ezljc91h7jwm92kpbaoeacgvxe5?.jpg</url>
     <title>Talos Takes</title>
     <link>https://www.talosintelligence.com/podcasts</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/3ezljc91h7jwm92kpbaoeacgvxe5?.jpg" />
  <itunes:category text="Technology" />
  <podcast:person role="host" img="https://storage.buzzsprout.com/m4lodsj90nm8bihjp6qof9kjj73x">Hazel Burton</podcast:person>
  <item>
    <itunes:title>Exploring vulnerable Windows drivers</itunes:title>
    <title>Exploring vulnerable Windows drivers</title>
    <itunes:summary><![CDATA[Hazel sits down with Vanja Svajcer from Talos' threat research team. Vanja is a prolific malware hunter and this time he's here to talk about vulnerable Windows drivers. We've been covering these drivers quite a bit on the Talos blog over the last year, and during our research we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerabl...]]></itunes:summary>
    <description><![CDATA[<p>Hazel sits down with Vanja Svajcer from Talos&apos; threat research team. Vanja is a prolific malware hunter and this time he&apos;s here to talk about vulnerable Windows drivers. We&apos;ve been covering these drivers quite a bit on the Talos blog over the last year, and during our research we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerable drivers only to later exploit them is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD). <br/><br/>If you&apos;re curious about this topic and the recommendations our team has to help you address vulnerable drivers in your environment, then this episode is for you. <br/><br/>The full research can be found at <a href='https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/'>https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/</a></p>]]></description>
    <content:encoded><![CDATA[<p>Hazel sits down with Vanja Svajcer from Talos&apos; threat research team. Vanja is a prolific malware hunter and this time he&apos;s here to talk about vulnerable Windows drivers. We&apos;ve been covering these drivers quite a bit on the Talos blog over the last year, and during our research we investigated classes of vulnerabilities typically exploited by threat actors as well as the payloads they typically deploy post-exploitation. The attacks in which attackers are deliberately installing known vulnerable drivers only to later exploit them is a technique referred to as Bring Your Own Vulnerable Driver (BYOVD). <br/><br/>If you&apos;re curious about this topic and the recommendations our team has to help you address vulnerable drivers in your environment, then this episode is for you. <br/><br/>The full research can be found at <a href='https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/'>https://blog.talosintelligence.com/exploring-vulnerable-windows-drivers/</a></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/16436172-exploring-vulnerable-windows-drivers.mp3" length="11150598" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-16436172</guid>
    <pubDate>Wed, 15 Jan 2025 05:00:00 -0500</pubDate>
    <itunes:duration>924</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>It&#39;s the 35th anniversary of ransomware - let&#39;s talk about the major shifts and changes</itunes:title>
    <title>It&#39;s the 35th anniversary of ransomware - let&#39;s talk about the major shifts and changes</title>
    <itunes:summary><![CDATA[Ransomware is 35 years old this month, which isn't exactly something to celebrate. But in any case, do join Hazel and special guest Martin Lee to discuss what happened in the very first ransomware incident in December 1989 and why IT "wasn't ready". They then discuss how ransomware evolved to become the criminal entity it is today, which involves looking back on the likes of SamSam, Maze and the emergence of crypto currencies. Plus, learn why Martin says we shouldn't feel powerless in th...]]></itunes:summary>
    <description><![CDATA[<p>Ransomware is 35 years old this month, which isn&apos;t exactly something to celebrate. But in any case, do join Hazel and special guest Martin Lee to discuss what happened in the very first ransomware incident in December 1989 and why IT &quot;wasn&apos;t ready&quot;. <br/><br/>They then discuss how ransomware evolved to become the criminal entity it is today, which involves looking back on the likes of SamSam, Maze and the emergence of crypto currencies. Plus, learn why Martin says we shouldn&apos;t feel powerless in the face of ransomware.</p>]]></description>
    <content:encoded><![CDATA[<p>Ransomware is 35 years old this month, which isn&apos;t exactly something to celebrate. But in any case, do join Hazel and special guest Martin Lee to discuss what happened in the very first ransomware incident in December 1989 and why IT &quot;wasn&apos;t ready&quot;. <br/><br/>They then discuss how ransomware evolved to become the criminal entity it is today, which involves looking back on the likes of SamSam, Maze and the emergence of crypto currencies. Plus, learn why Martin says we shouldn&apos;t feel powerless in the face of ransomware.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/16254941-it-s-the-35th-anniversary-of-ransomware-let-s-talk-about-the-major-shifts-and-changes.mp3" length="16969703" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-16254941</guid>
    <pubDate>Wed, 11 Dec 2024 08:00:00 -0500</pubDate>
    <itunes:duration>1408</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unwrapping the emerging Interlock ransomware attack</itunes:title>
    <title>Unwrapping the emerging Interlock ransomware attack</title>
    <itunes:summary><![CDATA[Chetan Raghuprasad is our guest today as he breaks down the relatively new Interlock ransomware attack. Cisco Talos Incident Response recently observed this attacker conducting big-game hunting and double extortion attacks. Chetan talks about the initial access tactics, deployment of the ransomware encryptor, and how Interlock communicates with its victims using their “Worldwide Secrets Blog”.For the full analysis, head to https://blog.talosintelligence.com/emerging-interlock-ransom...]]></itunes:summary>
    <description><![CDATA[<p>Chetan Raghuprasad is our guest today as he breaks down the relatively new Interlock ransomware attack. Cisco Talos Incident Response recently observed this attacker conducting big-game hunting and double extortion attacks. <br/><br/>Chetan talks about the initial access tactics, deployment of the ransomware encryptor, and how Interlock communicates with its victims using their “Worldwide Secrets Blog”.<br/><br/>For the full analysis, head to <a href='https://blog.talosintelligence.com/emerging-interlock-ransomware/'>https://blog.talosintelligence.com/emerging-interlock-ransomware/</a></p>]]></description>
    <content:encoded><![CDATA[<p>Chetan Raghuprasad is our guest today as he breaks down the relatively new Interlock ransomware attack. Cisco Talos Incident Response recently observed this attacker conducting big-game hunting and double extortion attacks. <br/><br/>Chetan talks about the initial access tactics, deployment of the ransomware encryptor, and how Interlock communicates with its victims using their “Worldwide Secrets Blog”.<br/><br/>For the full analysis, head to <a href='https://blog.talosintelligence.com/emerging-interlock-ransomware/'>https://blog.talosintelligence.com/emerging-interlock-ransomware/</a></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/16091012-unwrapping-the-emerging-interlock-ransomware-attack.mp3" length="10893116" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-16091012</guid>
    <pubDate>Thu, 14 Nov 2024 05:00:00 -0500</pubDate>
    <itunes:duration>902</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>It&#39;s Taplunk! Talos and Splunk threat researchers meet to put the security world to rights</itunes:title>
    <title>It&#39;s Taplunk! Talos and Splunk threat researchers meet to put the security world to rights</title>
    <itunes:summary><![CDATA[What happens when two sets of threat researchers from Talos and Splunk's SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what's actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better. This is a great conversation facilitated by SURGe...]]></itunes:summary>
    <description><![CDATA[<p>What happens when two sets of threat researchers from Talos and Splunk&apos;s SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what&apos;s actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better. <br/><br/>This is a great conversation facilitated by SURGe&apos;s Mick Baccio, with Joe Marshall and Nick Biasini from Talos, and Tamara Chacon and Audra Streetman from SURGe.<br/><br/>Catch up on all the latest and greatest threat research from our friends at SURGe at <a href='https://www.splunk.com/en_us/surge.html'>https://www.splunk.com/en_us/surge.html</a></p>]]></description>
    <content:encoded><![CDATA[<p>What happens when two sets of threat researchers from Talos and Splunk&apos;s SURGe team meet? Aside from some highly controversial opinions and omissions about the best horror movie, the team discuss what security trends are FUD, and what&apos;s actually fearful/ most challenging at the moment. Also, what is the security industry not aware of enough, and also too aware of? Plus some thoughts on cybersecurity awareness training and how we can do better. <br/><br/>This is a great conversation facilitated by SURGe&apos;s Mick Baccio, with Joe Marshall and Nick Biasini from Talos, and Tamara Chacon and Audra Streetman from SURGe.<br/><br/>Catch up on all the latest and greatest threat research from our friends at SURGe at <a href='https://www.splunk.com/en_us/surge.html'>https://www.splunk.com/en_us/surge.html</a></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/16010726-it-s-taplunk-talos-and-splunk-threat-researchers-meet-to-put-the-security-world-to-rights.mp3" length="36529661" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-16010726</guid>
    <pubDate>Thu, 31 Oct 2024 05:00:00 -0400</pubDate>
    <itunes:duration>3038</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The biggest takeaways from Talos IR&#39;s new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing</itunes:title>
    <title>The biggest takeaways from Talos IR&#39;s new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing</title>
    <itunes:summary><![CDATA[The Talos IR Quarterly Trends Q3 2024 is out now! In this episode Hazel Burton, Craig Jackson and Bill Largent discuss three big themes: some new ransomware players, the 'Bring Your Own Vulnerable Driver' trend, and why password spray attacks are making a comeback. Check out the full report at https://blog.talosintelligence.com/incident-response-trends-q3-2024/]]></itunes:summary>
    <description><![CDATA[<p>The Talos IR Quarterly Trends Q3 2024 is out now! In this episode Hazel Burton, Craig Jackson and Bill Largent discuss three big themes: some new ransomware players, the &apos;Bring Your Own Vulnerable Driver&apos; trend, and why password spray attacks are making a comeback. <br/><br/>Check out the full report at https://blog.talosintelligence.com/incident-response-trends-q3-2024/</p>]]></description>
    <content:encoded><![CDATA[<p>The Talos IR Quarterly Trends Q3 2024 is out now! In this episode Hazel Burton, Craig Jackson and Bill Largent discuss three big themes: some new ransomware players, the &apos;Bring Your Own Vulnerable Driver&apos; trend, and why password spray attacks are making a comeback. <br/><br/>Check out the full report at https://blog.talosintelligence.com/incident-response-trends-q3-2024/</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15989360-the-biggest-takeaways-from-talos-ir-s-new-report-new-ransomware-variants-edr-tool-uninstallation-and-password-spray-attacks-increasing.mp3" length="11181057" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15989360</guid>
    <pubDate>Fri, 25 Oct 2024 05:00:00 -0400</pubDate>
    <itunes:duration>926</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How Talos IR and Splunk are teaming up</itunes:title>
    <title>How Talos IR and Splunk are teaming up</title>
    <itunes:summary><![CDATA[Hazel Burton steps in as guest host this week to talk to Brad Garnett, the head of Cisco Talos Incident Response, and JK Lialias, the head of cybersecurity product marketing for Splunk. Brad and JK share two exciting in which Talos is being incorporated into Splunk now, and what that means for the ways we can keep users more secure. They also talk about what better visibility into attacker trends means for the end user and defenders.]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton steps in as guest host this week to talk to Brad Garnett, the head of Cisco Talos Incident Response, and JK Lialias, the head of cybersecurity product marketing for Splunk. Brad and JK share two exciting in which Talos is being incorporated into Splunk now, and what that means for the ways we can keep users more secure. They also talk about what better visibility into attacker trends means for the end user and defenders.</p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton steps in as guest host this week to talk to Brad Garnett, the head of Cisco Talos Incident Response, and JK Lialias, the head of cybersecurity product marketing for Splunk. Brad and JK share two exciting in which Talos is being incorporated into Splunk now, and what that means for the ways we can keep users more secure. They also talk about what better visibility into attacker trends means for the end user and defenders.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15740949-how-talos-ir-and-splunk-are-teaming-up.mp3" length="15442229" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15740949</guid>
    <pubDate>Fri, 13 Sep 2024 04:00:00 -0400</pubDate>
    <itunes:duration>1281</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>197</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why the BlackByte ransomware group may be more active than we initially thought</itunes:title>
    <title>Why the BlackByte ransomware group may be more active than we initially thought</title>
    <itunes:summary><![CDATA[James Nutland from Talos' Threat Intelligence team joins the show this week to talk to Jon about his report on the BlackByte ransomware group. They cover why this group is actually more active than we initially thought, and check on the general state of ransomware at this point in 2024. ]]></itunes:summary>
    <description><![CDATA[<p>James Nutland from Talos&apos; Threat Intelligence team joins the show this week to talk to Jon about his <a href='https://blog.talosintelligence.com/blackbyte-blends-tried-and-true-tradecraft-with-newly-disclosed-vulnerabilities-to-support-ongoing-attacks/'>report on the BlackByte ransomware group</a>. They cover why this group is actually more active than we initially thought, and check on the general state of ransomware at this point in 2024. </p>]]></description>
    <content:encoded><![CDATA[<p>James Nutland from Talos&apos; Threat Intelligence team joins the show this week to talk to Jon about his <a href='https://blog.talosintelligence.com/blackbyte-blends-tried-and-true-tradecraft-with-newly-disclosed-vulnerabilities-to-support-ongoing-attacks/'>report on the BlackByte ransomware group</a>. They cover why this group is actually more active than we initially thought, and check on the general state of ransomware at this point in 2024. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15702235-why-the-blackbyte-ransomware-group-may-be-more-active-than-we-initially-thought.mp3" length="6808737" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15702235</guid>
    <pubDate>Fri, 06 Sep 2024 04:00:00 -0400</pubDate>
    <itunes:duration>561</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>196</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI, critical infrastructure dominate conversation at Hacker Summer Camp</itunes:title>
    <title>AI, critical infrastructure dominate conversation at Hacker Summer Camp</title>
    <itunes:summary><![CDATA[It's quite the gang for Talos Takes this week with Joe Marshall, Nick Biasini and Mick Baccio (from Splunk's SURGe team) joining Jon this week to recap Black Hat and DEF CON. They share all the conversations and talking points they heard around AI, and the renewed importance of a software bill of goods for industrial control system environments. ]]></itunes:summary>
    <description><![CDATA[<p>It&apos;s quite the gang for Talos Takes this week with Joe Marshall, Nick Biasini and Mick Baccio (from Splunk&apos;s SURGe team) joining Jon this week to recap Black Hat and DEF CON. They share all the conversations and talking points they heard around AI, and the renewed importance of a software bill of goods for industrial control system environments. </p>]]></description>
    <content:encoded><![CDATA[<p>It&apos;s quite the gang for Talos Takes this week with Joe Marshall, Nick Biasini and Mick Baccio (from Splunk&apos;s SURGe team) joining Jon this week to recap Black Hat and DEF CON. They share all the conversations and talking points they heard around AI, and the renewed importance of a software bill of goods for industrial control system environments. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15624844-ai-critical-infrastructure-dominate-conversation-at-hacker-summer-camp.mp3" length="10235568" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15624844</guid>
    <pubDate>Fri, 23 Aug 2024 04:00:00 -0400</pubDate>
    <itunes:duration>847</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>195</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A 1-on-1 with Talos VP Matt Watchinski</itunes:title>
    <title>A 1-on-1 with Talos VP Matt Watchinski</title>
    <itunes:summary><![CDATA[He's been here since the beginning, and now he's ready to reflect on the past 10 years of Cisco Talos. Matt Watchinski, the Vice President of Talos for Cisco, joins Jon this week to talk about Talos' recently celebrated 10th birthday and talk about the company's origins, how we've managed to balance growth and culture, and his favorite memories from the past 10 years. ]]></itunes:summary>
    <description><![CDATA[<p>He&apos;s been here since the beginning, and now he&apos;s ready to reflect on the past 10 years of Cisco Talos. Matt Watchinski, the Vice President of Talos for Cisco, joins Jon this week to talk about Talos&apos; recently celebrated 10th birthday and talk about the company&apos;s origins, how we&apos;ve managed to balance growth and culture, and his favorite memories from the past 10 years. </p>]]></description>
    <content:encoded><![CDATA[<p>He&apos;s been here since the beginning, and now he&apos;s ready to reflect on the past 10 years of Cisco Talos. Matt Watchinski, the Vice President of Talos for Cisco, joins Jon this week to talk about Talos&apos; recently celebrated 10th birthday and talk about the company&apos;s origins, how we&apos;ve managed to balance growth and culture, and his favorite memories from the past 10 years. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15583077-a-1-on-1-with-talos-vp-matt-watchinski.mp3" length="21724738" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15583077</guid>
    <pubDate>Fri, 16 Aug 2024 04:00:00 -0400</pubDate>
    <itunes:duration>1804</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>194</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What should we be doing to better support open-source software?</itunes:title>
    <title>What should we be doing to better support open-source software?</title>
    <itunes:summary><![CDATA[People who maintain, create and update open-source software are the unsung heroes of the internet. Their work keeps much of our networks running on a daily basis, and the vast majority of them do it for free! While there are some security pitfalls that can come with using OS software, Martin Lee and Jon get together to discuss what (if anything) we can be doing to better support OS software, and how to make our networks more resilient against vulnerabilities that can arise in these tools.&nbs...]]></itunes:summary>
    <description><![CDATA[<p>People who maintain, create and update open-source software are the unsung heroes of the internet. Their work keeps much of our networks running on a daily basis, and the vast majority of them do it for free! While there are some security pitfalls that can come with using OS software, Martin Lee and Jon get together to discuss what (if anything) we can be doing to better support OS software, and how to make our networks more resilient against vulnerabilities that can arise in these tools.  </p>]]></description>
    <content:encoded><![CDATA[<p>People who maintain, create and update open-source software are the unsung heroes of the internet. Their work keeps much of our networks running on a daily basis, and the vast majority of them do it for free! While there are some security pitfalls that can come with using OS software, Martin Lee and Jon get together to discuss what (if anything) we can be doing to better support OS software, and how to make our networks more resilient against vulnerabilities that can arise in these tools.  </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15515658-what-should-we-be-doing-to-better-support-open-source-software.mp3" length="8034370" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15515658</guid>
    <pubDate>Fri, 02 Aug 2024 04:00:00 -0400</pubDate>
    <itunes:duration>663</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>193</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threat actor trends and the most prevalent malware from the past quarter</itunes:title>
    <title>Threat actor trends and the most prevalent malware from the past quarter</title>
    <itunes:summary><![CDATA[Hazel Burton guest hosts this week to recap the top threats observed by Cisco Talos Incident Response (Talos IR) in the second quarter of 2024. She’s then joined by Talos’ Joe Marshall and Craig Jackson to pick out some of the most interesting stories from the report.]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton guest hosts this week to <a href='https://blog.talosintelligence.com/ir-trends-ransomware-on-the-rise-q2-2024/'>recap the top threats observed by Cisco Talos Incident Response (Talos IR)</a> in the second quarter of 2024. She’s then joined by Talos’ Joe Marshall and Craig Jackson to pick out some of the most interesting stories from the report.<br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton guest hosts this week to <a href='https://blog.talosintelligence.com/ir-trends-ransomware-on-the-rise-q2-2024/'>recap the top threats observed by Cisco Talos Incident Response (Talos IR)</a> in the second quarter of 2024. She’s then joined by Talos’ Joe Marshall and Craig Jackson to pick out some of the most interesting stories from the report.<br/><br/></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15474516-threat-actor-trends-and-the-most-prevalent-malware-from-the-past-quarter.mp3" length="11556217" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15474516</guid>
    <pubDate>Fri, 26 Jul 2024 04:00:00 -0400</pubDate>
    <itunes:duration>957</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>192</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>You got a data breach notification. Now what?</itunes:title>
    <title>You got a data breach notification. Now what?</title>
    <itunes:summary><![CDATA[Joe Marshall, Talos' resident ICS and IoT expert, and Pierre Cadieux from Talos Incident Response join Jon this week to discuss data breaches. Between Snowflake, AT&amp;T, Ticketmaster and more, we should probably assume our data has been part of a leak somewhere. So what steps should you take to prepare for this inevitability? Or what should you do when you get a data breach notification from a company?]]></itunes:summary>
    <description><![CDATA[<p>Joe Marshall, Talos&apos; resident ICS and IoT expert, and Pierre Cadieux from Talos Incident Response join Jon this week to discuss data breaches. Between Snowflake, AT&amp;T, Ticketmaster and more, we should probably assume our data has been part of a leak somewhere. So what steps should you take to prepare for this inevitability? Or what should you do when you get a data breach notification from a company?</p>]]></description>
    <content:encoded><![CDATA[<p>Joe Marshall, Talos&apos; resident ICS and IoT expert, and Pierre Cadieux from Talos Incident Response join Jon this week to discuss data breaches. Between Snowflake, AT&amp;T, Ticketmaster and more, we should probably assume our data has been part of a leak somewhere. So what steps should you take to prepare for this inevitability? Or what should you do when you get a data breach notification from a company?</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15434973-you-got-a-data-breach-notification-now-what.mp3" length="15954765" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15434973</guid>
    <pubDate>Fri, 19 Jul 2024 04:00:00 -0400</pubDate>
    <itunes:duration>1323</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>191</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What we learned from studying the TTPs of the 14 most active ransomware groups</itunes:title>
    <title>What we learned from studying the TTPs of the 14 most active ransomware groups</title>
    <itunes:summary><![CDATA[Fresh off an analysis of the 14 most active ransomware groups, James Nutland joins Jon this week to discuss his findings. They talk about the most common TTPs shared among these groups, and the potential outliers among these gangs and how they try to infect victims. For more on this topic, watch the inaugural episode of "The Talos Threat Perspective." ]]></itunes:summary>
    <description><![CDATA[<p>Fresh off an analysis of the <a href='https://blog.talosintelligence.com/common-ransomware-actor-ttps-playbooks/'>14 most active ransomware groups</a>, James Nutland joins Jon this week to discuss his findings. They talk about the most common TTPs shared among these groups, and the potential outliers among these gangs and how they try to infect victims. For more on this topic, <a href='https://youtu.be/V6V7fSAdXhw?si=gU0u3_YraR8oj2rI'>watch the inaugural episode of &quot;The Talos Threat Perspective.&quot; </a></p>]]></description>
    <content:encoded><![CDATA[<p>Fresh off an analysis of the <a href='https://blog.talosintelligence.com/common-ransomware-actor-ttps-playbooks/'>14 most active ransomware groups</a>, James Nutland joins Jon this week to discuss his findings. They talk about the most common TTPs shared among these groups, and the potential outliers among these gangs and how they try to infect victims. For more on this topic, <a href='https://youtu.be/V6V7fSAdXhw?si=gU0u3_YraR8oj2rI'>watch the inaugural episode of &quot;The Talos Threat Perspective.&quot; </a></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15398290-what-we-learned-from-studying-the-ttps-of-the-14-most-active-ransomware-groups.mp3" length="6013776" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15398290</guid>
    <pubDate>Fri, 12 Jul 2024 04:00:00 -0400</pubDate>
    <itunes:duration>495</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>190</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Time to catch up on the wide-reaching Snowflake incident</itunes:title>
    <title>Time to catch up on the wide-reaching Snowflake incident</title>
    <itunes:summary><![CDATA[Over 160 companies have been affected by a data breach at data storage company Snowflake, including Ticketmaster, Nieman Marcus and more. But the issue wasn't a security vulnerability or some sophisticated malware — it was just someone who exposed their login credentials at a different company. Host Jon Munshaw got Pierre Cadieux from Talos IR and Nick Biasini from Talos Outreach to discuss the follow-on breaches that have resulted from this and the lessons we can learn about making our login...]]></itunes:summary>
    <description><![CDATA[<p>Over 160 companies have been affected by a data breach at <a href='https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion'>data storage company Snowflake,</a> including Ticketmaster, <a href='https://www.darkreading.com/cloud-security/nieman-marcus-customers-impacted-snowflake-data-breach'>Nieman Marcus</a> and more. But the issue wasn&apos;t a security vulnerability or some sophisticated malware — it was just someone who exposed their login credentials at a different company. Host Jon Munshaw got Pierre Cadieux from Talos IR and Nick Biasini from Talos Outreach to discuss the follow-on breaches that have resulted from this and the <a href='https://blog.talosintelligence.com/infostealer-landscape-facilitates-breaches/'>lessons we can learn</a> about making our login credentials more secure. </p>]]></description>
    <content:encoded><![CDATA[<p>Over 160 companies have been affected by a data breach at <a href='https://cloud.google.com/blog/topics/threat-intelligence/unc5537-snowflake-data-theft-extortion'>data storage company Snowflake,</a> including Ticketmaster, <a href='https://www.darkreading.com/cloud-security/nieman-marcus-customers-impacted-snowflake-data-breach'>Nieman Marcus</a> and more. But the issue wasn&apos;t a security vulnerability or some sophisticated malware — it was just someone who exposed their login credentials at a different company. Host Jon Munshaw got Pierre Cadieux from Talos IR and Nick Biasini from Talos Outreach to discuss the follow-on breaches that have resulted from this and the <a href='https://blog.talosintelligence.com/infostealer-landscape-facilitates-breaches/'>lessons we can learn</a> about making our login credentials more secure. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15322932-time-to-catch-up-on-the-wide-reaching-snowflake-incident.mp3" length="12278105" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15322932</guid>
    <pubDate>Fri, 28 Jun 2024 04:00:00 -0400</pubDate>
    <itunes:duration>1017</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>189</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Everything we know about denial-of-service attacks in 2024</itunes:title>
    <title>Everything we know about denial-of-service attacks in 2024</title>
    <itunes:summary><![CDATA[You may think a DDoS attack is so early aughts. But some of the largest attacks of this type have occurred in just the past few years. Talos recently updated our advice for how to best mitigate and prepare for this threat, so Aliza Johnson from Talos' Threat Intelligence &amp; Interdiction team joins the show this week to discuss her recent findings and hacktivists' trends around using this threat. ]]></itunes:summary>
    <description><![CDATA[<p>You may think a DDoS attack is so early aughts. But some of the largest attacks of this type have occurred in just the past few years. Talos recently updated our advice for how to best mitigate and prepare for this threat, so Aliza Johnson from Talos&apos; Threat Intelligence &amp; Interdiction team joins the show this week to discuss her recent findings and hacktivists&apos; trends around using this threat. </p>]]></description>
    <content:encoded><![CDATA[<p>You may think a DDoS attack is so early aughts. But some of the largest attacks of this type have occurred in just the past few years. Talos recently updated our advice for how to best mitigate and prepare for this threat, so Aliza Johnson from Talos&apos; Threat Intelligence &amp; Interdiction team joins the show this week to discuss her recent findings and hacktivists&apos; trends around using this threat. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15283954-everything-we-know-about-denial-of-service-attacks-in-2024.mp3" length="7387673" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15283954</guid>
    <pubDate>Fri, 21 Jun 2024 04:00:00 -0400</pubDate>
    <itunes:duration>610</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>188</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The many shades of LilacSquid</itunes:title>
    <title>The many shades of LilacSquid</title>
    <itunes:summary><![CDATA[Anna Bennett, one of Talos' threat hunters, joins the show this week to talk about one of her recent findings — the LilacSquid APT. This is a newly discovered threat actor that Talos found hiding on networks for months and years at a time, silently stealing sensitive information the entire time. Anna discusses LilacSquid's activities, potential motivations, and how they overlap with North Korean APTs. ]]></itunes:summary>
    <description><![CDATA[<p>Anna Bennett, one of Talos&apos; threat hunters, joins the show this week to talk about one of her recent findings — <a href='https://blog.talosintelligence.com/lilacsquid/'>the LilacSquid APT</a>. This is a newly discovered threat actor that Talos found hiding on networks for months and years at a time, silently stealing sensitive information the entire time. Anna discusses LilacSquid&apos;s activities, potential motivations, and how they overlap with North Korean APTs. </p>]]></description>
    <content:encoded><![CDATA[<p>Anna Bennett, one of Talos&apos; threat hunters, joins the show this week to talk about one of her recent findings — <a href='https://blog.talosintelligence.com/lilacsquid/'>the LilacSquid APT</a>. This is a newly discovered threat actor that Talos found hiding on networks for months and years at a time, silently stealing sensitive information the entire time. Anna discusses LilacSquid&apos;s activities, potential motivations, and how they overlap with North Korean APTs. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15246340-the-many-shades-of-lilacsquid.mp3" length="7267623" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15246340</guid>
    <pubDate>Fri, 14 Jun 2024 04:00:00 -0400</pubDate>
    <itunes:duration>600</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>187</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A mid-year checkin on Volt Typhoon</itunes:title>
    <title>A mid-year checkin on Volt Typhoon</title>
    <itunes:summary><![CDATA[The Volt Typhoon threat actor is one of the longest-running cybersecurity storylines this year. The Chinese state-sponsored actor has already been accused of a range of attacks, specifically targeting critical infrastructure and U.S. military bases. Since it's been a few months without any new developments with this group, we thought it'd be a good idea to check in with Talos' Threat Intelligence and Interdiction team on what's going on with this actor, and if they're up to anything new. ]]></itunes:summary>
    <description><![CDATA[<p>The <a href='https://beerswithtalos.talosintelligence.com/2033817/14552585'>Volt Typhoon threat actor</a> is one of the longest-running cybersecurity storylines this year. The Chinese state-sponsored actor has already been accused of a range of attacks, specifically targeting <a href='https://therecord.media/cisco-routers-end-of-life-china-espionage-volt-typhoon'>critical infrastructure</a> and <a href='https://www.darkreading.com/vulnerabilities-threats/china-s-volt-typhoon-apt-burrows-us-critical-infrastructure'>U.S. military bases</a>. Since it&apos;s been a few months without any new developments with this group, we thought it&apos;d be a good idea to check in with Talos&apos; Threat Intelligence and Interdiction team on what&apos;s going on with this actor, and if they&apos;re up to anything new. </p>]]></description>
    <content:encoded><![CDATA[<p>The <a href='https://beerswithtalos.talosintelligence.com/2033817/14552585'>Volt Typhoon threat actor</a> is one of the longest-running cybersecurity storylines this year. The Chinese state-sponsored actor has already been accused of a range of attacks, specifically targeting <a href='https://therecord.media/cisco-routers-end-of-life-china-espionage-volt-typhoon'>critical infrastructure</a> and <a href='https://www.darkreading.com/vulnerabilities-threats/china-s-volt-typhoon-apt-burrows-us-critical-infrastructure'>U.S. military bases</a>. Since it&apos;s been a few months without any new developments with this group, we thought it&apos;d be a good idea to check in with Talos&apos; Threat Intelligence and Interdiction team on what&apos;s going on with this actor, and if they&apos;re up to anything new. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15197778-a-mid-year-checkin-on-volt-typhoon.mp3" length="8227790" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15197778</guid>
    <pubDate>Fri, 07 Jun 2024 04:00:00 -0400</pubDate>
    <itunes:duration>680</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>186</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How much has AI helped bad actors who spread disinformation?</itunes:title>
    <title>How much has AI helped bad actors who spread disinformation?</title>
    <itunes:summary><![CDATA[Inspired by his quotes in a recent CNBC article, Jon Munshaw wanted to have Martin Lee on the show this week to discuss AI and how adversaries can use these tools to create deepfakes and disinformation. Martin shares why he thinks the threats of increasing fake news with the advent of AI tools are a bit overblown, and how the dangers in spreading fake news come more from text-based posts than any deepfake video or audio. If you'd like to learn more about how to detect potential deepfake video...]]></itunes:summary>
    <description><![CDATA[<p>Inspired by his quotes in a recent CNBC article, Jon Munshaw wanted to have Martin Lee on the show this week to discuss AI and how adversaries can use these tools to create deepfakes and disinformation. Martin shares why he thinks the threats of increasing fake news with the advent of AI tools are a bit overblown, and how the dangers in spreading fake news come more from text-based posts than any deepfake video or audio. If you&apos;d like to learn more about how to detect potential deepfake videos or fake news articles, check out the additional resources <a href='https://www.media.mit.edu/projects/detect-fakes/overview/'>here</a> and <a href='https://utopia.ut.edu/FakeNews/factcheck'>here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Inspired by his quotes in a recent CNBC article, Jon Munshaw wanted to have Martin Lee on the show this week to discuss AI and how adversaries can use these tools to create deepfakes and disinformation. Martin shares why he thinks the threats of increasing fake news with the advent of AI tools are a bit overblown, and how the dangers in spreading fake news come more from text-based posts than any deepfake video or audio. If you&apos;d like to learn more about how to detect potential deepfake videos or fake news articles, check out the additional resources <a href='https://www.media.mit.edu/projects/detect-fakes/overview/'>here</a> and <a href='https://utopia.ut.edu/FakeNews/factcheck'>here</a>.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15165250-how-much-has-ai-helped-bad-actors-who-spread-disinformation.mp3" length="13987842" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15165250</guid>
    <pubDate>Fri, 31 May 2024 04:00:00 -0400</pubDate>
    <itunes:duration>1160</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>185</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Recapping RSA</itunes:title>
    <title>Recapping RSA</title>
    <itunes:summary><![CDATA[Nicole Hoffman, fresh off her trip to the RSA Conference, joins host Jon Munshaw this week to talk about her major takeaways from the week in San Francisco. Nicole talks about how most of the discussions on the floor centered around AI, and what lessons other defenders are learning from some of our past mistakes. If you'd like to check out Nicole's other work, buy her children's cybersecurity books on Amazon. ]]></itunes:summary>
    <description><![CDATA[<p>Nicole Hoffman, fresh off her trip to the RSA Conference, joins host Jon Munshaw this week to talk about her major takeaways from the week in San Francisco. Nicole talks about how most of the discussions on the floor centered around AI, and what lessons other defenders are learning from some of our past mistakes. If you&apos;d like to check out Nicole&apos;s other work, buy her <a href='https://www.amazon.com/Mighty-Reverse-Engineer-Nicole-Hoffman/dp/B0D2L7M96W/ref=sr_1_1?crid=2TB1IXCR5XJ1B&amp;dib=eyJ2IjoiMSJ9.W0EO9VKAtdYq9FAR8wR9HxNJSUObEvfawTiXe3jidtGgSheVF7LdaqEc77kUHUSqSt4oO9mv8n7UL8VRi5KRt0Nj0GU7W5wWRNr62rWgrHDzUUA23pjgxDx-ZuZvxtul1AxWgoChnygNoHib-OEqdZAMZNlo7AUV5CdtyDw2d8nMpXDDS1v6Cjrco0--3d3q1rhbiqt3YKowo4tyAV6qCIb3gExjLZpxjFjT_BhdSgw.ORkQMgInQtH1iJKPcJlSuz52wAoUu4EY9y5tXmIFAMQ&amp;dib_tag=se&amp;keywords=Nicole+Hoffman&amp;qid=1715879004&amp;sprefix=nicole+hoffman%2Caps%2C151&amp;sr=8-1'>children&apos;s cybersecurity books</a> <a href='https://www.amazon.com/Mighty-Threat-Intelligence-Warrior-Jaspers/dp/B0BMJVZ4KH/ref=sr_1_2?crid=2TB1IXCR5XJ1B&amp;dib=eyJ2IjoiMSJ9.W0EO9VKAtdYq9FAR8wR9HxNJSUObEvfawTiXe3jidtGgSheVF7LdaqEc77kUHUSqSt4oO9mv8n7UL8VRi5KRt0Nj0GU7W5wWRNr62rWgrHDzUUA23pjgxDx-ZuZvxtul1AxWgoChnygNoHib-OEqdZAMZNlo7AUV5CdtyDw2d8nMpXDDS1v6Cjrco0--3d3q1rhbiqt3YKowo4tyAV6qCIb3gExjLZpxjFjT_BhdSgw.ORkQMgInQtH1iJKPcJlSuz52wAoUu4EY9y5tXmIFAMQ&amp;dib_tag=se&amp;keywords=Nicole+Hoffman&amp;qid=1715879004&amp;sprefix=nicole+hoffman%2Caps%2C151&amp;sr=8-2'>on Amazon</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Nicole Hoffman, fresh off her trip to the RSA Conference, joins host Jon Munshaw this week to talk about her major takeaways from the week in San Francisco. Nicole talks about how most of the discussions on the floor centered around AI, and what lessons other defenders are learning from some of our past mistakes. If you&apos;d like to check out Nicole&apos;s other work, buy her <a href='https://www.amazon.com/Mighty-Reverse-Engineer-Nicole-Hoffman/dp/B0D2L7M96W/ref=sr_1_1?crid=2TB1IXCR5XJ1B&amp;dib=eyJ2IjoiMSJ9.W0EO9VKAtdYq9FAR8wR9HxNJSUObEvfawTiXe3jidtGgSheVF7LdaqEc77kUHUSqSt4oO9mv8n7UL8VRi5KRt0Nj0GU7W5wWRNr62rWgrHDzUUA23pjgxDx-ZuZvxtul1AxWgoChnygNoHib-OEqdZAMZNlo7AUV5CdtyDw2d8nMpXDDS1v6Cjrco0--3d3q1rhbiqt3YKowo4tyAV6qCIb3gExjLZpxjFjT_BhdSgw.ORkQMgInQtH1iJKPcJlSuz52wAoUu4EY9y5tXmIFAMQ&amp;dib_tag=se&amp;keywords=Nicole+Hoffman&amp;qid=1715879004&amp;sprefix=nicole+hoffman%2Caps%2C151&amp;sr=8-1'>children&apos;s cybersecurity books</a> <a href='https://www.amazon.com/Mighty-Threat-Intelligence-Warrior-Jaspers/dp/B0BMJVZ4KH/ref=sr_1_2?crid=2TB1IXCR5XJ1B&amp;dib=eyJ2IjoiMSJ9.W0EO9VKAtdYq9FAR8wR9HxNJSUObEvfawTiXe3jidtGgSheVF7LdaqEc77kUHUSqSt4oO9mv8n7UL8VRi5KRt0Nj0GU7W5wWRNr62rWgrHDzUUA23pjgxDx-ZuZvxtul1AxWgoChnygNoHib-OEqdZAMZNlo7AUV5CdtyDw2d8nMpXDDS1v6Cjrco0--3d3q1rhbiqt3YKowo4tyAV6qCIb3gExjLZpxjFjT_BhdSgw.ORkQMgInQtH1iJKPcJlSuz52wAoUu4EY9y5tXmIFAMQ&amp;dib_tag=se&amp;keywords=Nicole+Hoffman&amp;qid=1715879004&amp;sprefix=nicole+hoffman%2Caps%2C151&amp;sr=8-2'>on Amazon</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15081791-recapping-rsa.mp3" length="8893557" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15081791</guid>
    <pubDate>Fri, 17 May 2024 04:00:00 -0400</pubDate>
    <itunes:duration>735</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>184</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why CoralRaider is looking to steal your login credentials</itunes:title>
    <title>Why CoralRaider is looking to steal your login credentials</title>
    <itunes:summary><![CDATA[Joey Chen from Talos' Outreach team is here to tell us all about his research into the CoralRaider threat actor. He's helped write two posts on the recently discovered APT, disclosing new information about how this Vietnamese-based actor is targeting login credentials. After stealing those credentials, they go on to try and sell them on the dark web, or use them to try and brute force their way into more important accounts. Joey discusses what this actor is really after, and why they've been ...]]></itunes:summary>
    <description><![CDATA[<p>Joey Chen from Talos&apos; Outreach team is here to tell us all about his research into the CoralRaider threat actor. He&apos;s <a href='https://blog.talosintelligence.com/coralraider-targets-socialmedia-accounts/'>helped write two posts</a> on the recently discovered APT, disclosing new information about how this Vietnamese-based actor is targeting login credentials. After stealing those credentials, they go on to try and sell them on the dark web, or use them to try and brute force their way into more important accounts. Joey discusses what this actor is really after, and <a href='https://blog.talosintelligence.com/suspected-coralraider-continues-to-expand-victimology-using-three-information-stealers/'>why they&apos;ve been growing so quickly</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Joey Chen from Talos&apos; Outreach team is here to tell us all about his research into the CoralRaider threat actor. He&apos;s <a href='https://blog.talosintelligence.com/coralraider-targets-socialmedia-accounts/'>helped write two posts</a> on the recently discovered APT, disclosing new information about how this Vietnamese-based actor is targeting login credentials. After stealing those credentials, they go on to try and sell them on the dark web, or use them to try and brute force their way into more important accounts. Joey discusses what this actor is really after, and <a href='https://blog.talosintelligence.com/suspected-coralraider-continues-to-expand-victimology-using-three-information-stealers/'>why they&apos;ve been growing so quickly</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/15041600-why-coralraider-is-looking-to-steal-your-login-credentials.mp3" length="4936096" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-15041600</guid>
    <pubDate>Fri, 10 May 2024 04:00:00 -0400</pubDate>
    <itunes:duration>405</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>183</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>4 takeaways from what Talos IR is seeing in the field</itunes:title>
    <title>4 takeaways from what Talos IR is seeing in the field</title>
    <itunes:summary><![CDATA[Hazel Burton steps in to host this week's episode as we cover the recent Cisco Talos Incident Response Quarterly Trends Report from the first quarter of this year. Hazel talks to different Talosians to find out why business email compromise is on the rise, how attackers are bypassing MFA, and more. ]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton steps in to host this week&apos;s episode as we cover the recent <a href='https://blog.talosintelligence.com/talos-ir-quarterly-trends-q1-2024/'>Cisco Talos Incident Response Quarterly Trends Report</a> from the first quarter of this year. Hazel talks to different Talosians to find out why business email compromise is on the rise, how attackers are bypassing MFA, and more. </p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton steps in to host this week&apos;s episode as we cover the recent <a href='https://blog.talosintelligence.com/talos-ir-quarterly-trends-q1-2024/'>Cisco Talos Incident Response Quarterly Trends Report</a> from the first quarter of this year. Hazel talks to different Talosians to find out why business email compromise is on the rise, how attackers are bypassing MFA, and more. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14998535-4-takeaways-from-what-talos-ir-is-seeing-in-the-field.mp3" length="10327759" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14998535</guid>
    <pubDate>Fri, 03 May 2024 04:00:00 -0400</pubDate>
    <itunes:duration>855</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>182</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to defend against brute force attacks</itunes:title>
    <title>How to defend against brute force attacks</title>
    <itunes:summary><![CDATA[After a recent spike in brute force attempts targeting SSH and VPN services, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just take passwords out of the equation entirely). ]]></itunes:summary>
    <description><![CDATA[<p>After a recent <a href='https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/'>spike in brute force attempts targeting SSH and VPN services</a>, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just take passwords out of the equation entirely). </p>]]></description>
    <content:encoded><![CDATA[<p>After a recent <a href='https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/'>spike in brute force attempts targeting SSH and VPN services</a>, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just take passwords out of the equation entirely). </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14956921-how-to-defend-against-brute-force-attacks.mp3" length="5473348" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14956921</guid>
    <pubDate>Fri, 26 Apr 2024 04:00:00 -0400</pubDate>
    <itunes:duration>450</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>181</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What are the dangers of enabling sideloading and third-party apps?</itunes:title>
    <title>What are the dangers of enabling sideloading and third-party apps?</title>
    <itunes:summary><![CDATA[Apple now must allow users to be able to sideload apps onto their phones or access third-party app stores, thanks to a law from the European Union that went into effect earlier this year. Terryn Valikodath from Cisco Talos Incident Response joins Jon this week to discuss the potential dangers that come with allowing users to sideload apps onto their devices, and how attackers may take advantage of this new opening. ]]></itunes:summary>
    <description><![CDATA[<p>Apple now must allow users to be able to sideload apps onto their phones or access third-party app stores, thanks to <a href='https://www.theverge.com/2024/1/25/24050200/apple-third-party-app-stores-allowed-iphone-ios-europe-digital-markets-act'>a law from the European Union</a> that went into effect earlier this year. Terryn Valikodath from Cisco Talos Incident Response joins Jon this week to discuss the potential dangers that come with allowing users to sideload apps onto their devices, and how attackers may take advantage of this new opening. </p>]]></description>
    <content:encoded><![CDATA[<p>Apple now must allow users to be able to sideload apps onto their phones or access third-party app stores, thanks to <a href='https://www.theverge.com/2024/1/25/24050200/apple-third-party-app-stores-allowed-iphone-ios-europe-digital-markets-act'>a law from the European Union</a> that went into effect earlier this year. Terryn Valikodath from Cisco Talos Incident Response joins Jon this week to discuss the potential dangers that come with allowing users to sideload apps onto their devices, and how attackers may take advantage of this new opening. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14913975-what-are-the-dangers-of-enabling-sideloading-and-third-party-apps.mp3" length="7564866" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14913975</guid>
    <pubDate>Fri, 19 Apr 2024 04:00:00 -0400</pubDate>
    <itunes:duration>624</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>180</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why we need to stop calling as-a-service group takedowns &quot;takedowns&quot;</itunes:title>
    <title>Why we need to stop calling as-a-service group takedowns &quot;takedowns&quot;</title>
    <itunes:summary><![CDATA[Hazel Burton and Thorsten Rosendahl join Jon Munshaw on this week's episode to discuss the problem with threat actor "hydras." They recently wrote about the topic for the Talos blog, highlighting how law enforcement takedowns of these groups are closer to just disruptions or setbacks for these massive actors. They talk about what really needs to be done to stop ransomware actors and why RaaS is a breeding ground for "hydras."]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton and Thorsten Rosendahl join Jon Munshaw on this week&apos;s episode to discuss the problem with threat actor &quot;hydras.&quot; They <a href='https://blog.talosintelligence.com/ransomware-affiliate-model/'>recently wrote about the topic</a> for the Talos blog, highlighting how law enforcement takedowns of these groups are closer to just disruptions or setbacks for these massive actors. They talk about what really needs to be done to stop ransomware actors and why RaaS is a breeding ground for &quot;hydras.&quot;</p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton and Thorsten Rosendahl join Jon Munshaw on this week&apos;s episode to discuss the problem with threat actor &quot;hydras.&quot; They <a href='https://blog.talosintelligence.com/ransomware-affiliate-model/'>recently wrote about the topic</a> for the Talos blog, highlighting how law enforcement takedowns of these groups are closer to just disruptions or setbacks for these massive actors. They talk about what really needs to be done to stop ransomware actors and why RaaS is a breeding ground for &quot;hydras.&quot;</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14871755-why-we-need-to-stop-calling-as-a-service-group-takedowns-takedowns.mp3" length="8947897" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14871755</guid>
    <pubDate>Fri, 12 Apr 2024 04:00:00 -0400</pubDate>
    <itunes:duration>740</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>179</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Turla has been around for 20-plus years at this point, but they&#39;re still mixing things up</itunes:title>
    <title>Turla has been around for 20-plus years at this point, but they&#39;re still mixing things up</title>
    <itunes:summary><![CDATA[Holger Unterbrink of Talos Outreach joins the show this week to discuss his recent Turla APT research. This Russian state-sponsored actor has been around for years but is regularly adding new tooling to its arsenal. Holger has new details about their latest tool, TinyTurlaNG, and insight into the types of organizations they're targeting.]]></itunes:summary>
    <description><![CDATA[<p>Holger Unterbrink of Talos Outreach joins the show this week to discuss his recent <a href='https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2/'>Turla APT research</a>. This Russian state-sponsored actor has been around for years but is regularly adding new tooling to its arsenal. Holger has <a href='https://blog.talosintelligence.com/tinyturla-full-kill-chain/'>new details</a> about their latest tool, <a href='https://blog.talosintelligence.com/tinyturla-next-generation/'>TinyTurlaNG</a>, and insight into the types of organizations they&apos;re targeting.</p>]]></description>
    <content:encoded><![CDATA[<p>Holger Unterbrink of Talos Outreach joins the show this week to discuss his recent <a href='https://blog.talosintelligence.com/tinyturla-ng-tooling-and-c2/'>Turla APT research</a>. This Russian state-sponsored actor has been around for years but is regularly adding new tooling to its arsenal. Holger has <a href='https://blog.talosintelligence.com/tinyturla-full-kill-chain/'>new details</a> about their latest tool, <a href='https://blog.talosintelligence.com/tinyturla-next-generation/'>TinyTurlaNG</a>, and insight into the types of organizations they&apos;re targeting.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14828941-turla-has-been-around-for-20-plus-years-at-this-point-but-they-re-still-mixing-things-up.mp3" length="6608445" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14828941</guid>
    <pubDate>Fri, 05 Apr 2024 04:00:00 -0400</pubDate>
    <itunes:duration>544</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>178</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why more actors are starting to use Telegram for their communications</itunes:title>
    <title>Why more actors are starting to use Telegram for their communications</title>
    <itunes:summary><![CDATA[Jon started noticing that Talos is finding more threat actors using Telegram nowadays for their communication and coordination, so he decided to bring Azim Khodjibaev on to ask him if he was just inventing this, or if it was a real trend. Turns out it's a real trend! Azim fills listeners in on why Telegram is becoming the app of choice for APTs to publish "news," threaten data leaks, and more. ]]></itunes:summary>
    <description><![CDATA[<p>Jon started noticing that Talos is finding more threat actors using Telegram nowadays for their communication and coordination, so he decided to bring Azim Khodjibaev on to ask him if he was just inventing this, or if it was a real trend. Turns out it&apos;s a real trend! Azim fills listeners in on why Telegram is becoming the app of choice for APTs to publish &quot;news,&quot; threaten data leaks, and more. </p>]]></description>
    <content:encoded><![CDATA[<p>Jon started noticing that Talos is finding more threat actors using Telegram nowadays for their communication and coordination, so he decided to bring Azim Khodjibaev on to ask him if he was just inventing this, or if it was a real trend. Turns out it&apos;s a real trend! Azim fills listeners in on why Telegram is becoming the app of choice for APTs to publish &quot;news,&quot; threaten data leaks, and more. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14737004-why-more-actors-are-starting-to-use-telegram-for-their-communications.mp3" length="7577339" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14737004</guid>
    <pubDate>Fri, 22 Mar 2024 04:00:00 -0400</pubDate>
    <itunes:duration>625</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>177</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why no one should be relying on passive security in 2024</itunes:title>
    <title>Why no one should be relying on passive security in 2024</title>
    <itunes:summary><![CDATA[Nick Biasini joins Jon this week to talk about passive security. He recently wrote about this topic for the Talos blog and joined Wendy Nather in discussing the merits of passive security versus active blocking. Nick defines what passive security is, exactly, and why it's not the way to go in the modern age. ]]></itunes:summary>
    <description><![CDATA[<p>Nick Biasini joins Jon this week to talk about passive security. He recently wrote about <a href='https://blog.talosintelligence.com/stop-running-security-in-passive-mode/'>this topic for the Talos blog </a>and <a href='https://www.sdxcentral.com/articles/feature/cisco-leaders-debate-active-vs-passive-security/2024/02/'>joined Wendy Nather in discussing</a> the merits of passive security versus active blocking. Nick defines what passive security is, exactly, and why it&apos;s not the way to go in the modern age. </p>]]></description>
    <content:encoded><![CDATA[<p>Nick Biasini joins Jon this week to talk about passive security. He recently wrote about <a href='https://blog.talosintelligence.com/stop-running-security-in-passive-mode/'>this topic for the Talos blog </a>and <a href='https://www.sdxcentral.com/articles/feature/cisco-leaders-debate-active-vs-passive-security/2024/02/'>joined Wendy Nather in discussing</a> the merits of passive security versus active blocking. Nick defines what passive security is, exactly, and why it&apos;s not the way to go in the modern age. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14691854-why-no-one-should-be-relying-on-passive-security-in-2024.mp3" length="6042880" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14691854</guid>
    <pubDate>Fri, 15 Mar 2024 04:00:00 -0400</pubDate>
    <itunes:duration>497</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>176</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What&#39;s new about GhostSec&#39;s ransomware-as-a-service model</itunes:title>
    <title>What&#39;s new about GhostSec&#39;s ransomware-as-a-service model</title>
    <itunes:summary><![CDATA[Chetan Raghuprasad from the Talos Outreach team joins Talos Takes this week to talk to Jon about the GhostSec threat actor that he and a few colleagues wrote about for the Talos blog. GhostSec has teamed up with another ransomware group to carry out double extortion attacks all over the globe, with increasing frequency over the past year. They discuss what's unique about this particular RaaS model, where GhostSec came from, and the benefits of going in on a team-up. ]]></itunes:summary>
    <description><![CDATA[<p>Chetan Raghuprasad from the Talos Outreach team joins Talos Takes this week to talk to Jon about the GhostSec threat actor that he and a few colleagues wrote about for the Talos blog. GhostSec has teamed up with another ransomware group to carry out double extortion attacks all over the globe, with increasing frequency over the past year. They discuss what&apos;s unique about this particular RaaS model, where GhostSec came from, and the benefits of going in on a team-up. </p>]]></description>
    <content:encoded><![CDATA[<p>Chetan Raghuprasad from the Talos Outreach team joins Talos Takes this week to talk to Jon about the GhostSec threat actor that he and a few colleagues wrote about for the Talos blog. GhostSec has teamed up with another ransomware group to carry out double extortion attacks all over the globe, with increasing frequency over the past year. They discuss what&apos;s unique about this particular RaaS model, where GhostSec came from, and the benefits of going in on a team-up. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14646742-what-s-new-about-ghostsec-s-ransomware-as-a-service-model.mp3" length="8792322" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14646742</guid>
    <pubDate>Fri, 08 Mar 2024 04:00:00 -0500</pubDate>
    <itunes:duration>726</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>175</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why are &quot;identity attacks&quot; on the rise?</itunes:title>
    <title>Why are &quot;identity attacks&quot; on the rise?</title>
    <itunes:summary><![CDATA[Now more than ever, adversaries are logging in, not breaking in. They're stealing legitimate user credentials to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how QR code phishing plays into these tactics. ]]></itunes:summary>
    <description><![CDATA[<p>Now more than ever, adversaries are logging in, not breaking in. They&apos;re <a href='https://blog.talosintelligence.com/how-are-user-credentials-stolen-and-used-by-threat-actors/'>stealing legitimate user credentials</a> to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how <a href='https://blog.talosintelligence.com/how-are-attackers-using-qr-codes-in-phishing-emails-and-lure-documents/'>QR code phishing</a> plays into these tactics. </p>]]></description>
    <content:encoded><![CDATA[<p>Now more than ever, adversaries are logging in, not breaking in. They&apos;re <a href='https://blog.talosintelligence.com/how-are-user-credentials-stolen-and-used-by-threat-actors/'>stealing legitimate user credentials</a> to hide undetected on a targeted network after acquiring said credentials in a variety of ways. Hazel Burton joins Jon Munshaw this week to discuss identity attacks, recommendations for avoiding them, and how <a href='https://blog.talosintelligence.com/how-are-attackers-using-qr-codes-in-phishing-emails-and-lure-documents/'>QR code phishing</a> plays into these tactics. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14601396-why-are-identity-attacks-on-the-rise.mp3" length="8350295" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14601396</guid>
    <pubDate>Fri, 01 Mar 2024 04:00:00 -0500</pubDate>
    <itunes:duration>689</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>174</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The tl;dr of NIS2</itunes:title>
    <title>The tl;dr of NIS2</title>
    <itunes:summary><![CDATA[Gergana Karadzhova-Dangela and Thorsten Rosendahl, our resident experts on all things European Union cybersecurity law, join the show this week to talk about the impending NIS2 regulations. Don't worry, you've still got plenty of time to work on them, but this is a good place to get started even if you've never seen the phrase "NIS2" before. Find more of their writing on NIS2 here and here. ]]></itunes:summary>
    <description><![CDATA[<p>Gergana Karadzhova-Dangela and Thorsten Rosendahl, our resident experts on all things European Union cybersecurity law, join the show this week to talk about the impending NIS2 regulations. Don&apos;t worry, you&apos;ve still got plenty of time to work on them, but this is a good place to get started even if you&apos;ve never seen the phrase &quot;NIS2&quot; before. Find more of their writing on NIS2 <a href='https://blog.talosintelligence.com/what-is-nis2-and-how-can-you-best-prepare-for-the-new-cybersecurity-requirements-in-the-eu/'>here</a> and <a href='https://blog.talosintelligence.com/seven-common-mistakes-companies-make-when-creating-an-incident-response-plan-and-how-to-avoid-them/'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>Gergana Karadzhova-Dangela and Thorsten Rosendahl, our resident experts on all things European Union cybersecurity law, join the show this week to talk about the impending NIS2 regulations. Don&apos;t worry, you&apos;ve still got plenty of time to work on them, but this is a good place to get started even if you&apos;ve never seen the phrase &quot;NIS2&quot; before. Find more of their writing on NIS2 <a href='https://blog.talosintelligence.com/what-is-nis2-and-how-can-you-best-prepare-for-the-new-cybersecurity-requirements-in-the-eu/'>here</a> and <a href='https://blog.talosintelligence.com/seven-common-mistakes-companies-make-when-creating-an-incident-response-plan-and-how-to-avoid-them/'>here</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14556495-the-tl-dr-of-nis2.mp3" length="10227932" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14556495</guid>
    <pubDate>Fri, 23 Feb 2024 04:00:00 -0500</pubDate>
    <itunes:duration>845</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>173</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Case study: How Talos IR helped a healthcare tech company avoid a ransomware attack</itunes:title>
    <title>Case study: How Talos IR helped a healthcare tech company avoid a ransomware attack</title>
    <itunes:summary><![CDATA[Reposted from the Cisco Security Stories feed: Meet Jeremy Maxwell, CISO of Veradigm, a healthcare IT company. Jeremy discusses how his organization proactively prepares for cybersecurity incidents within a highly regulated industry.]]></itunes:summary>
    <description><![CDATA[<p>Reposted from the Cisco Security Stories feed: Meet Jeremy Maxwell, CISO of Veradigm, a healthcare IT company. Jeremy discusses how his organization proactively prepares for cybersecurity incidents within a highly regulated industry.</p>]]></description>
    <content:encoded><![CDATA[<p>Reposted from the Cisco Security Stories feed: Meet Jeremy Maxwell, CISO of Veradigm, a healthcare IT company. Jeremy discusses how his organization proactively prepares for cybersecurity incidents within a highly regulated industry.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14515959-case-study-how-talos-ir-helped-a-healthcare-tech-company-avoid-a-ransomware-attack.mp3" length="35608356" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14515959</guid>
    <pubDate>Fri, 16 Feb 2024 09:00:00 -0500</pubDate>
    <itunes:duration>2960</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>172</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How are attackers using malicious drivers in Windows to stay undetected?</itunes:title>
    <title>How are attackers using malicious drivers in Windows to stay undetected?</title>
    <itunes:summary><![CDATA[Chris Neal from Talos Outreach joins the show today to talk about his research into the ways adversaries are using malicious drivers on Windows to spread malware. He recently launched a new series on the Talos blog about the basics of drivers and how security researchers can reverse engineer them to learn more about attacker TTPs and develop new detection content. Chris discusses when he first spotted this type of attack, what advantages it presents for the attacker and the other aspects of t...]]></itunes:summary>
    <description><![CDATA[<p>Chris Neal from Talos Outreach joins the show today to talk about his research into the <a href='https://blog.talosintelligence.com/undocumented-reddriver/'>ways adversaries are using malicious drivers on Windows</a> to spread malware. He recently launched a <a href='https://blog.talosintelligence.com/exploring-malicious-windows-drivers-part-1-introduction-to-the-kernel-and-drivers/'>new series on the Talos blog</a> about the basics of drivers and how security researchers can reverse engineer them to learn more about attacker TTPs and develop new detection content. Chris discusses when he first spotted this type of attack, what advantages it presents for the attacker and the other aspects of the research he plans to dive into.</p>]]></description>
    <content:encoded><![CDATA[<p>Chris Neal from Talos Outreach joins the show today to talk about his research into the <a href='https://blog.talosintelligence.com/undocumented-reddriver/'>ways adversaries are using malicious drivers on Windows</a> to spread malware. He recently launched a <a href='https://blog.talosintelligence.com/exploring-malicious-windows-drivers-part-1-introduction-to-the-kernel-and-drivers/'>new series on the Talos blog</a> about the basics of drivers and how security researchers can reverse engineer them to learn more about attacker TTPs and develop new detection content. Chris discusses when he first spotted this type of attack, what advantages it presents for the attacker and the other aspects of the research he plans to dive into.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14423280-how-are-attackers-using-malicious-drivers-in-windows-to-stay-undetected.mp3" length="8430922" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14423280</guid>
    <pubDate>Fri, 02 Feb 2024 04:00:00 -0500</pubDate>
    <itunes:duration>696</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>171</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>(XL Edition): Talos IR recaps the top threats of Q4 2023</itunes:title>
    <title>(XL Edition): Talos IR recaps the top threats of Q4 2023</title>
    <itunes:summary><![CDATA[This week, we're bringing you the audio version of our recent Talos IR On Air video. Several Talos incident responders got together to recap the top threats and attacker trends of Q4 2023, as outlined in our full Quarterly Trends Report. Hear about why ransomware was up for the first time the entire year, and which sectors were being targeted most often. ]]></itunes:summary>
    <description><![CDATA[<p>This week, we&apos;re bringing you the audio version of our recent Talos IR On Air video. Several Talos incident responders got together to recap the top threats and attacker trends of Q4 2023, as outlined in our full Quarterly Trends Report. Hear about why ransomware was up for the first time the entire year, and which sectors were being targeted most often. </p>]]></description>
    <content:encoded><![CDATA[<p>This week, we&apos;re bringing you the audio version of our recent Talos IR On Air video. Several Talos incident responders got together to recap the top threats and attacker trends of Q4 2023, as outlined in our full Quarterly Trends Report. Hear about why ransomware was up for the first time the entire year, and which sectors were being targeted most often. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14378310-xl-edition-talos-ir-recaps-the-top-threats-of-q4-2023.mp3" length="12542668" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14378310</guid>
    <pubDate>Fri, 26 Jan 2024 04:00:00 -0500</pubDate>
    <itunes:duration>1038</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>170</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What&#39;s new with CVSS 4.0, and does it really change anything?</itunes:title>
    <title>What&#39;s new with CVSS 4.0, and does it really change anything?</title>
    <itunes:summary><![CDATA[We're talking about vulnerabilities this week with Jerry Gamblin from Cisco Vulnerability Management. Jerry joins the show to talk about the release of CVSS 4.0 this year — the newest method the security community will use to score the severity of certain vulnerabilities. Jerry discusses what makes this scoring system different from previous iterations if it changes how he views the term "severe" and how that fits into Cisco's overall vulnerability management processes. ]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re talking about vulnerabilities this week with Jerry Gamblin from <a href='https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html'>Cisco Vulnerability Management</a>. Jerry joins the show to talk about the release of <a href='https://www.first.org/cvss/v4-0/'>CVSS 4.0</a> this year — the newest method the security community will use to score the severity of certain vulnerabilities. Jerry discusses what makes this scoring system different from previous iterations if it changes how he views the term &quot;severe&quot; and how that fits into Cisco&apos;s overall vulnerability management processes. </p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re talking about vulnerabilities this week with Jerry Gamblin from <a href='https://www.cisco.com/site/us/en/products/security/vulnerability-management/index.html'>Cisco Vulnerability Management</a>. Jerry joins the show to talk about the release of <a href='https://www.first.org/cvss/v4-0/'>CVSS 4.0</a> this year — the newest method the security community will use to score the severity of certain vulnerabilities. Jerry discusses what makes this scoring system different from previous iterations if it changes how he views the term &quot;severe&quot; and how that fits into Cisco&apos;s overall vulnerability management processes. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14334877-what-s-new-with-cvss-4-0-and-does-it-really-change-anything.mp3" length="6913081" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14334877</guid>
    <pubDate>Fri, 19 Jan 2024 04:00:00 -0500</pubDate>
    <itunes:duration>569</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>169</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>XL Edition: Talos&#39; 2023 Year in Review</itunes:title>
    <title>XL Edition: Talos&#39; 2023 Year in Review</title>
    <itunes:summary><![CDATA[In this special edition of the show, we're bringing you the audio version of our Year in Review livestream. Recorded at the end of December, this stream included Hazel Burton, Nick Biasini and Laurie Varner from Cisco Talos Incident Response recapping the year that was in cybersecurity. They covered the highlights of our 2023 Year in Review report, their personal takeaways from the past year, and trends to watch for heading into the new year.]]></itunes:summary>
    <description><![CDATA[<p>In this special edition of the show, we&apos;re bringing you the audio version of our Year in Review livestream. Recorded at the end of December, this stream included Hazel Burton, Nick Biasini and Laurie Varner from Cisco Talos Incident Response recapping the year that was in cybersecurity. They covered the highlights of our <a href='https://blog.talosintelligence.com/2023-year-in-review/'>2023 Year in Review report</a>, their personal takeaways from the past year, and trends to watch for heading into the new year.</p>]]></description>
    <content:encoded><![CDATA[<p>In this special edition of the show, we&apos;re bringing you the audio version of our Year in Review livestream. Recorded at the end of December, this stream included Hazel Burton, Nick Biasini and Laurie Varner from Cisco Talos Incident Response recapping the year that was in cybersecurity. They covered the highlights of our <a href='https://blog.talosintelligence.com/2023-year-in-review/'>2023 Year in Review report</a>, their personal takeaways from the past year, and trends to watch for heading into the new year.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14292397-xl-edition-talos-2023-year-in-review.mp3" length="25177956" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14292397</guid>
    <pubDate>Fri, 12 Jan 2024 03:00:00 -0500</pubDate>
    <itunes:duration>2091</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>168</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Year in Review: Why are attackers targeting the telecommunications sector so often?</itunes:title>
    <title>Year in Review: Why are attackers targeting the telecommunications sector so often?</title>
    <itunes:summary><![CDATA[We're back from holiday break with the first new Talos Takes episode of 2024! We're continuing our dive into Talos' Year in Review report with Lexi DiSchola, one of the many researchers who helped put this report together. She discusses why we believe the telecommunications sector was the most-targeted industry in 2023, advice for companies in that space, and other popular targets for attackers. ]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re back from holiday break with the first new Talos Takes episode of 2024! We&apos;re continuing our dive into <a href='https://blog.talosintelligence.com/2023-year-in-review/'>Talos&apos; Year in Review report</a> with Lexi DiSchola, one of the many researchers who helped put this report together. She discusses why we believe the telecommunications sector was the most-targeted industry in 2023, advice for companies in that space, and other popular targets for attackers. </p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re back from holiday break with the first new Talos Takes episode of 2024! We&apos;re continuing our dive into <a href='https://blog.talosintelligence.com/2023-year-in-review/'>Talos&apos; Year in Review report</a> with Lexi DiSchola, one of the many researchers who helped put this report together. She discusses why we believe the telecommunications sector was the most-targeted industry in 2023, advice for companies in that space, and other popular targets for attackers. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14248718-year-in-review-why-are-attackers-targeting-the-telecommunications-sector-so-often.mp3" length="5477436" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14248718</guid>
    <pubDate>Fri, 05 Jan 2024 04:00:00 -0500</pubDate>
    <itunes:duration>450</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>167</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Year in Review: Why was 2023 the year of data theft extortion?</itunes:title>
    <title>Year in Review: Why was 2023 the year of data theft extortion?</title>
    <itunes:summary><![CDATA[Jon apologizes for how he sounds in this episode, he was having mic troubles we discovered only during post-production. But outside of that, we continue the series of episodes recapping 2023 with our Year in Review report. This week, Aliza Johnson from the Talos Threat Intelligence &amp; Interdiction team comes on the show to talk about data theft extortion. She shares why her team saw such a spike in this type of activity in 2023, what can be done to stop it, and which ransomware actors are ...]]></itunes:summary>
    <description><![CDATA[<p>Jon apologizes for how he sounds in this episode, he was having mic troubles we discovered only during post-production. But outside of that, we continue the series of episodes <a href='https://blog.talosintelligence.com/2023-year-in-review/'>recapping 2023 with our Year in Review report</a>. This week, Aliza Johnson from the Talos Threat Intelligence &amp; Interdiction team comes on the show to talk about <a href='https://talostakes.talosintelligence.com/2018149/13383540'>data theft extortion</a>. She shares why her team saw such a spike in this type of activity in 2023, what can be done to stop it, and which ransomware actors are pivoting to this tactic. </p>]]></description>
    <content:encoded><![CDATA[<p>Jon apologizes for how he sounds in this episode, he was having mic troubles we discovered only during post-production. But outside of that, we continue the series of episodes <a href='https://blog.talosintelligence.com/2023-year-in-review/'>recapping 2023 with our Year in Review report</a>. This week, Aliza Johnson from the Talos Threat Intelligence &amp; Interdiction team comes on the show to talk about <a href='https://talostakes.talosintelligence.com/2018149/13383540'>data theft extortion</a>. She shares why her team saw such a spike in this type of activity in 2023, what can be done to stop it, and which ransomware actors are pivoting to this tactic. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14149300-year-in-review-why-was-2023-the-year-of-data-theft-extortion.mp3" length="6788950" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14149300</guid>
    <pubDate>Fri, 15 Dec 2023 04:00:00 -0500</pubDate>
    <itunes:duration>559</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>166</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>2023 Year in Review: Everything you need to know about Chinese state-sponsored actors</itunes:title>
    <title>2023 Year in Review: Everything you need to know about Chinese state-sponsored actors</title>
    <itunes:summary><![CDATA[To celebrate the launch of our 2023 Year in Review report, we're doing a series of episodes highlighting several of our key takeaways from the past year. First up, we have David Liebenberg from our Threat Intelligence team to discuss Chinese state-sponsored actors. This is an area David's been studying for many years now and actively researches. He'll discuss the latest Chinese APTs to step onto the scene and trends he's seeing from that area of the world. ]]></itunes:summary>
    <description><![CDATA[<p>To celebrate the <a href='https://blog.talosintelligence.com/2023-year-in-review/'>launch of our 2023 Year in Review report</a>, we&apos;re doing a series of episodes highlighting several of our key takeaways from the past year. First up, we have David Liebenberg from our Threat Intelligence team to discuss Chinese state-sponsored actors. This is an area David&apos;s been studying for many years now and actively researches. He&apos;ll discuss the latest Chinese APTs to step onto the scene and trends he&apos;s seeing from that area of the world. </p>]]></description>
    <content:encoded><![CDATA[<p>To celebrate the <a href='https://blog.talosintelligence.com/2023-year-in-review/'>launch of our 2023 Year in Review report</a>, we&apos;re doing a series of episodes highlighting several of our key takeaways from the past year. First up, we have David Liebenberg from our Threat Intelligence team to discuss Chinese state-sponsored actors. This is an area David&apos;s been studying for many years now and actively researches. He&apos;ll discuss the latest Chinese APTs to step onto the scene and trends he&apos;s seeing from that area of the world. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14107994-2023-year-in-review-everything-you-need-to-know-about-chinese-state-sponsored-actors.mp3" length="5837302" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14107994</guid>
    <pubDate>Fri, 08 Dec 2023 04:00:00 -0500</pubDate>
    <itunes:duration>480</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>165</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside Talos&#39; effort to protect the Ukrainian power grid</itunes:title>
    <title>Inside Talos&#39; effort to protect the Ukrainian power grid</title>
    <itunes:summary><![CDATA[Joe Marshall, a central figure in the story of how Cisco Talos and other teams within Cisco worked together to protect the Ukrainian power grid, joins the show this week. He recaps a recent CNN story highlighting the new piece of equipment he and a group of volunteers worked on together to ensure the clocks that power the Ukrainian electric grid can withstand GPS disruption in the face of Russian cyber attacks and kinetic warfare. ]]></itunes:summary>
    <description><![CDATA[<p>Joe Marshall, a central figure in the story of how Cisco Talos and other teams within Cisco worked together to protect the Ukrainian power grid, joins the show this week. He recaps a <a href='https://www.cnn.com/2023/11/21/politics/ukraine-power-grid-equipment-cisco/index.html'>recent CNN story</a> highlighting the new piece of equipment he and a group of volunteers worked on together to ensure the clocks that power the Ukrainian electric grid can withstand GPS disruption in the face of Russian cyber attacks and kinetic warfare. </p>]]></description>
    <content:encoded><![CDATA[<p>Joe Marshall, a central figure in the story of how Cisco Talos and other teams within Cisco worked together to protect the Ukrainian power grid, joins the show this week. He recaps a <a href='https://www.cnn.com/2023/11/21/politics/ukraine-power-grid-equipment-cisco/index.html'>recent CNN story</a> highlighting the new piece of equipment he and a group of volunteers worked on together to ensure the clocks that power the Ukrainian electric grid can withstand GPS disruption in the face of Russian cyber attacks and kinetic warfare. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/14058434-inside-talos-effort-to-protect-the-ukrainian-power-grid.mp3" length="7997362" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-14058434</guid>
    <pubDate>Fri, 01 Dec 2023 04:00:00 -0500</pubDate>
    <itunes:duration>660</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>164</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why has the Phobos ransomware been working for so long?</itunes:title>
    <title>Why has the Phobos ransomware been working for so long?</title>
    <itunes:summary><![CDATA[Guilherme Venere from Talos Outreach joins the show this week to talk about his research into the 8Base threat actor and its use of a variant of the Phobos ransomware. He recently published several works on the many variants of Phobos that exist in the wild, and why 8Base has been so successful using it for years now. ]]></itunes:summary>
    <description><![CDATA[<p>Guilherme Venere from Talos Outreach joins the show this week to talk about his research into the 8Base threat actor and its use of a variant of the Phobos ransomware. He recently published several works on the many variants of Phobos that exist in the wild, and why 8Base has been so successful using it for years now. </p>]]></description>
    <content:encoded><![CDATA[<p>Guilherme Venere from Talos Outreach joins the show this week to talk about his research into the 8Base threat actor and its use of a variant of the Phobos ransomware. He recently published several works on the many variants of Phobos that exist in the wild, and why 8Base has been so successful using it for years now. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13986245-why-has-the-phobos-ransomware-been-working-for-so-long.mp3" length="9528031" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13986245</guid>
    <pubDate>Fri, 17 Nov 2023 04:00:00 -0500</pubDate>
    <itunes:duration>787</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>163</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A warning about scams in &quot;Roblox&quot; (or any other online game, really)</itunes:title>
    <title>A warning about scams in &quot;Roblox&quot; (or any other online game, really)</title>
    <itunes:summary><![CDATA[Tiago Pereira from Talos Outreach joins the program this week to talk about his research into the different types of scams that appear in the online game "Roblox." Many underage users are at risk of being targeted by malicious users looking to steal their money, in-game items or even install malware on their devices. ]]></itunes:summary>
    <description><![CDATA[<p>Tiago Pereira from Talos Outreach joins the program this week to talk about his research into the <a href='https://blog.talosintelligence.com/roblox-scam-overview/'>different types of scams that appear in the online game &quot;Roblox.&quot;</a> Many underage users are at risk of being targeted by malicious users looking to steal their money, in-game items or even install malware on their devices. </p>]]></description>
    <content:encoded><![CDATA[<p>Tiago Pereira from Talos Outreach joins the program this week to talk about his research into the <a href='https://blog.talosintelligence.com/roblox-scam-overview/'>different types of scams that appear in the online game &quot;Roblox.&quot;</a> Many underage users are at risk of being targeted by malicious users looking to steal their money, in-game items or even install malware on their devices. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13940277-a-warning-about-scams-in-roblox-or-any-other-online-game-really.mp3" length="7390196" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13940277</guid>
    <pubDate>Fri, 10 Nov 2023 04:00:00 -0500</pubDate>
    <itunes:duration>609</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>162</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>XL Edition: The top incident response trends of Q3</itunes:title>
    <title>XL Edition: The top incident response trends of Q3</title>
    <itunes:summary><![CDATA[This week is a special edition of Talos Takes. We have the audio version of Talos Incident Response's recent On Air stream, where they discussed the top attacker trends they're seeing in the field. Talos' incident responders discuss the malware they're seeing most often in infections, how attackers are shifting their tactics, and what other defenders can learn from these findings. ]]></itunes:summary>
    <description><![CDATA[<p>This week is a special edition of Talos Takes. We have the audio version of Talos Incident Response&apos;s recent <a href='https://youtu.be/Gl33UUxUxQE?si=M4ZoDL7Q5aOqeEGn'>On Air stream</a>, where they discussed the top attacker trends they&apos;re seeing in the field. Talos&apos; incident responders discuss the malware they&apos;re seeing most often in infections, how attackers are shifting their tactics, and what other defenders can learn from <a href='https://blog.talosintelligence.com/talos-ir-trends-q3-2023/'>these findings</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>This week is a special edition of Talos Takes. We have the audio version of Talos Incident Response&apos;s recent <a href='https://youtu.be/Gl33UUxUxQE?si=M4ZoDL7Q5aOqeEGn'>On Air stream</a>, where they discussed the top attacker trends they&apos;re seeing in the field. Talos&apos; incident responders discuss the malware they&apos;re seeing most often in infections, how attackers are shifting their tactics, and what other defenders can learn from <a href='https://blog.talosintelligence.com/talos-ir-trends-q3-2023/'>these findings</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13902020-xl-edition-the-top-incident-response-trends-of-q3.mp3" length="22227852" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13902020</guid>
    <pubDate>Fri, 03 Nov 2023 09:00:00 -0400</pubDate>
    <itunes:duration>1845</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>161</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Patching 101</itunes:title>
    <title>Patching 101</title>
    <itunes:summary><![CDATA[Jerry Gamblin from Cisco Kenna joins this week's episode to talk about all things patching. If you're the average user, you probably don't think about patching much because many of them happen automatically in the background. However many admins and users can unknowingly fall behind when it comes to protecting themselves against the latest vulnerabilities. ]]></itunes:summary>
    <description><![CDATA[<p>Jerry Gamblin from Cisco Kenna joins this week&apos;s episode to talk about all things patching. If you&apos;re the average user, you probably don&apos;t think about patching much because many of them happen automatically in the background. However many admins and users can <a href='https://www.cisco.com/c/dam/en/us/products/collateral/security/vulnerability-management/p2p-vulnerability-management-report.pdf'>unknowingly fall behind</a> when it comes to protecting themselves against the latest vulnerabilities. </p>]]></description>
    <content:encoded><![CDATA[<p>Jerry Gamblin from Cisco Kenna joins this week&apos;s episode to talk about all things patching. If you&apos;re the average user, you probably don&apos;t think about patching much because many of them happen automatically in the background. However many admins and users can <a href='https://www.cisco.com/c/dam/en/us/products/collateral/security/vulnerability-management/p2p-vulnerability-management-report.pdf'>unknowingly fall behind</a> when it comes to protecting themselves against the latest vulnerabilities. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13852426-patching-101.mp3" length="6077274" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13852426</guid>
    <pubDate>Fri, 27 Oct 2023 04:00:00 -0400</pubDate>
    <itunes:duration>500</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>160</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What happens when you actually click the &quot;report spam&quot; button?</itunes:title>
    <title>What happens when you actually click the &quot;report spam&quot; button?</title>
    <itunes:summary><![CDATA[Everyone is tired of getting spam emails at this point, and it can feel exhausting always to click that "report spam" button just to get another phony email a few hours later. But we're here to assure you that reporting and filtering spam really does help in the long run! Nick Biasini joins the show this week to discuss all things spam for Cybersecurity Awareness Month. ]]></itunes:summary>
    <description><![CDATA[<p>Everyone is tired of getting spam emails at this point, and it can feel exhausting always to click that &quot;report spam&quot; button just to get another phony email a few hours later. But we&apos;re here to assure you that <a href='https://docs.ces.cisco.com/docs/cisco-talos-email-status-portal'>reporting and filtering spam</a> really does help in the long run! Nick Biasini joins the show this week to discuss all things spam for Cybersecurity Awareness Month. </p>]]></description>
    <content:encoded><![CDATA[<p>Everyone is tired of getting spam emails at this point, and it can feel exhausting always to click that &quot;report spam&quot; button just to get another phony email a few hours later. But we&apos;re here to assure you that <a href='https://docs.ces.cisco.com/docs/cisco-talos-email-status-portal'>reporting and filtering spam</a> really does help in the long run! Nick Biasini joins the show this week to discuss all things spam for Cybersecurity Awareness Month. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13810213-what-happens-when-you-actually-click-the-report-spam-button.mp3" length="6188342" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13810213</guid>
    <pubDate>Fri, 20 Oct 2023 04:00:00 -0400</pubDate>
    <itunes:duration>509</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>159</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to find the right password management solution for you</itunes:title>
    <title>How to find the right password management solution for you</title>
    <itunes:summary><![CDATA[To continue our Cybersecurity Awareness Month series, Harpreet Singh from Talos Incident Response joins Jon to talk about password managers. They discuss the upside of using a third-party service like 1Password or LastPass, the potential dangers of using built-in browser password managers like Google Chrome and Safari, and other good password hygiene advice. ]]></itunes:summary>
    <description><![CDATA[<p>To continue our Cybersecurity Awareness Month series, Harpreet Singh from Talos Incident Response joins Jon to talk about password managers. They discuss the upside of using a third-party service like 1Password or LastPass, the potential dangers of using built-in browser password managers like Google Chrome and Safari, and other good password hygiene advice. </p>]]></description>
    <content:encoded><![CDATA[<p>To continue our Cybersecurity Awareness Month series, Harpreet Singh from Talos Incident Response joins Jon to talk about password managers. They discuss the upside of using a third-party service like 1Password or LastPass, the potential dangers of using built-in browser password managers like Google Chrome and Safari, and other good password hygiene advice. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13767299-how-to-find-the-right-password-management-solution-for-you.mp3" length="5516883" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13767299</guid>
    <pubDate>Fri, 13 Oct 2023 04:00:00 -0400</pubDate>
    <itunes:duration>453</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>158</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Awareness Month: The best practices for implementing multi-factor authentication</itunes:title>
    <title>Cybersecurity Awareness Month: The best practices for implementing multi-factor authentication</title>
    <itunes:summary><![CDATA[All of October, we'll be covering broad security-related topics for Cybersecurity Awareness Month. First up, we address the basics of implementing MFA in any environment, why any type of MFA is better than no MFA, the pitfalls of certain types of authentication, and whether going passwordless is the future. ]]></itunes:summary>
    <description><![CDATA[<p>All of October, we&apos;ll be covering broad security-related topics for Cybersecurity Awareness Month. First up, we address the basics of implementing MFA in any environment, why any type of MFA is better than no MFA, the pitfalls of certain types of authentication, and whether going passwordless is the future. </p>]]></description>
    <content:encoded><![CDATA[<p>All of October, we&apos;ll be covering broad security-related topics for Cybersecurity Awareness Month. First up, we address the basics of implementing MFA in any environment, why any type of MFA is better than no MFA, the pitfalls of certain types of authentication, and whether going passwordless is the future. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13724266-cybersecurity-awareness-month-the-best-practices-for-implementing-multi-factor-authentication.mp3" length="11792612" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13724266</guid>
    <pubDate>Fri, 06 Oct 2023 04:00:00 -0400</pubDate>
    <itunes:duration>976</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>157</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside a Talos Incident Response emergency event</itunes:title>
    <title>Inside a Talos Incident Response emergency event</title>
    <itunes:summary><![CDATA[Hazel Burton takes over as guest host for this episode as she talks to Nate Pors from Cisco Talos Incident Response. Nate was part of Talos IR's team that helped Veradigm, a healthcare technology company, prevent a Qakbot ransomware attack. Nate and his team recently wrote about this experience for the Talos blog, and Veradigm's CISO even joined the Cisco Security Stories podcast recently to discuss his company's relationship with Talos IR. Nate discusses how his team's pre-existing relations...]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton takes over as guest host for this episode as she talks to Nate Pors from Cisco Talos Incident Response. Nate was part of Talos IR&apos;s team that helped Veradigm, a healthcare technology company, prevent a Qakbot ransomware attack. Nate and his team recently w<a href='https://blog.talosintelligence.com/how-cisco-talos-ir-helped-a-healthcare-company-quickly-resolve-a-qakbot-attack/'>rote about this experience</a> for the Talos blog, and Veradigm&apos;s CISO even joined the <a href='https://open.spotify.com/episode/6u3i2CfNq1JXbtPzU2N8sO?si=PzALyETxSySigYsJjgYmWA'>Cisco Security Stories podcast</a> recently to discuss his company&apos;s relationship with Talos IR. Nate discusses how his team&apos;s pre-existing relationship with Veradigm helped them respond quickly and effectively. If you&apos;ve ever wanted to hear a play-by-play of a security event, this is your chance.</p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton takes over as guest host for this episode as she talks to Nate Pors from Cisco Talos Incident Response. Nate was part of Talos IR&apos;s team that helped Veradigm, a healthcare technology company, prevent a Qakbot ransomware attack. Nate and his team recently w<a href='https://blog.talosintelligence.com/how-cisco-talos-ir-helped-a-healthcare-company-quickly-resolve-a-qakbot-attack/'>rote about this experience</a> for the Talos blog, and Veradigm&apos;s CISO even joined the <a href='https://open.spotify.com/episode/6u3i2CfNq1JXbtPzU2N8sO?si=PzALyETxSySigYsJjgYmWA'>Cisco Security Stories podcast</a> recently to discuss his company&apos;s relationship with Talos IR. Nate discusses how his team&apos;s pre-existing relationship with Veradigm helped them respond quickly and effectively. If you&apos;ve ever wanted to hear a play-by-play of a security event, this is your chance.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13665349-inside-a-talos-incident-response-emergency-event.mp3" length="11356313" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13665349</guid>
    <pubDate>Fri, 29 Sep 2023 03:00:00 -0400</pubDate>
    <itunes:duration>939</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>156</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How Talos helped defend Black Hat&#39;s network in Vegas</itunes:title>
    <title>How Talos helped defend Black Hat&#39;s network in Vegas</title>
    <itunes:summary><![CDATA[What happens when the hackers become the hacked? Black Hat is one of the largest cybersecurity conferences in the world, and Talos had a hand in defending the on-site network for the past few years. Yuri Kramarz from Talos Incident Response worked in Black Hat's Network Operations Center this year to help defend Black Hat's network and attendees who connected to the network while attending the conference in August in Las Vegas. He joins Talos Takes this week to discuss what he's learned from ...]]></itunes:summary>
    <description><![CDATA[<p>What happens when the hackers become the hacked? Black Hat is one of the largest cybersecurity conferences in the world, and Talos had a hand in defending the on-site network for the past few years. Yuri Kramarz from Talos Incident Response worked in <a href='https://blogs.cisco.com/security/black-hat-usa-2023-noc-network-assurance'>Black Hat&apos;s Network Operations Center this year</a> to help defend Black Hat&apos;s network and attendees who connected to the network while attending the conference in August in Las Vegas. He joins Talos Takes this week to discuss what he&apos;s learned from the past few years working in the NOC, what types of threats Black Hat faces, and the lessons learned he now takes back into the field with customers. You can also read his reflections on working in the NOC in 2022<a href='https://blogs.cisco.com/security/black-hat-usa-2022-creating-hacker-summer-camp'> here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>What happens when the hackers become the hacked? Black Hat is one of the largest cybersecurity conferences in the world, and Talos had a hand in defending the on-site network for the past few years. Yuri Kramarz from Talos Incident Response worked in <a href='https://blogs.cisco.com/security/black-hat-usa-2023-noc-network-assurance'>Black Hat&apos;s Network Operations Center this year</a> to help defend Black Hat&apos;s network and attendees who connected to the network while attending the conference in August in Las Vegas. He joins Talos Takes this week to discuss what he&apos;s learned from the past few years working in the NOC, what types of threats Black Hat faces, and the lessons learned he now takes back into the field with customers. You can also read his reflections on working in the NOC in 2022<a href='https://blogs.cisco.com/security/black-hat-usa-2022-creating-hacker-summer-camp'> here</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13634358-how-talos-helped-defend-black-hat-s-network-in-vegas.mp3" length="11365896" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13634358</guid>
    <pubDate>Fri, 22 Sep 2023 03:00:00 -0400</pubDate>
    <itunes:duration>940</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>155</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SapphireStealer hits the open internet</itunes:title>
    <title>SapphireStealer hits the open internet</title>
    <itunes:summary><![CDATA[Cisco Talos has recently written about malware families that go open-source, sometimes of their own volition, and sometimes because of leaks. In the case of SapphireStealer, we still don't really know why someone posted this malware to GitHub, but now that it's out there, we can't put it back in a box. Edmund Brumaghin, who assisted with Talos' research and blog post on SapphireStealer, joins Talos Takes this week to discuss this information-stealer. Edmund talks about the goals that someone ...]]></itunes:summary>
    <description><![CDATA[<p>Cisco Talos has recently written about malware families that go open-source, sometimes of their own volition, and <a href='https://blog.talosintelligence.com/code-leaks-new-ransomware-actors/#:~:text=Early%20this%20year%2C%20Talos%20discovered,is%20available%20on%20underground%20forums.'>sometimes because of leaks</a>. In the case of SapphireStealer, we still don&apos;t really know why someone posted this malware to GitHub, but now that it&apos;s out there, we can&apos;t put it back in a box. Edmund Brumaghin, who assisted with Talos&apos; research and <a href='https://blog.talosintelligence.com/sapphirestealer-goes-open-source/'>blog post on SapphireStealer</a>, joins Talos Takes this week to discuss this information-stealer. Edmund talks about the goals that someone has by making malware open-source, how that affects detection and what makes SapphireStealer unique among infostealers. </p>]]></description>
    <content:encoded><![CDATA[<p>Cisco Talos has recently written about malware families that go open-source, sometimes of their own volition, and <a href='https://blog.talosintelligence.com/code-leaks-new-ransomware-actors/#:~:text=Early%20this%20year%2C%20Talos%20discovered,is%20available%20on%20underground%20forums.'>sometimes because of leaks</a>. In the case of SapphireStealer, we still don&apos;t really know why someone posted this malware to GitHub, but now that it&apos;s out there, we can&apos;t put it back in a box. Edmund Brumaghin, who assisted with Talos&apos; research and <a href='https://blog.talosintelligence.com/sapphirestealer-goes-open-source/'>blog post on SapphireStealer</a>, joins Talos Takes this week to discuss this information-stealer. Edmund talks about the goals that someone has by making malware open-source, how that affects detection and what makes SapphireStealer unique among infostealers. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13554723-sapphirestealer-hits-the-open-internet.mp3" length="5403367" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13554723</guid>
    <pubDate>Fri, 08 Sep 2023 08:00:00 -0400</pubDate>
    <itunes:duration>443</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>154</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>You&#39;re never going to believe this, but Lazarus Group is back again</itunes:title>
    <title>You&#39;re never going to believe this, but Lazarus Group is back again</title>
    <itunes:summary><![CDATA[North Korea's infamous APT group is back on the scene, this time with two new remote access trojans. By now, you've probably heard of Lazarus Group and all the annoying things they do to steal sensitive information, make money for North Korea's missile program, etc. But we have an update on their current tactics and payloads they're sending around the globe. Asheer Malhotra from Talos Outreach joins Talos Takes this week to discuss the two new RATs he and his team discovered, why Lazarus Grou...]]></itunes:summary>
    <description><![CDATA[<p>North Korea&apos;s infamous APT group is back on the scene, this time with two new remote access trojans. By now, you&apos;ve probably heard of <a href='https://blog.talosintelligence.com/lazarus-collectionrat/'>Lazarus Group</a> and all the annoying things they do to steal sensitive information, make money for North Korea&apos;s missile program, etc. But we have an update on their current tactics and payloads they&apos;re sending around the globe. Asheer Malhotra from Talos Outreach joins Talos Takes this week to discuss the <a href='http://blog.talosintelligence.com/lazarus-quiterat/'>two new RATs</a> he and his team discovered, why Lazarus Group is still creating new tools, and how their use of older, open-source software has made tracking them ever-so-slightly easier. </p>]]></description>
    <content:encoded><![CDATA[<p>North Korea&apos;s infamous APT group is back on the scene, this time with two new remote access trojans. By now, you&apos;ve probably heard of <a href='https://blog.talosintelligence.com/lazarus-collectionrat/'>Lazarus Group</a> and all the annoying things they do to steal sensitive information, make money for North Korea&apos;s missile program, etc. But we have an update on their current tactics and payloads they&apos;re sending around the globe. Asheer Malhotra from Talos Outreach joins Talos Takes this week to discuss the <a href='http://blog.talosintelligence.com/lazarus-quiterat/'>two new RATs</a> he and his team discovered, why Lazarus Group is still creating new tools, and how their use of older, open-source software has made tracking them ever-so-slightly easier. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13457070-you-re-never-going-to-believe-this-but-lazarus-group-is-back-again.mp3" length="7203053" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13457070</guid>
    <pubDate>Fri, 01 Sep 2023 04:00:00 -0400</pubDate>
    <itunes:duration>593</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>153</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Carrying out incident response in-person vs. virtually</itunes:title>
    <title>Carrying out incident response in-person vs. virtually</title>
    <itunes:summary><![CDATA[Everything about the modern workplace is different now from the start of the COVID-19 pandemic. Many companies are embracing the remote work lifestyle, while others are stuck in a hybrid model or pushing employees to come back to the office. With that in mind, we felt like it was a good time to check in on the incident response process for companies who have to deal with working remotely and those who prefer to conduct business in person. Yuri Kramarz and Gergana Karadzhova-Dangela from Cisco...]]></itunes:summary>
    <description><![CDATA[<p>Everything about the modern workplace is different now from the start of the COVID-19 pandemic. Many companies are embracing the remote work lifestyle, while others are stuck in a hybrid model or pushing employees to come back to the office. With that in mind, we felt like it was a good time to check in on the incident response process for companies who have to deal with working remotely and those who prefer to conduct business in person. Yuri Kramarz and Gergana Karadzhova-Dangela from Cisco Talos Incident Response join the show this week to discuss how they handle onsite incident response versus engagements that need to be done remotely. There are drawbacks and benefits of both models, so it&apos;s up to the individual customer and specific circumstances to determine how a responder can best approach the event in question.</p>]]></description>
    <content:encoded><![CDATA[<p>Everything about the modern workplace is different now from the start of the COVID-19 pandemic. Many companies are embracing the remote work lifestyle, while others are stuck in a hybrid model or pushing employees to come back to the office. With that in mind, we felt like it was a good time to check in on the incident response process for companies who have to deal with working remotely and those who prefer to conduct business in person. Yuri Kramarz and Gergana Karadzhova-Dangela from Cisco Talos Incident Response join the show this week to discuss how they handle onsite incident response versus engagements that need to be done remotely. There are drawbacks and benefits of both models, so it&apos;s up to the individual customer and specific circumstances to determine how a responder can best approach the event in question.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13452101-carrying-out-incident-response-in-person-vs-virtually.mp3" length="11253365" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13452101</guid>
    <pubDate>Fri, 25 Aug 2023 04:00:00 -0400</pubDate>
    <itunes:duration>931</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>152</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hacktivism is quietly growing, especially when it comes to Russia&#39;s invasion of Ukraine</itunes:title>
    <title>Hacktivism is quietly growing, especially when it comes to Russia&#39;s invasion of Ukraine</title>
    <itunes:summary><![CDATA[The stereotypical "hacker" who looks to do good in the world probably involves a Guy Fawkes mask and black hoodie. But hacktivism has become much more than that, especially since Russia invaded Ukraine. On the heels of a newly released overview on hacktivism, Lexi DiScola from the Talos Threat Intelligence and Interdiction team joins Talos Takes this week to discuss these actors. While not just anyone is likely a target for hacktivists, Talos has seen groups become more brazen and start looki...]]></itunes:summary>
    <description><![CDATA[<p>The stereotypical &quot;hacker&quot; who looks to do good in the world probably involves a Guy Fawkes mask and black hoodie. But hacktivism has become much more than that, especially since Russia invaded Ukraine. On the heels of a <a href='https://talosintelligence.com/resources/631'>newly released overview on hacktivism</a>, Lexi DiScola from the Talos Threat Intelligence and Interdiction team joins Talos Takes this week to discuss these actors. While not just anyone is likely a target for hacktivists, Talos has seen groups become more brazen and start looking to make money off their operations. </p>]]></description>
    <content:encoded><![CDATA[<p>The stereotypical &quot;hacker&quot; who looks to do good in the world probably involves a Guy Fawkes mask and black hoodie. But hacktivism has become much more than that, especially since Russia invaded Ukraine. On the heels of a <a href='https://talosintelligence.com/resources/631'>newly released overview on hacktivism</a>, Lexi DiScola from the Talos Threat Intelligence and Interdiction team joins Talos Takes this week to discuss these actors. While not just anyone is likely a target for hacktivists, Talos has seen groups become more brazen and start looking to make money off their operations. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13424149-hacktivism-is-quietly-growing-especially-when-it-comes-to-russia-s-invasion-of-ukraine.mp3" length="7973914" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13424149</guid>
    <pubDate>Fri, 18 Aug 2023 04:00:00 -0400</pubDate>
    <itunes:duration>658</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>151</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What&#39;s the difference between data theft extortion and ransomware?</itunes:title>
    <title>What&#39;s the difference between data theft extortion and ransomware?</title>
    <itunes:summary><![CDATA[Cisco Talos Incident Response observed data theft extortion more than any other type of cyber attack last quarter. So why has it become so popular? And what makes it different from ransomware? Jacob Finn from the Talos Threat Intelligence and Interdiction Team joins Jon this week to discuss the basics of data theft extortion. He just worked on an overview of this threat for Talos researchers and works closely with Talos IR on their quarterly trends reports. Jacob discusses why threat actors a...]]></itunes:summary>
    <description><![CDATA[<p>Cisco Talos Incident Response<a href='https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/'> observed data theft extortion more than any other type of cyber attack last quarter</a>. So why has it become so popular? And what makes it different from ransomware? Jacob Finn from the Talos Threat Intelligence and Interdiction Team joins Jon this week to discuss the basics of data theft extortion. He just worked on an overview of this threat for Talos researchers and works closely with Talos IR on their quarterly trends reports. Jacob discusses why threat actors are choosing data theft extortion over ransomware and how this makes defense and detection more difficult. For more on this topic, read our one-page overview <a href='https://talosintelligence.com/resources/630'>here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>Cisco Talos Incident Response<a href='https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/'> observed data theft extortion more than any other type of cyber attack last quarter</a>. So why has it become so popular? And what makes it different from ransomware? Jacob Finn from the Talos Threat Intelligence and Interdiction Team joins Jon this week to discuss the basics of data theft extortion. He just worked on an overview of this threat for Talos researchers and works closely with Talos IR on their quarterly trends reports. Jacob discusses why threat actors are choosing data theft extortion over ransomware and how this makes defense and detection more difficult. For more on this topic, read our one-page overview <a href='https://talosintelligence.com/resources/630'>here</a>.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13383540-what-s-the-difference-between-data-theft-extortion-and-ransomware.mp3" length="7973872" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13383540</guid>
    <pubDate>Fri, 11 Aug 2023 04:00:00 -0400</pubDate>
    <itunes:duration>658</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>150</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Reading 2023&#39;s cybersecurity tarot cards</itunes:title>
    <title>Reading 2023&#39;s cybersecurity tarot cards</title>
    <itunes:summary><![CDATA[Hazel Burton and Jon Munshaw use this week to look back on the top threats and cybersecurity trends so far in 2023 and the rest of the year. Hazel recently compiled Talos' Half-Year in Review, recapping the top stories that Talos has been following so far this year. She and Jon talk about what stood out from the report, what our researchers have been thinking about up to this point, and what we'll be discussing come December. ]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton and Jon Munshaw use this week to look back on the top threats and cybersecurity trends so far in 2023 and the rest of the year. Hazel recently compiled <a href='https://blog.talosintelligence.com/half-year-in-review-2023/'>Talos&apos; Half-Year in Review</a>, recapping the top stories that Talos has been following so far this year. She and Jon talk about what stood out from the report, what our researchers have been thinking about up to this point, and what we&apos;ll be discussing come December. </p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton and Jon Munshaw use this week to look back on the top threats and cybersecurity trends so far in 2023 and the rest of the year. Hazel recently compiled <a href='https://blog.talosintelligence.com/half-year-in-review-2023/'>Talos&apos; Half-Year in Review</a>, recapping the top stories that Talos has been following so far this year. She and Jon talk about what stood out from the report, what our researchers have been thinking about up to this point, and what we&apos;ll be discussing come December. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13344874-reading-2023-s-cybersecurity-tarot-cards.mp3" length="8027423" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13344874</guid>
    <pubDate>Fri, 04 Aug 2023 04:00:00 -0400</pubDate>
    <itunes:duration>662</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>149</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>(XL Edition): The top trends that Talos IR saw last quarter</itunes:title>
    <title>(XL Edition): The top trends that Talos IR saw last quarter</title>
    <itunes:summary><![CDATA[We're back with the audio version of our quarterly Cisco Talos Incident Response On Air stream. Join the Talos IR team as they recap the past quarter's top trends, including talking about malware they're seeing in the wild, tactics that attackers are using most often to break into networks, and much more. They discuss why healthcare continues to be a popular target for bad actors, and how adversaries are pivoting away from ransomware and instead opting for data theft and extortion. If you pre...]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re back with the audio version of our quarterly Cisco Talos Incident Response On Air stream. Join the Talos IR team as they recap <a href='https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/'>the past quarter&apos;s top trends</a>, including talking about malware they&apos;re seeing in the wild, tactics that attackers are using most often to break into networks, and much more. They discuss why healthcare continues to be a popular target for bad actors, and how adversaries are pivoting away from ransomware and instead opting for data theft and extortion. If you prefer a video version, <a href='https://youtu.be/YClzBysgA1U'>watch it over on YouTube here</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re back with the audio version of our quarterly Cisco Talos Incident Response On Air stream. Join the Talos IR team as they recap <a href='https://blog.talosintelligence.com/talos-ir-q2-2023-quarterly-recap/'>the past quarter&apos;s top trends</a>, including talking about malware they&apos;re seeing in the wild, tactics that attackers are using most often to break into networks, and much more. They discuss why healthcare continues to be a popular target for bad actors, and how adversaries are pivoting away from ransomware and instead opting for data theft and extortion. If you prefer a video version, <a href='https://youtu.be/YClzBysgA1U'>watch it over on YouTube here</a>.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13301877-xl-edition-the-top-trends-that-talos-ir-saw-last-quarter.mp3" length="21512287" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13301877</guid>
    <pubDate>Fri, 28 Jul 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1786</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>148</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>ISO 27002 sounds intimidating, but really it&#39;s just a cybersecurity shopping list</itunes:title>
    <title>ISO 27002 sounds intimidating, but really it&#39;s just a cybersecurity shopping list</title>
    <itunes:summary><![CDATA[When Martin Lee first told Jon about ISO 27001 and 27002, Jon had to immediately Google whatever this combination of letters and numbers meant. Turns out there are international standards for cybersecurity, just like they have for selling lightbulbs and installing electrical outlets — who knew? Martin recently wrote about these standards for the Talos blog, outlining a list of recommendations for any organization looking to build a threat intelligence program from the ground up. Jon interview...]]></itunes:summary>
    <description><![CDATA[<p>When Martin Lee first told Jon about <a href='https://www.iso.org/standard/27001'>ISO 27001</a> and <a href='https://www.iso.org/standard/75652.html'>27002</a>, Jon had to immediately Google whatever this combination of letters and numbers meant. Turns out there are international standards for cybersecurity, just like they have for selling lightbulbs and installing electrical outlets — who knew? Martin <a href='https://blog.talosintelligence.com/implementing-an-iso-compliant-threat-intelligence-program/'>recently wrote about these standards for the Talos blog</a>, outlining a list of recommendations for any organization looking to build a threat intelligence program from the ground up. Jon interviewed him about what these standards are, exactly, what they mean for companies looking to implement these standards, and why they recently included threat intelligence. </p>]]></description>
    <content:encoded><![CDATA[<p>When Martin Lee first told Jon about <a href='https://www.iso.org/standard/27001'>ISO 27001</a> and <a href='https://www.iso.org/standard/75652.html'>27002</a>, Jon had to immediately Google whatever this combination of letters and numbers meant. Turns out there are international standards for cybersecurity, just like they have for selling lightbulbs and installing electrical outlets — who knew? Martin <a href='https://blog.talosintelligence.com/implementing-an-iso-compliant-threat-intelligence-program/'>recently wrote about these standards for the Talos blog</a>, outlining a list of recommendations for any organization looking to build a threat intelligence program from the ground up. Jon interviewed him about what these standards are, exactly, what they mean for companies looking to implement these standards, and why they recently included threat intelligence. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13259030-iso-27002-sounds-intimidating-but-really-it-s-just-a-cybersecurity-shopping-list.mp3" length="8803342" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13259030</guid>
    <pubDate>Fri, 21 Jul 2023 04:00:00 -0400</pubDate>
    <itunes:duration>727</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>147</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The dangers of &quot;Mercenary&quot; groups and the spyware they create</itunes:title>
    <title>The dangers of &quot;Mercenary&quot; groups and the spyware they create</title>
    <itunes:summary><![CDATA[Asheer Malhotra is back to talk to Jon Munshaw about spyware and mercenary groups. Asheer recently helped publish Talos research on Mercenary Groups and why they're so dangerous in particular. We briefly touched on this topic in a past episode on the Predator/Alien spyware tag team, but this time we're getting into the broader field of what Mercenary groups are, exactly, and what makes them so dangerous. Asheer talks about recent steps governments have taken to curb the sale of spyware and wh...]]></itunes:summary>
    <description><![CDATA[<p>Asheer Malhotra is back to talk to Jon Munshaw about spyware and mercenary groups. Asheer recently helped publish Talos <a href='https://blog.talosintelligence.com/the-growth-of-commercial-spyware/'>research on Mercenary Groups</a> and why they&apos;re so dangerous in particular. We briefly touched on this topic in a past episode on the <a href='https://www.buzzsprout.com/2018149/episodes/12966276'>Predator/Alien spyware tag team</a>, but this time we&apos;re getting into the broader field of what Mercenary groups are, exactly, and what makes them so dangerous. Asheer talks about recent steps governments have taken to curb the sale of spyware and why the &quot;average&quot; user should care about this topic, even though they&apos;re unlikely to ever be a target. </p>]]></description>
    <content:encoded><![CDATA[<p>Asheer Malhotra is back to talk to Jon Munshaw about spyware and mercenary groups. Asheer recently helped publish Talos <a href='https://blog.talosintelligence.com/the-growth-of-commercial-spyware/'>research on Mercenary Groups</a> and why they&apos;re so dangerous in particular. We briefly touched on this topic in a past episode on the <a href='https://www.buzzsprout.com/2018149/episodes/12966276'>Predator/Alien spyware tag team</a>, but this time we&apos;re getting into the broader field of what Mercenary groups are, exactly, and what makes them so dangerous. Asheer talks about recent steps governments have taken to curb the sale of spyware and why the &quot;average&quot; user should care about this topic, even though they&apos;re unlikely to ever be a target. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13219101-the-dangers-of-mercenary-groups-and-the-spyware-they-create.mp3" length="6173607" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13219101</guid>
    <pubDate>Fri, 14 Jul 2023 04:00:00 -0400</pubDate>
    <itunes:duration>508</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>146</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The various ways attackers can mess with URLs, TLDs and DNS</itunes:title>
    <title>The various ways attackers can mess with URLs, TLDs and DNS</title>
    <itunes:summary><![CDATA[We decided to have a web navigation extravaganza this week! Guilherme Venere and Jaeson Schultz from Talos Outreach have both long been researching the ways in which bad actors try to damage users' inherent trust in the internet. Most internet users interact with the web by typing in a URL or domain name into their web browser (i.e., google.com) expecting that will take them to the right place. But attackers have found various ways to mess with that series of handshakes that must take place. ...]]></itunes:summary>
    <description><![CDATA[<p>We decided to have a web navigation extravaganza this week! Guilherme Venere and Jaeson Schultz from Talos Outreach have both long been researching the ways in which bad actors try to damage users&apos; <a href='https://blog.talosintelligence.com/seaturtle/'>inherent trust in the internet</a>. Most internet users interact with the web by typing in a URL or domain name into their web browser (i.e., google.com) expecting that will take them to the right place. But attackers have found various ways to mess with that series of handshakes that must take place. Guilherme and Jaeson talk to Jon about their past years of research into typosquatting domains, new TLDs that open up the door to data leaks, DNS manipulation and more. <br/><br/><b>Additional reading:</b></p><ul><li><a href='https://blog.talosintelligence.com/zip-tld-information-leak/'>&quot;.Zip&quot; top-level domains draw potential for information leaks</a></li><li><a href='https://blog.talosintelligence.com/seaturtle/'>DNS Hijacking Abuses Trust In Core Internet Service</a></li><li><a href='https://blog.talosintelligence.com/sea-turtle-keeps-on-swimming/'>Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques</a></li><li><a href='https://blog.talosintelligence.com/security-implications-of/'>Security implications of misconfigurations</a></li><li><a href='https://blog.talosintelligence.com/domain-dumpster-diving/'>Domain dumpster diving</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>We decided to have a web navigation extravaganza this week! Guilherme Venere and Jaeson Schultz from Talos Outreach have both long been researching the ways in which bad actors try to damage users&apos; <a href='https://blog.talosintelligence.com/seaturtle/'>inherent trust in the internet</a>. Most internet users interact with the web by typing in a URL or domain name into their web browser (i.e., google.com) expecting that will take them to the right place. But attackers have found various ways to mess with that series of handshakes that must take place. Guilherme and Jaeson talk to Jon about their past years of research into typosquatting domains, new TLDs that open up the door to data leaks, DNS manipulation and more. <br/><br/><b>Additional reading:</b></p><ul><li><a href='https://blog.talosintelligence.com/zip-tld-information-leak/'>&quot;.Zip&quot; top-level domains draw potential for information leaks</a></li><li><a href='https://blog.talosintelligence.com/seaturtle/'>DNS Hijacking Abuses Trust In Core Internet Service</a></li><li><a href='https://blog.talosintelligence.com/sea-turtle-keeps-on-swimming/'>Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques</a></li><li><a href='https://blog.talosintelligence.com/security-implications-of/'>Security implications of misconfigurations</a></li><li><a href='https://blog.talosintelligence.com/domain-dumpster-diving/'>Domain dumpster diving</a></li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13133867-the-various-ways-attackers-can-mess-with-urls-tlds-and-dns.mp3" length="9943073" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13133867</guid>
    <pubDate>Fri, 30 Jun 2023 04:00:00 -0400</pubDate>
    <itunes:duration>822</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>145</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What we know so far about the MOVEit zero-day making the rounds</itunes:title>
    <title>What we know so far about the MOVEit zero-day making the rounds</title>
    <itunes:summary><![CDATA[Aliza Johnson from Talos Threat Intelligence and Interdiction team joins Jon Munshaw this week for a Talos Takes episode on the MOVEit zero-day vulnerability (that's since been patched) making headlines recently. Talos published an advisory last week on everything we know so far about the exploitation of this vulnerability and the group behind it, Clop. Aliza discusses where things stand right now, what Clop is doing once they gain access via this vulnerability and what Talos recommends for m...]]></itunes:summary>
    <description><![CDATA[<p>Aliza Johnson from Talos Threat Intelligence and Interdiction team joins Jon Munshaw this week for a Talos Takes episode on the <a href='https://blog.talosintelligence.com/active-exploitation-of-moveit/'>MOVEit zero-day vulnerability</a> (that&apos;s since been patched) <a href='https://www.darkreading.com/attacks-breaches/avast-norton-victim-moveit-ransomware-attacks'>making headlines recently</a>. Talos published an advisory last week on everything we know so far about the exploitation of this vulnerability and the group behind it, Clop. Aliza discusses where things stand right now, what Clop is doing once they gain access via this vulnerability and what Talos recommends for mitigation strategies for potentially affected customers. </p>]]></description>
    <content:encoded><![CDATA[<p>Aliza Johnson from Talos Threat Intelligence and Interdiction team joins Jon Munshaw this week for a Talos Takes episode on the <a href='https://blog.talosintelligence.com/active-exploitation-of-moveit/'>MOVEit zero-day vulnerability</a> (that&apos;s since been patched) <a href='https://www.darkreading.com/attacks-breaches/avast-norton-victim-moveit-ransomware-attacks'>making headlines recently</a>. Talos published an advisory last week on everything we know so far about the exploitation of this vulnerability and the group behind it, Clop. Aliza discusses where things stand right now, what Clop is doing once they gain access via this vulnerability and what Talos recommends for mitigation strategies for potentially affected customers. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13090135-what-we-know-so-far-about-the-moveit-zero-day-making-the-rounds.mp3" length="4713471" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13090135</guid>
    <pubDate>Fri, 23 Jun 2023 04:00:00 -0400</pubDate>
    <itunes:duration>386</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>144</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The hidden threat to the software supply chain you may not be thinking about</itunes:title>
    <title>The hidden threat to the software supply chain you may not be thinking about</title>
    <itunes:summary><![CDATA[Cisco Talos Incident Response recently discovered an uptick in malicious actors compromising vendor and third-party accounts to sneak into targeted networks. Many enterprises have vendor and contractor accounts that need to access their network for a variety of things — IT support, cybersecurity, etc. — but these accounts are often monitored less than those belonging to full-time employees. Craig Jackson, who recently co-authored a blog post on this threat, joins Talos Takes this week to talk...]]></itunes:summary>
    <description><![CDATA[<p>Cisco Talos Incident Response recently discovered an uptick in malicious actors compromising vendor and third-party accounts to sneak into targeted networks. Many enterprises have vendor and contractor accounts that need to access their network for a variety of things — IT support, cybersecurity, etc. — but these accounts are often monitored less than those belonging to full-time employees. Craig Jackson, who <a href='https://blog.talosintelligence.com/vendor-contractor-account-abuse/'>recently co-authored a blog post</a> on this threat, joins Talos Takes this week to talk about vendor and contractor account (VCA) takeover and how they fit into the broader threat of supply chain attacks. </p>]]></description>
    <content:encoded><![CDATA[<p>Cisco Talos Incident Response recently discovered an uptick in malicious actors compromising vendor and third-party accounts to sneak into targeted networks. Many enterprises have vendor and contractor accounts that need to access their network for a variety of things — IT support, cybersecurity, etc. — but these accounts are often monitored less than those belonging to full-time employees. Craig Jackson, who <a href='https://blog.talosintelligence.com/vendor-contractor-account-abuse/'>recently co-authored a blog post</a> on this threat, joins Talos Takes this week to talk about vendor and contractor account (VCA) takeover and how they fit into the broader threat of supply chain attacks. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13046929-the-hidden-threat-to-the-software-supply-chain-you-may-not-be-thinking-about.mp3" length="8717441" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13046929</guid>
    <pubDate>Fri, 16 Jun 2023 04:00:00 -0400</pubDate>
    <itunes:duration>720</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>143</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Horabot is here to do &quot;horable&quot; things to your email inbox</itunes:title>
    <title>Horabot is here to do &quot;horable&quot; things to your email inbox</title>
    <itunes:summary><![CDATA[We're joined this week by Chetan Raghuprasad to discuss a new botnet he recently discovered and researched. Horabot can completely hijack a target's Outlook mailbox to steal their contact list and then send even more spam to targets. It's the perfect business email compromise tool for attackers that comes with a side of banking trojan. Chetan talks to Jon about this malware family's abilities, where it came from and what the actors behind it are hoping to achieve. For more, read Chetan's full...]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re joined this week by Chetan Raghuprasad to discuss a new botnet he recently discovered and researched. <a href='https://blog.talosintelligence.com/new-horabot-targets-americas/'>Horabot</a> can completely hijack a target&apos;s Outlook mailbox to steal their contact list and then send even more spam to targets. It&apos;s the perfect business email compromise tool for attackers that comes with a side of banking trojan. Chetan talks to Jon about this malware family&apos;s abilities, where it came from and what the actors behind it are hoping to achieve. <a href='https://blog.talosintelligence.com/new-horabot-targets-americas/'>For more, read Chetan&apos;s full blog post</a>.</p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re joined this week by Chetan Raghuprasad to discuss a new botnet he recently discovered and researched. <a href='https://blog.talosintelligence.com/new-horabot-targets-americas/'>Horabot</a> can completely hijack a target&apos;s Outlook mailbox to steal their contact list and then send even more spam to targets. It&apos;s the perfect business email compromise tool for attackers that comes with a side of banking trojan. Chetan talks to Jon about this malware family&apos;s abilities, where it came from and what the actors behind it are hoping to achieve. <a href='https://blog.talosintelligence.com/new-horabot-targets-americas/'>For more, read Chetan&apos;s full blog post</a>.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/13004109-horabot-is-here-to-do-horable-things-to-your-email-inbox.mp3" length="9870659" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-13004109</guid>
    <pubDate>Fri, 09 Jun 2023 04:00:00 -0400</pubDate>
    <itunes:duration>816</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>142</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Predator spyware and more &quot;mercenary&quot; groups</itunes:title>
    <title>The Predator spyware and more &quot;mercenary&quot; groups</title>
    <itunes:summary><![CDATA[Despite governments' best efforts, spyware is still running rampant on the threat landscape. These types of tracking malware are used to target high-profile individuals like politicians, activists, journalists and more — and even sometimes for jealous exes to track their former partners. Asheer Malhotra, who recently dissected the Predator spyware, joins Talos Takes this week to talk about Predator and its associated tool, Alien. Asheer shares new technical details about this spyware and disc...]]></itunes:summary>
    <description><![CDATA[<p>Despite governments&apos; best efforts, spyware is still running rampant on the threat landscape. These types of tracking malware are used to target high-profile individuals like politicians, activists, journalists and more — and even sometimes for jealous exes to track their former partners. Asheer Malhotra, who recently dissected the Predator spyware, joins Talos Takes this week to talk about Predator and its associated tool, Alien. Asheer shares new technical details about this spyware and discusses why &quot;mercenary&quot; spyware groups are on the rise.<br/><br/>If listeners suspect their system(s) may have been compromised by commercial spyware, please consider notifying Talos’ research team at talos-mercenary-spyware-help@external.cisco.com to assist in furthering the community’s knowledge of these threats.</p>]]></description>
    <content:encoded><![CDATA[<p>Despite governments&apos; best efforts, spyware is still running rampant on the threat landscape. These types of tracking malware are used to target high-profile individuals like politicians, activists, journalists and more — and even sometimes for jealous exes to track their former partners. Asheer Malhotra, who recently dissected the Predator spyware, joins Talos Takes this week to talk about Predator and its associated tool, Alien. Asheer shares new technical details about this spyware and discusses why &quot;mercenary&quot; spyware groups are on the rise.<br/><br/>If listeners suspect their system(s) may have been compromised by commercial spyware, please consider notifying Talos’ research team at talos-mercenary-spyware-help@external.cisco.com to assist in furthering the community’s knowledge of these threats.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12966276-the-predator-spyware-and-more-mercenary-groups.mp3" length="7061326" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12966276</guid>
    <pubDate>Fri, 02 Jun 2023 09:00:00 -0400</pubDate>
    <itunes:duration>582</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>141</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to adapt to the constant change that comes with cybersecurity</itunes:title>
    <title>How to adapt to the constant change that comes with cybersecurity</title>
    <itunes:summary><![CDATA[Hazel Burton is our special guest host this week of Talos Takes, featuring a very special guest: Talos Vice President Matt Watchinski! Matt and Hazel have a conversation for Mental Health Awareness Month, especially as it relates to the cybersecurity industry. They share tips on how to balance work and life (when it seems like cybersecurity is starting to permeate every aspect of our lives) and how to deal with failure. Join us for this incredibly candid conversation!]]></itunes:summary>
    <description><![CDATA[<p>Hazel Burton is our special guest host this week of Talos Takes, featuring a very special guest: Talos Vice President Matt Watchinski! Matt and Hazel have a conversation for Mental Health Awareness Month, especially as it relates to the cybersecurity industry. They share tips on how to balance work and life (when it seems like cybersecurity is starting to permeate every aspect of our lives) and how to deal with failure. Join us for this incredibly candid conversation!</p>]]></description>
    <content:encoded><![CDATA[<p>Hazel Burton is our special guest host this week of Talos Takes, featuring a very special guest: Talos Vice President Matt Watchinski! Matt and Hazel have a conversation for Mental Health Awareness Month, especially as it relates to the cybersecurity industry. They share tips on how to balance work and life (when it seems like cybersecurity is starting to permeate every aspect of our lives) and how to deal with failure. Join us for this incredibly candid conversation!</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12918647-how-to-adapt-to-the-constant-change-that-comes-with-cybersecurity.mp3" length="13388492" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12918647</guid>
    <pubDate>Fri, 26 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1104</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>140</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>RA Group is just the latest example of the ransomware landscape splintering</itunes:title>
    <title>RA Group is just the latest example of the ransomware landscape splintering</title>
    <itunes:summary><![CDATA[Talos researchers recently discovered a new ransomware group called "RA Group." This week, Nick Biasni joins Jon to discuss this new threat actor and the modified Babuk ransomware they've already used in attacks against a wide range of companies in the U.S. and South Korea. Nick talks about the group's use of source code that's already been leaked, where they could be headed next and what this group may signal for the larger ransomware landscape. Other helpful links:Threat Source newsletter (...]]></itunes:summary>
    <description><![CDATA[<p>Talos researchers recently discovered a <a href='https://blog.talosintelligence.com/ra-group-ransomware/'>new ransomware group called &quot;RA Group.&quot;</a> This week, Nick Biasni joins Jon to discuss this new threat actor and the modified Babuk ransomware they&apos;ve already used in attacks against a wide range of companies in the U.S. and South Korea. Nick talks about the group&apos;s use of source code that&apos;s already been leaked, where they could be headed next and what this group may signal for the larger ransomware landscape. <br/><br/><b>Other helpful links:</b></p><ul><li><a href='https://blog.talosintelligence.com/threat-source-newsletter-may-11-2023/'>Threat Source newsletter (May 11, 2023) — So much for that ransomware decline</a></li><li><a href='https://talostakes.talosintelligence.com/2018149/11127860-talos-takes-ep-71-ncsam-edition-2021-in-ransomware'>Talos Takes Ep. #71 (includes more details about the &quot;double extortion&quot; tactics of ransomware)</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>Talos researchers recently discovered a <a href='https://blog.talosintelligence.com/ra-group-ransomware/'>new ransomware group called &quot;RA Group.&quot;</a> This week, Nick Biasni joins Jon to discuss this new threat actor and the modified Babuk ransomware they&apos;ve already used in attacks against a wide range of companies in the U.S. and South Korea. Nick talks about the group&apos;s use of source code that&apos;s already been leaked, where they could be headed next and what this group may signal for the larger ransomware landscape. <br/><br/><b>Other helpful links:</b></p><ul><li><a href='https://blog.talosintelligence.com/threat-source-newsletter-may-11-2023/'>Threat Source newsletter (May 11, 2023) — So much for that ransomware decline</a></li><li><a href='https://talostakes.talosintelligence.com/2018149/11127860-talos-takes-ep-71-ncsam-edition-2021-in-ransomware'>Talos Takes Ep. #71 (includes more details about the &quot;double extortion&quot; tactics of ransomware)</a></li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12876291-ra-group-is-just-the-latest-example-of-the-ransomware-landscape-splintering.mp3" length="5898611" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12876291</guid>
    <pubDate>Fri, 19 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>480</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>139</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>What makes the new Greatness phishing-as-a-service tool so great?</itunes:title>
    <title>What makes the new Greatness phishing-as-a-service tool so great?</title>
    <itunes:summary><![CDATA[Tiago Pereira from Talos Outreach joins the show this week to talk about his recent discovery of a new phishing-as-a-service tool called "Greatness." Since everything else is "as-a-service" nowadays, it's only fitting that attackers have figured out how to monetize easy phishing tools, too. Tiago discusses what makes Greatness unique, why it's going after business targets specifically, and why it creates such convincing fake Office 365 login pages. ]]></itunes:summary>
    <description><![CDATA[<p>Tiago Pereira from Talos Outreach joins the show this week to talk about his recent discovery of a <a href='https://blog.talosintelligence.com/new-phishing-as-a-service-tool-greatness-already-seen-in-the-wild/'>new phishing-as-a-service tool called &quot;Greatness.&quot;</a> Since everything else is &quot;as-a-service&quot; nowadays, it&apos;s only fitting that attackers have figured out how to monetize easy phishing tools, too. Tiago discusses what makes Greatness unique, why it&apos;s going after business targets specifically, and why it creates such convincing fake Office 365 login pages. </p>]]></description>
    <content:encoded><![CDATA[<p>Tiago Pereira from Talos Outreach joins the show this week to talk about his recent discovery of a <a href='https://blog.talosintelligence.com/new-phishing-as-a-service-tool-greatness-already-seen-in-the-wild/'>new phishing-as-a-service tool called &quot;Greatness.&quot;</a> Since everything else is &quot;as-a-service&quot; nowadays, it&apos;s only fitting that attackers have figured out how to monetize easy phishing tools, too. Tiago discusses what makes Greatness unique, why it&apos;s going after business targets specifically, and why it creates such convincing fake Office 365 login pages. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12829741-what-makes-the-new-greatness-phishing-as-a-service-tool-so-great.mp3" length="5898101" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12829741</guid>
    <pubDate>Fri, 12 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>480</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>138</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>XL Edition: Talos Incident Response livestream on top trends from the past quarter</itunes:title>
    <title>XL Edition: Talos Incident Response livestream on top trends from the past quarter</title>
    <itunes:summary><![CDATA[This week's episode is longer than usual, but we wanted to bring you the Cisco Talos Incident Response On Air livestream from last week for anyone who missed it. For anyone who prefers a video version, you can watch the recording here.In this discussion, researchers from Talos IR and the Talos Threat Intelligence and Interdiction team cover the top threats and attacker tactics they saw over the past quarter. They talk about why the use of web shells is way up, whether or not the ransomware de...]]></itunes:summary>
    <description><![CDATA[<p>This week&apos;s episode is longer than usual, but we wanted to bring you the Cisco Talos Incident Response On Air livestream from last week for anyone who missed it. For anyone who prefers a video version, you can watch the recording <a href='https://youtu.be/HWoYnARhRvM'>here</a>.<br/><br/>In this discussion, researchers from Talos IR and the Talos Threat Intelligence and Interdiction team cover the top threats and attacker tactics they saw over the past quarter. They talk about why the use of web shells is way up, whether or not the ransomware decline is real and how multi-factor authentication could have stopped many of the threats they worked on in the first quarter of 2023. For more, read the latest <a href='https://blog.talosintelligence.com/quarterly-report-incident-response-trends-in-q1-2023/'>Talos IR Quarterly Trends report</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>This week&apos;s episode is longer than usual, but we wanted to bring you the Cisco Talos Incident Response On Air livestream from last week for anyone who missed it. For anyone who prefers a video version, you can watch the recording <a href='https://youtu.be/HWoYnARhRvM'>here</a>.<br/><br/>In this discussion, researchers from Talos IR and the Talos Threat Intelligence and Interdiction team cover the top threats and attacker tactics they saw over the past quarter. They talk about why the use of web shells is way up, whether or not the ransomware decline is real and how multi-factor authentication could have stopped many of the threats they worked on in the first quarter of 2023. For more, read the latest <a href='https://blog.talosintelligence.com/quarterly-report-incident-response-trends-in-q1-2023/'>Talos IR Quarterly Trends report</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12784675-xl-edition-talos-incident-response-livestream-on-top-trends-from-the-past-quarter.mp3" length="23687683" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12784675</guid>
    <pubDate>Fri, 05 May 2023 04:00:00 -0400</pubDate>
    <itunes:duration>1962</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>137</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Analyzing the recent takedown of popular dark web forums</itunes:title>
    <title>Analyzing the recent takedown of popular dark web forums</title>
    <itunes:summary><![CDATA[On the heels of law enforcement agencies from across the globe working together to disrupt two popular cybercrime forums — Genesis Market and BreachForums — Azim Khodjibaev from Talos' Threat Intelligence &amp; Interdiction team joins Jon to talk about these types of sites. Azim has years of experience infiltrating and investigating these types of marketplaces to learn about emerging security threats. He talks about what goes into these types of takedowns and where the sites' users are likely...]]></itunes:summary>
    <description><![CDATA[<p>On the heels of law enforcement agencies from across the globe working together to disrupt two popular cybercrime forums — Genesis Market and BreachForums — Azim Khodjibaev from Talos&apos; Threat Intelligence &amp; Interdiction team joins Jon to talk about these types of sites. Azim has years of experience infiltrating and investigating these types of marketplaces to learn about emerging security threats. He talks about what goes into these types of takedowns and where the sites&apos; users are likely to go from here.<br/><br/><b>Suggested reading:</b></p><ul><li><a href='https://www.axios.com/2023/03/21/data-breach-breachforums-fbi'>Data breach leak site BreachForums shuts down</a></li><li><a href='https://blog.talosintelligence.com/threat-source-newsletter-april-13-2023/'>Threat Source newsletter (April 13, 2023) — Dark web forum whac-a-mole</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>On the heels of law enforcement agencies from across the globe working together to disrupt two popular cybercrime forums — Genesis Market and BreachForums — Azim Khodjibaev from Talos&apos; Threat Intelligence &amp; Interdiction team joins Jon to talk about these types of sites. Azim has years of experience infiltrating and investigating these types of marketplaces to learn about emerging security threats. He talks about what goes into these types of takedowns and where the sites&apos; users are likely to go from here.<br/><br/><b>Suggested reading:</b></p><ul><li><a href='https://www.axios.com/2023/03/21/data-breach-breachforums-fbi'>Data breach leak site BreachForums shuts down</a></li><li><a href='https://blog.talosintelligence.com/threat-source-newsletter-april-13-2023/'>Threat Source newsletter (April 13, 2023) — Dark web forum whac-a-mole</a></li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12721139-analyzing-the-recent-takedown-of-popular-dark-web-forums.mp3" length="6571712" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12721139</guid>
    <pubDate>Fri, 28 Apr 2023 04:00:00 -0400</pubDate>
    <itunes:duration>536</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>136</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What does the future of MFA look like?</itunes:title>
    <title>What does the future of MFA look like?</title>
    <itunes:summary><![CDATA[Nowadays it seems like every major tech company has their own multi-factor authentication solution, whether that be a unique app, one-time passcode generation or the "classic" SMS two-factor code. Thorsten Rosendahl, the newest addition to the Cisco Talos Strategic Communications team in Europe, joins the show this week to discuss the conversations he's been having with customers in the field around MFA. He and Jon cover the news that Twitter is going to start charging for users to enroll in ...]]></itunes:summary>
    <description><![CDATA[<p>Nowadays it seems like every major tech company has their own multi-factor authentication solution, whether that be a unique app, one-time passcode generation or the &quot;classic&quot; SMS two-factor code. Thorsten Rosendahl, the newest addition to the Cisco Talos Strategic Communications team in Europe, joins the show this week to discuss the conversations he&apos;s been having with customers in the field around MFA. He and Jon cover the news that Twitter is going to start charging for users to enroll in SMS-based MFA, the challenge of having too many authenticator apps on their personal devices and how we can get closer to a passwordless future.<br/><br/><b>Other suggested reading:</b></p><ul><li><a href='https://blog.talosintelligence.com/threat-source-newsletter-feb-23-2023-social-media-sites-are-making-extra-security-a-paid-feature/'>Threat Source newsletter (Feb. 23, 2023) — Social media sites are making extra security a paid feature</a></li><li><a href='https://danielmiessler.com/blog/not-all-mfa-is-equal-and-the-differences-matter-a-lot/'>Not All MFA is Equal, and the Differences Matter a Lot</a></li><li><a href='https://blog.talosintelligence.com/talos-takes-ep-45-sms-authentication-is/'>Talos Takes Ep. #45: SMS authentication is still around, but that doesn&apos;t mean it&apos;s a good option</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>Nowadays it seems like every major tech company has their own multi-factor authentication solution, whether that be a unique app, one-time passcode generation or the &quot;classic&quot; SMS two-factor code. Thorsten Rosendahl, the newest addition to the Cisco Talos Strategic Communications team in Europe, joins the show this week to discuss the conversations he&apos;s been having with customers in the field around MFA. He and Jon cover the news that Twitter is going to start charging for users to enroll in SMS-based MFA, the challenge of having too many authenticator apps on their personal devices and how we can get closer to a passwordless future.<br/><br/><b>Other suggested reading:</b></p><ul><li><a href='https://blog.talosintelligence.com/threat-source-newsletter-feb-23-2023-social-media-sites-are-making-extra-security-a-paid-feature/'>Threat Source newsletter (Feb. 23, 2023) — Social media sites are making extra security a paid feature</a></li><li><a href='https://danielmiessler.com/blog/not-all-mfa-is-equal-and-the-differences-matter-a-lot/'>Not All MFA is Equal, and the Differences Matter a Lot</a></li><li><a href='https://blog.talosintelligence.com/talos-takes-ep-45-sms-authentication-is/'>Talos Takes Ep. #45: SMS authentication is still around, but that doesn&apos;t mean it&apos;s a good option</a></li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12695720-what-does-the-future-of-mfa-look-like.mp3" length="9138187" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12695720</guid>
    <pubDate>Fri, 21 Apr 2023 09:00:00 -0400</pubDate>
    <itunes:duration>750</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>135</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How to best prepare for, and respond to, supply chain attacks</itunes:title>
    <title>How to best prepare for, and respond to, supply chain attacks</title>
    <itunes:summary><![CDATA[With another major supply chain attack recently making headlines, we felt like it was a good time to refresh our advice on how to prepare for these types of cyber attacks. Adversaries are increasingly relying on users' inherent trust of the software running on their networks and devices to deliver hijacked, malicious updates that are actually malware. Craig Jackson, a senior Cisco Talos incident responder, joins the show to provide some advice on how organizations can prep for the next major ...]]></itunes:summary>
    <description><![CDATA[<p>With another major supply chain attack recently making headlines, we felt like it was a good time to refresh our advice on how to prepare for these types of cyber attacks. Adversaries are increasingly relying on users&apos; inherent trust of the software running on their networks and devices to deliver hijacked, malicious updates that are actually malware. Craig Jackson, a senior Cisco Talos incident responder, joins the show to provide some advice on how organizations can prep for the next major supply chain attack. We also discuss the current, ongoing 3CX situation and how anyone potentially affected could respond now. <br/><br/><b>Other suggested reading:</b></p><ul><li><a href='https://techcrunch.com/2023/04/11/3cx-north-korea-cryptocurrency-hack/'>3CX blames North Korea for supply chain mass-hack</a></li><li><a href='https://blog.talosintelligence.com/3cx-softphone-supply-chain-compromise/'>Talos blog post on the 3CX supply chain attack</a></li><li><a href='https://blog.talosintelligence.com/talos-ir-supply-chain-preparedness/'>The Company You Keep – Preparing for supply chain attacks with Talos IR<br/></a><br/></li></ul>]]></description>
    <content:encoded><![CDATA[<p>With another major supply chain attack recently making headlines, we felt like it was a good time to refresh our advice on how to prepare for these types of cyber attacks. Adversaries are increasingly relying on users&apos; inherent trust of the software running on their networks and devices to deliver hijacked, malicious updates that are actually malware. Craig Jackson, a senior Cisco Talos incident responder, joins the show to provide some advice on how organizations can prep for the next major supply chain attack. We also discuss the current, ongoing 3CX situation and how anyone potentially affected could respond now. <br/><br/><b>Other suggested reading:</b></p><ul><li><a href='https://techcrunch.com/2023/04/11/3cx-north-korea-cryptocurrency-hack/'>3CX blames North Korea for supply chain mass-hack</a></li><li><a href='https://blog.talosintelligence.com/3cx-softphone-supply-chain-compromise/'>Talos blog post on the 3CX supply chain attack</a></li><li><a href='https://blog.talosintelligence.com/talos-ir-supply-chain-preparedness/'>The Company You Keep – Preparing for supply chain attacks with Talos IR<br/></a><br/></li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12649912-how-to-best-prepare-for-and-respond-to-supply-chain-attacks.mp3" length="7012734" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12649912</guid>
    <pubDate>Fri, 14 Apr 2023 09:00:00 -0400</pubDate>
    <itunes:duration>573</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>134</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The defensive and offensive implications of ChatGPT and AI</itunes:title>
    <title>The defensive and offensive implications of ChatGPT and AI</title>
    <itunes:summary><![CDATA[Everyone is talking about tools like ChatGPT and other AI tools that are dominating headlines and threatening to upend every industry possible. But where do these things stand in cybersecurity? In this week's episode, Jon talks to two women who are well-versed on the topic and recently presented about the cybersecurity implications of AI at several conferences. Gergana Karadzhova of Cisco Talos Incident Response and Saskia Laura Schroer, a security consulting engineer for Cisco, discuss how A...]]></itunes:summary>
    <description><![CDATA[<p>Everyone is talking about tools like ChatGPT and other AI tools that are dominating headlines and threatening to upend every industry possible. But where do these things stand in cybersecurity? In this week&apos;s episode, Jon talks to two women who are well-versed on the topic and recently presented about the cybersecurity implications of AI at several conferences. Gergana Karadzhova of Cisco Talos Incident Response and Saskia Laura Schroer, a security consulting engineer for Cisco, discuss how AI is currently influencing attackers and defenders. Are attackers already using these tools? Does it give them superpowers? And what questions are still left unanswered about this emerging technology? </p>]]></description>
    <content:encoded><![CDATA[<p>Everyone is talking about tools like ChatGPT and other AI tools that are dominating headlines and threatening to upend every industry possible. But where do these things stand in cybersecurity? In this week&apos;s episode, Jon talks to two women who are well-versed on the topic and recently presented about the cybersecurity implications of AI at several conferences. Gergana Karadzhova of Cisco Talos Incident Response and Saskia Laura Schroer, a security consulting engineer for Cisco, discuss how AI is currently influencing attackers and defenders. Are attackers already using these tools? Does it give them superpowers? And what questions are still left unanswered about this emerging technology? </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12550520-the-defensive-and-offensive-implications-of-chatgpt-and-ai.mp3" length="10441907" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12550520</guid>
    <pubDate>Fri, 31 Mar 2023 04:00:00 -0400</pubDate>
    <itunes:duration>858</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>133</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #132: Reflecting on one year of Talos&#39; work in Ukraine</itunes:title>
    <title>Talos Takes Ep. #132: Reflecting on one year of Talos&#39; work in Ukraine</title>
    <itunes:summary><![CDATA[It's been just over a year since Talos formed our Ukraine-focused task force. After Russia's invasion of Ukraine, many of our teammates sprung into action to protect critical infrastructure and networks there — not to mention the Talos employees who literally had to fight back to protect their home country. In this week's episode of Talos Takes, J.J. Cummings, one of the lead organizers of this task force, joins the show to discuss the group's ongoing work. J.J. talks about where the situatio...]]></itunes:summary>
    <description><![CDATA[<p>It&apos;s been just over a year since Talos formed our Ukraine-focused task force. After Russia&apos;s invasion of Ukraine, many of our teammates sprung into action to protect critical infrastructure and networks there — not to mention the Talos employees who literally had to fight back to protect their home country. In this week&apos;s episode of Talos Takes, J.J. Cummings, one of the lead organizers of this task force, joins the show to discuss the group&apos;s ongoing work. J.J. talks about where the situation in Ukraine stands currently, how the cyber threats facing the country have evolved over the past year and much more. To further mark the one-year anniversary of the conflict, Talos has also <a href='https://blog.talosintelligence.com/fighting-the-good-fight-life-inside-the-talos-ukraine-task-unit/'>released a graphic novel</a> illustrating the formation of this task force. Additionally, the latest episode of <a href='https://blogs.cisco.com/security/people-matter-a-look-back-on-how-cisco-talos-has-been-supporting-ukraine'>ThreatWise TV from Cisco</a> highlights the work Talos and Cisco are doing in Ukraine. </p>]]></description>
    <content:encoded><![CDATA[<p>It&apos;s been just over a year since Talos formed our Ukraine-focused task force. After Russia&apos;s invasion of Ukraine, many of our teammates sprung into action to protect critical infrastructure and networks there — not to mention the Talos employees who literally had to fight back to protect their home country. In this week&apos;s episode of Talos Takes, J.J. Cummings, one of the lead organizers of this task force, joins the show to discuss the group&apos;s ongoing work. J.J. talks about where the situation in Ukraine stands currently, how the cyber threats facing the country have evolved over the past year and much more. To further mark the one-year anniversary of the conflict, Talos has also <a href='https://blog.talosintelligence.com/fighting-the-good-fight-life-inside-the-talos-ukraine-task-unit/'>released a graphic novel</a> illustrating the formation of this task force. Additionally, the latest episode of <a href='https://blogs.cisco.com/security/people-matter-a-look-back-on-how-cisco-talos-has-been-supporting-ukraine'>ThreatWise TV from Cisco</a> highlights the work Talos and Cisco are doing in Ukraine. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12502298-talos-takes-ep-132-reflecting-on-one-year-of-talos-work-in-ukraine.mp3" length="8774724" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12502298</guid>
    <pubDate>Fri, 24 Mar 2023 04:00:00 -0400</pubDate>
    <itunes:duration>720</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>132</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why does the Prometei botnet keep growing?</itunes:title>
    <title>Why does the Prometei botnet keep growing?</title>
    <itunes:summary><![CDATA[Vanja Svajcer and Andrew Windsor join the show this week to talk about their recent research into the Prometei botnet. This malware continues to evade detection and invade more machines so it can eventually hijack them to mine Monero cryptocurrency. Jon asks them about what's new with Prometei, why it's pretty generous in who it's targeting and where we could see it going next. Additional reading]]></itunes:summary>
    <description><![CDATA[<p>Vanja Svajcer and Andrew Windsor join the show this week to talk about their <a href='https://blog.talosintelligence.com/prometei-botnet-improves/'>recent research into the Prometei botnet</a>. This malware continues to evade detection and invade more machines so it can eventually hijack them to mine Monero cryptocurrency. Jon asks them about what&apos;s new with Prometei, why it&apos;s pretty generous in who it&apos;s targeting and where we could see it going next. <br/><br/><a href='https://blog.talosintelligence.com/prometei-botnet-and-its-quest-for-monero/'>Additional reading</a></p>]]></description>
    <content:encoded><![CDATA[<p>Vanja Svajcer and Andrew Windsor join the show this week to talk about their <a href='https://blog.talosintelligence.com/prometei-botnet-improves/'>recent research into the Prometei botnet</a>. This malware continues to evade detection and invade more machines so it can eventually hijack them to mine Monero cryptocurrency. Jon asks them about what&apos;s new with Prometei, why it&apos;s pretty generous in who it&apos;s targeting and where we could see it going next. <br/><br/><a href='https://blog.talosintelligence.com/prometei-botnet-and-its-quest-for-monero/'>Additional reading</a></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12460134-why-does-the-prometei-botnet-keep-growing.mp3" length="8774668" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12460134</guid>
    <pubDate>Fri, 17 Mar 2023 10:00:00 -0400</pubDate>
    <itunes:duration>720</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>131</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>There&#39;s not actually more spam during Tax Season — it&#39;s just different spam</itunes:title>
    <title>There&#39;s not actually more spam during Tax Season — it&#39;s just different spam</title>
    <itunes:summary><![CDATA[Public perception is such that it's assumed we just get more spam in the U.S. during two major times of the year — Tax Season and Black Friday. But over the past few years, this trend has become a thing of the past. With Tax Day approaching for Americans, there won't be more spam emails coming their way than usual, it'll just be different. Eric Peterson from Talos' email detection team joins the show for Jon's triumphant return from parental leave to talk about tax-related spam. Eric talks ab...]]></itunes:summary>
    <description><![CDATA[<p>Public perception is such that it&apos;s assumed we just get more spam in the U.S. during two major times of the year — Tax Season and Black Friday. But over the past few years, this trend has become a thing of the past. With Tax Day approaching for Americans, there won&apos;t be more spam emails coming their way than usual, it&apos;ll just be different. Eric Peterson from Talos&apos; email detection team joins the show for Jon&apos;s triumphant return from parental leave to talk about tax-related spam. Eric talks about topics he&apos;s seen so far this year and why it&apos;s a myth that spam volume changes as Tax Day approaches. </p>]]></description>
    <content:encoded><![CDATA[<p>Public perception is such that it&apos;s assumed we just get more spam in the U.S. during two major times of the year — Tax Season and Black Friday. But over the past few years, this trend has become a thing of the past. With Tax Day approaching for Americans, there won&apos;t be more spam emails coming their way than usual, it&apos;ll just be different. Eric Peterson from Talos&apos; email detection team joins the show for Jon&apos;s triumphant return from parental leave to talk about tax-related spam. Eric talks about topics he&apos;s seen so far this year and why it&apos;s a myth that spam volume changes as Tax Day approaches. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12413790-there-s-not-actually-more-spam-during-tax-season-it-s-just-different-spam.mp3" length="7373486" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12413790</guid>
    <pubDate>Fri, 10 Mar 2023 09:00:00 -0500</pubDate>
    <itunes:duration>603</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>130</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The benefits of taking an active approach to threat defense</itunes:title>
    <title>The benefits of taking an active approach to threat defense</title>
    <itunes:summary><![CDATA[Nick Biasini is back as host again to talk to Vitor Ventura about the benefits of taking an active approach to threat defense. Many organizations may just sit back and wait for something bad to happen. But as he outlined in his recent blog post, Vitor says there are many benefits to being proactive instead of reactive. Nick asks him about threat hunting as a team, scanning logs and tracking network traffic on an almost-constant basis. ]]></itunes:summary>
    <description><![CDATA[<p>Nick Biasini is back as host again to talk to Vitor Ventura about the benefits of taking an active approach to threat defense. Many organizations may just sit back and wait for something bad to happen. But as he outlined in <a href='https://blog.talosintelligence.com/beyond-the-basics-active-defense/'>his recent blog post</a>, Vitor says there are many benefits to being proactive instead of reactive. Nick asks him about threat hunting as a team, scanning logs and tracking network traffic on an almost-constant basis. </p>]]></description>
    <content:encoded><![CDATA[<p>Nick Biasini is back as host again to talk to Vitor Ventura about the benefits of taking an active approach to threat defense. Many organizations may just sit back and wait for something bad to happen. But as he outlined in <a href='https://blog.talosintelligence.com/beyond-the-basics-active-defense/'>his recent blog post</a>, Vitor says there are many benefits to being proactive instead of reactive. Nick asks him about threat hunting as a team, scanning logs and tracking network traffic on an almost-constant basis. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12367602-the-benefits-of-taking-an-active-approach-to-threat-defense.mp3" length="7783923" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12367602</guid>
    <pubDate>Fri, 03 Mar 2023 09:00:00 -0500</pubDate>
    <itunes:duration>637</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>129</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Year in Review - Ransomware and Commodity Loaders</itunes:title>
    <title>Year in Review - Ransomware and Commodity Loaders</title>
    <itunes:summary><![CDATA[We're back with the final year in review focused episode. This time the focus is on the ever broadening ransomware landscape and the commodity malware loaders that often support it. I'll be joined by one of the researchers from the year in review report, Aliza Johnson to talk about what we saw on the ransomware landscape over the last year as well as how threats like Qakbot, IcedID, and Trickbot have changed and evolved over the last year. We'll also cover how these threats overlap and how Lo...]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re back with the final year in review focused episode. This time the focus is on the ever broadening ransomware landscape and the commodity malware loaders that often support it. I&apos;ll be joined by one of the researchers from the year in review report, Aliza Johnson to talk about what we saw on the ransomware landscape over the last year as well as how threats like Qakbot, IcedID, and Trickbot have changed and evolved over the last year. We&apos;ll also cover how these threats overlap and how LoLBins are yet again an area of concern. </p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re back with the final year in review focused episode. This time the focus is on the ever broadening ransomware landscape and the commodity malware loaders that often support it. I&apos;ll be joined by one of the researchers from the year in review report, Aliza Johnson to talk about what we saw on the ransomware landscape over the last year as well as how threats like Qakbot, IcedID, and Trickbot have changed and evolved over the last year. We&apos;ll also cover how these threats overlap and how LoLBins are yet again an area of concern. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12218183-year-in-review-ransomware-and-commodity-loaders.mp3" length="8254218" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12218183</guid>
    <pubDate>Fri, 10 Feb 2023 10:00:00 -0500</pubDate>
    <itunes:duration>675</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>128</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Following the LNK metadata trail</itunes:title>
    <title>Following the LNK metadata trail</title>
    <itunes:summary><![CDATA[In this episode of Talos Takes I am joined by security researcher Guilherme Venere to discuss their recent research on LNK files. The usage of these files by malicious actors has exploded over the last six months as actors look to move away from macro based initial infection vectors. LNK files do have unique metadata attributes to allows for useful actor and threat tracking capabilities. We'll dig deeper on LNK files as well as the metadata you can leverage. For full details check out the blo...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Talos Takes I am joined by security researcher Guilherme Venere to discuss their recent research on LNK files. The usage of these files by malicious actors has exploded over the last six months as actors look to move away from macro based initial infection vectors. LNK files do have unique metadata attributes to allows for useful actor and threat tracking capabilities. We&apos;ll dig deeper on LNK files as well as the metadata you can leverage. For full details check out the blog at <a href='https://blog.talosintelligence.com/following-the-lnk-metadata-trail/'>https://blog.talosintelligence.com/following-the-lnk-metadata-trail/</a></p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Talos Takes I am joined by security researcher Guilherme Venere to discuss their recent research on LNK files. The usage of these files by malicious actors has exploded over the last six months as actors look to move away from macro based initial infection vectors. LNK files do have unique metadata attributes to allows for useful actor and threat tracking capabilities. We&apos;ll dig deeper on LNK files as well as the metadata you can leverage. For full details check out the blog at <a href='https://blog.talosintelligence.com/following-the-lnk-metadata-trail/'>https://blog.talosintelligence.com/following-the-lnk-metadata-trail/</a></p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12130685-following-the-lnk-metadata-trail.mp3" length="8529694" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12130685</guid>
    <pubDate>Fri, 03 Feb 2023 10:00:00 -0500</pubDate>
    <itunes:duration>698</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>127</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Year in Review - Threat Landscape Edition</itunes:title>
    <title>Year in Review - Threat Landscape Edition</title>
    <itunes:summary><![CDATA[We're back with another year in review focused episode. This time the focus will be the threat landscape generally and I'll be joined by threat researcher Caitlin Huey. In this episode we'll discuss what we found in the last year, with a focus on the general threat landscape.  We'll spend time discussing dual use tools, lolbins, and the surprising re-emergence of USB attacks in 2022. ]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re back with another year in review focused episode. This time the focus will be the threat landscape generally and I&apos;ll be joined by threat researcher Caitlin Huey. In this episode we&apos;ll discuss what we found in the last year, with a focus on the general threat landscape.  We&apos;ll spend time discussing dual use tools, lolbins, and the surprising re-emergence of USB attacks in 2022. </p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re back with another year in review focused episode. This time the focus will be the threat landscape generally and I&apos;ll be joined by threat researcher Caitlin Huey. In this episode we&apos;ll discuss what we found in the last year, with a focus on the general threat landscape.  We&apos;ll spend time discussing dual use tools, lolbins, and the surprising re-emergence of USB attacks in 2022. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12109205-year-in-review-threat-landscape-edition.mp3" length="5354734" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12109205</guid>
    <pubDate>Fri, 27 Jan 2023 10:00:00 -0500</pubDate>
    <itunes:duration>434</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>126</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>XLLing and the post macro era</itunes:title>
    <title>XLLing and the post macro era</title>
    <itunes:summary><![CDATA[In this episode of Talos Takes we are joined by Vanja Svjacer to discuss his recent blog on XLL abuse. This year Microsoft finally removed support for macros from their office suite creating a vacuum in the threat landscape. Macros had been the tool of choice for adversaries for the last several years and the race to find alternatives is underway. In this episode we'll talk a bit about Office Add-Ins and how we've already seen adversaries starting to abuse XLL files in the wild.]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Talos Takes we are joined by Vanja Svjacer to discuss his recent blog on XLL abuse. This year Microsoft finally removed support for macros from their office suite creating a vacuum in the threat landscape. Macros had been the tool of choice for adversaries for the last several years and the race to find alternatives is underway. In this episode we&apos;ll talk a bit about Office Add-Ins and how we&apos;ve already seen adversaries starting to abuse XLL files in the wild.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Talos Takes we are joined by Vanja Svjacer to discuss his recent blog on XLL abuse. This year Microsoft finally removed support for macros from their office suite creating a vacuum in the threat landscape. Macros had been the tool of choice for adversaries for the last several years and the race to find alternatives is underway. In this episode we&apos;ll talk a bit about Office Add-Ins and how we&apos;ve already seen adversaries starting to abuse XLL files in the wild.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12068797-xlling-and-the-post-macro-era.mp3" length="6876103" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12068797</guid>
    <pubDate>Fri, 20 Jan 2023 10:00:00 -0500</pubDate>
    <itunes:duration>561</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>125</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Year in Review: APT Summary Edition</itunes:title>
    <title>Year in Review: APT Summary Edition</title>
    <itunes:summary><![CDATA[In this episode of Talos Takes we are joined by Jacob Finn to discuss the APT summary section of the larger year in review report. These state sponsored actors tend to conduct more sophisticated, targeted campaigns typically related to espionage or other information gathering activities. This episode will dive a bit deeper on what can be found in the report as well as an overview of the state sponsored activity we've observed from the last year.]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Talos Takes we are joined by Jacob Finn to discuss the APT summary section of the larger year in review report. These state sponsored actors tend to conduct more sophisticated, targeted campaigns typically related to espionage or other information gathering activities. This episode will dive a bit deeper on what can be found in the report as well as an overview of the state sponsored activity we&apos;ve observed from the last year.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Talos Takes we are joined by Jacob Finn to discuss the APT summary section of the larger year in review report. These state sponsored actors tend to conduct more sophisticated, targeted campaigns typically related to espionage or other information gathering activities. This episode will dive a bit deeper on what can be found in the report as well as an overview of the state sponsored activity we&apos;ve observed from the last year.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/12016411-year-in-review-apt-summary-edition.mp3" length="9702004" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-12016411</guid>
    <pubDate>Fri, 13 Jan 2023 10:00:00 -0500</pubDate>
    <itunes:duration>796</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>124</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Truebot and the Silence group</itunes:title>
    <title>Truebot and the Silence group</title>
    <itunes:summary><![CDATA[In this episode of Talos Takes we are joined by Tiago Periera to discuss his recent blog on truebot activity. Truebot and the silence group have been active for a number of years operating primarily financially motivated cybercrime. In this episode we will talk about the recent campaign we observed as well as the tools and tactics we uncovered. We'll also discuss the links between these groups and other threat actors, like TA505.]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Talos Takes we are joined by Tiago Periera to discuss his recent blog on truebot activity. Truebot and the silence group have been active for a number of years operating primarily financially motivated cybercrime. In this episode we will talk about the recent campaign we observed as well as the tools and tactics we uncovered. We&apos;ll also discuss the links between these groups and other threat actors, like TA505.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Talos Takes we are joined by Tiago Periera to discuss his recent blog on truebot activity. Truebot and the silence group have been active for a number of years operating primarily financially motivated cybercrime. In this episode we will talk about the recent campaign we observed as well as the tools and tactics we uncovered. We&apos;ll also discuss the links between these groups and other threat actors, like TA505.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11977748-truebot-and-the-silence-group.mp3" length="8163714" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11977748</guid>
    <pubDate>Fri, 06 Jan 2023 10:00:00 -0500</pubDate>
    <itunes:duration>668</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>123</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Year in Review &amp; Ukraine Activities</itunes:title>
    <title>Year in Review &amp; Ukraine Activities</title>
    <itunes:summary><![CDATA[In this episode of Talos Takes we are joined by Kendall McKay to discuss the recently released year in review report and dig deep on our activities in Ukraine. The year in review covers a vast amount of data and intel sources to identify some of the key trends we observed in 2022. Our activities in Ukraine have been well documented, in this episode we'll also talk more broadly about the trends and highlight some key findings from the past year.]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Talos Takes we are joined by Kendall McKay to discuss the recently released year in review report and dig deep on our activities in Ukraine. The year in review covers a vast amount of data and intel sources to identify some of the key trends we observed in 2022. Our activities in Ukraine have been well documented, in this episode we&apos;ll also talk more broadly about the trends and highlight some key findings from the past year.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Talos Takes we are joined by Kendall McKay to discuss the recently released year in review report and dig deep on our activities in Ukraine. The year in review covers a vast amount of data and intel sources to identify some of the key trends we observed in 2022. Our activities in Ukraine have been well documented, in this episode we&apos;ll also talk more broadly about the trends and highlight some key findings from the past year.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11871810-year-in-review-ukraine-activities.mp3" length="7293108" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11871810</guid>
    <pubDate>Fri, 16 Dec 2022 10:00:00 -0500</pubDate>
    <itunes:duration>596</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>122</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Update on LodaRAT and its many variants</itunes:title>
    <title>Update on LodaRAT and its many variants</title>
    <itunes:summary><![CDATA[LodaRAT is an AutoIT based RAT that has been distributed for the last several years. Initially tied to the Kasablanka group its distribution has grown over the years. In this episode we'll be talking with the researcher, Chris Neal, to discuss LodaRAT, the campaigns we've been observing along with some key tidbits about how AutoIT is abused by adversaries. Including some fun with decompiling and recompling.]]></itunes:summary>
    <description><![CDATA[<p>LodaRAT is an AutoIT based RAT that has been distributed for the last several years. Initially tied to the Kasablanka group its distribution has grown over the years. In this episode we&apos;ll be talking with the researcher, Chris Neal, to discuss LodaRAT, the campaigns we&apos;ve been observing along with some key tidbits about how AutoIT is abused by adversaries. Including some fun with decompiling and recompling.</p>]]></description>
    <content:encoded><![CDATA[<p>LodaRAT is an AutoIT based RAT that has been distributed for the last several years. Initially tied to the Kasablanka group its distribution has grown over the years. In this episode we&apos;ll be talking with the researcher, Chris Neal, to discuss LodaRAT, the campaigns we&apos;ve been observing along with some key tidbits about how AutoIT is abused by adversaries. Including some fun with decompiling and recompling.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11788099-update-on-lodarat-and-its-many-variants.mp3" length="6290567" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11788099</guid>
    <pubDate>Fri, 02 Dec 2022 10:00:00 -0500</pubDate>
    <itunes:duration>513</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>121</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The basics of InterPlanetary File System (IPFS) and how its being abused</itunes:title>
    <title>The basics of InterPlanetary File System (IPFS) and how its being abused</title>
    <itunes:summary><![CDATA[InterPlanetary File System or IPFS has increased in prominence as a file hosting technology associated with Web 3.0. It's probably most well known for hosting NFTs, but this blockchain related technology is also being abused by bad actors. In this episode we'll be talking with Edmund Brumaghin about his recent research into IPFS and his findings. We'll also talk about the ways we've seen malicious actors abuse it and briefly touch on things organizations can do to protect themselves.]]></itunes:summary>
    <description><![CDATA[<p>InterPlanetary File System or IPFS has increased in prominence as a file hosting technology associated with Web 3.0. It&apos;s probably most well known for hosting NFTs, but this blockchain related technology is also being abused by bad actors. In this episode we&apos;ll be talking with Edmund Brumaghin about his recent research into IPFS and his findings. We&apos;ll also talk about the ways we&apos;ve seen malicious actors abuse it and briefly touch on things organizations can do to protect themselves.</p>]]></description>
    <content:encoded><![CDATA[<p>InterPlanetary File System or IPFS has increased in prominence as a file hosting technology associated with Web 3.0. It&apos;s probably most well known for hosting NFTs, but this blockchain related technology is also being abused by bad actors. In this episode we&apos;ll be talking with Edmund Brumaghin about his recent research into IPFS and his findings. We&apos;ll also talk about the ways we&apos;ve seen malicious actors abuse it and briefly touch on things organizations can do to protect themselves.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11707400-the-basics-of-interplanetary-file-system-ipfs-and-how-its-being-abused.mp3" length="5814154" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11707400</guid>
    <pubDate>Fri, 18 Nov 2022 10:00:00 -0500</pubDate>
    <itunes:duration>473</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>120</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The best (and free) ways to improve your cybersecurity skills</itunes:title>
    <title>The best (and free) ways to improve your cybersecurity skills</title>
    <itunes:summary><![CDATA[To wrap up Cybersecurity Awareness Month, we're looking at the best, and free, ways to improve your security skills. Jason Kirkland and David Roman from Cisco Talos Incident Response join Jon to talk about the websites, YouTube channels, social media profiles and more they use to stay up-to-date on security news and polish their cybersecurity skills. Here are links to some of the resources we spoke about in this episode:@SwiftOnSecurity@CISAgovBlue Team Village DiscordThe Definitive Comp...]]></itunes:summary>
    <description><![CDATA[<p>To wrap up Cybersecurity Awareness Month, we&apos;re looking at the best, and free, ways to improve your security skills. Jason Kirkland and David Roman from Cisco Talos Incident Response join Jon to talk about the websites, YouTube channels, social media profiles and more they use to stay up-to-date on security news and polish their cybersecurity skills. <br/><br/>Here are links to some of the resources we spoke about in this episode:</p><ul><li><a href='https://twitter.com/SwiftOnSecurity'>@SwiftOnSecurity</a></li><li><a href='https://twitter.com/CISAgov'>@CISAgov</a></li><li><a href='https://discord.blueteamvillage.org/'>Blue Team Village Discord</a></li><li><a href='https://aboutdfir.com/'>The Definitive Compendium Project<br/>Digital Forensics &amp; Incident Response</a></li><li><a href='https://www.securitybsides.com/'>Find your local BSides chapter</a></li><li><a href='https://dfirdiva.com/'>DFIR Diva</a></li><li><a href='https://tryhackme.com/'>TryHackMe</a></li><li><a href='https://www.reddit.com/r/netsec/'>R/Netsec</a></li><li><a href='https://www.youtube.com/channel/UCy8ntxFEudOCRZYT1f7ya9Q'>Thirteen3</a></li><li><a href='https://www.youtube.com/channel/UCPZ1DtzQkStYBSG3GTNoyfg'>Cisco Talos YouTube page</a></li></ul>]]></description>
    <content:encoded><![CDATA[<p>To wrap up Cybersecurity Awareness Month, we&apos;re looking at the best, and free, ways to improve your security skills. Jason Kirkland and David Roman from Cisco Talos Incident Response join Jon to talk about the websites, YouTube channels, social media profiles and more they use to stay up-to-date on security news and polish their cybersecurity skills. <br/><br/>Here are links to some of the resources we spoke about in this episode:</p><ul><li><a href='https://twitter.com/SwiftOnSecurity'>@SwiftOnSecurity</a></li><li><a href='https://twitter.com/CISAgov'>@CISAgov</a></li><li><a href='https://discord.blueteamvillage.org/'>Blue Team Village Discord</a></li><li><a href='https://aboutdfir.com/'>The Definitive Compendium Project<br/>Digital Forensics &amp; Incident Response</a></li><li><a href='https://www.securitybsides.com/'>Find your local BSides chapter</a></li><li><a href='https://dfirdiva.com/'>DFIR Diva</a></li><li><a href='https://tryhackme.com/'>TryHackMe</a></li><li><a href='https://www.reddit.com/r/netsec/'>R/Netsec</a></li><li><a href='https://www.youtube.com/channel/UCy8ntxFEudOCRZYT1f7ya9Q'>Thirteen3</a></li><li><a href='https://www.youtube.com/channel/UCPZ1DtzQkStYBSG3GTNoyfg'>Cisco Talos YouTube page</a></li></ul>]]></content:encoded>
    <itunes:author></itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11586703-the-best-and-free-ways-to-improve-your-cybersecurity-skills.mp3" length="8927742" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11586703</guid>
    <pubDate>Fri, 28 Oct 2022 10:00:00 -0400</pubDate>
    <itunes:duration>732</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>119</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The basics of threat hunting</itunes:title>
    <title>The basics of threat hunting</title>
    <itunes:summary><![CDATA[To celebrate this week's National Cybersecurity Awareness Month theme, we have a special 101 episode of Talos Takes to cover the basics of threat hunting. This is a crucial skill for any cybersecurity professional-in-training and one of the questions we get the most often. Asheer Malhotra from the Talos Outreach team joins the show to talk about where he starts finding new malware families and threat actors, what the barriers usually are that he has to overcome and what check boxes he has to ...]]></itunes:summary>
    <description><![CDATA[<p>To celebrate this week&apos;s National Cybersecurity Awareness Month theme, we have a special 101 episode of Talos Takes to cover the basics of threat hunting. This is a crucial skill for any cybersecurity professional-in-training and one of the questions we get the most often. Asheer Malhotra from the Talos Outreach team joins the show to talk about where he starts finding new malware families and threat actors, what the barriers usually are that he has to overcome and what check boxes he has to hit before he can talk about something publicly. For more on this topic, watch our &quot;Threat Hunting 101&quot; livestream from earlier this week <a href='https://www.linkedin.com/feed/update/urn:li:activity:6988528854382346241'>here</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>To celebrate this week&apos;s National Cybersecurity Awareness Month theme, we have a special 101 episode of Talos Takes to cover the basics of threat hunting. This is a crucial skill for any cybersecurity professional-in-training and one of the questions we get the most often. Asheer Malhotra from the Talos Outreach team joins the show to talk about where he starts finding new malware families and threat actors, what the barriers usually are that he has to overcome and what check boxes he has to hit before he can talk about something publicly. For more on this topic, watch our &quot;Threat Hunting 101&quot; livestream from earlier this week <a href='https://www.linkedin.com/feed/update/urn:li:activity:6988528854382346241'>here</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11542593-the-basics-of-threat-hunting.mp3" length="7523054" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11542593</guid>
    <pubDate>Fri, 21 Oct 2022 10:00:00 -0400</pubDate>
    <itunes:duration>615</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>118</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tips for kickstarting your cybersecurity career</itunes:title>
    <title>Tips for kickstarting your cybersecurity career</title>
    <itunes:summary><![CDATA[To celebrate National Cybersecurity Awareness Month, two one-time "security noobs" talk about their career trajectories and how they've grown to see themselves in cyber. Sammi Seaman and Jon Munshaw talk about their previous careers in library services and journalism, respectively, and how they applied some of those skills to cybersecurity. Other talking points include:Cybersecurity "ah ha!" moments.Not being afraid to ask questions.Free ways to expand one's cybersecurity knowledge.The import...]]></itunes:summary>
    <description><![CDATA[<p>To celebrate National Cybersecurity Awareness Month, two one-time &quot;security noobs&quot; talk about their career trajectories and how they&apos;ve grown to see themselves in cyber. Sammi Seaman and Jon Munshaw talk about their previous careers in library services and journalism, respectively, and how they applied some of those skills to cybersecurity. Other talking points include:<br/><br/></p><ul><li>Cybersecurity &quot;ah ha!&quot; moments.</li><li>Not being afraid to ask questions.</li><li>Free ways to expand one&apos;s cybersecurity knowledge.</li><li>The importance of getting involved in local cybersecurity conferences and non-profits.</li></ul>]]></description>
    <content:encoded><![CDATA[<p>To celebrate National Cybersecurity Awareness Month, two one-time &quot;security noobs&quot; talk about their career trajectories and how they&apos;ve grown to see themselves in cyber. Sammi Seaman and Jon Munshaw talk about their previous careers in library services and journalism, respectively, and how they applied some of those skills to cybersecurity. Other talking points include:<br/><br/></p><ul><li>Cybersecurity &quot;ah ha!&quot; moments.</li><li>Not being afraid to ask questions.</li><li>Free ways to expand one&apos;s cybersecurity knowledge.</li><li>The importance of getting involved in local cybersecurity conferences and non-profits.</li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11500209-tips-for-kickstarting-your-cybersecurity-career.mp3" length="10450406" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11500209</guid>
    <pubDate>Fri, 14 Oct 2022 10:00:00 -0400</pubDate>
    <itunes:duration>859</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>117</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The latest on Lockbit 3.0 drama and the rest of the ransomware landscape</itunes:title>
    <title>The latest on Lockbit 3.0 drama and the rest of the ransomware landscape</title>
    <itunes:summary><![CDATA[Azim Khodjibaev joins the show once again for the latest addition of "Days of our Ransomware." Jon and Azim talk about the recent LockBit 3.0 leaks and the drama surrounding them. Will other actors try to backpack off the leaked builder? Why is LockBit switching to triple extortion tactics now? And what other trends are going on in the ransomware landscape? This is the perfect place to get caught up on all things ransomware to head into the rest of National Cybersecurity Awareness Month. ]]></itunes:summary>
    <description><![CDATA[<p>Azim Khodjibaev joins the show once again for the latest addition of &quot;Days of our Ransomware.&quot; Jon and Azim talk about the recent LockBit 3.0 leaks and the drama surrounding them. Will other actors try to backpack off the leaked builder? Why is LockBit switching to triple extortion tactics now? And what other trends are going on in the ransomware landscape? This is the perfect place to get caught up on all things ransomware to head into the rest of National Cybersecurity Awareness Month. </p>]]></description>
    <content:encoded><![CDATA[<p>Azim Khodjibaev joins the show once again for the latest addition of &quot;Days of our Ransomware.&quot; Jon and Azim talk about the recent LockBit 3.0 leaks and the drama surrounding them. Will other actors try to backpack off the leaked builder? Why is LockBit switching to triple extortion tactics now? And what other trends are going on in the ransomware landscape? This is the perfect place to get caught up on all things ransomware to head into the rest of National Cybersecurity Awareness Month. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11457844-the-latest-on-lockbit-3-0-drama-and-the-rest-of-the-ransomware-landscape.mp3" length="6927197" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11457844</guid>
    <pubDate>Fri, 07 Oct 2022 11:00:00 -0400</pubDate>
    <itunes:duration>566</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>116</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>An &quot;insider threat&quot; doesn&#39;t always have to know they&#39;re a threat</itunes:title>
    <title>An &quot;insider threat&quot; doesn&#39;t always have to know they&#39;re a threat</title>
    <itunes:summary><![CDATA[Nick Biasini is back on once again to talk to Jon about Insider Threats. Nick recently wrote a post about how he and Cisco Talos Incident Response are seeing an increase in these types of attacks in the wild. And while the term "insider threat" may sound like someone actively seeking to do something bad, that's now always the case. This week's episode discusses how to prepare for Insider Threats and some of the hallmarks of the spam emails, calls and mobile notifications we're seeing in these...]]></itunes:summary>
    <description><![CDATA[<p>Nick Biasini is back on once again to talk to Jon about Insider Threats. <a href='https://blog.talosintelligence.com/2022/09/insider-threats-increasing.html'>Nick recently wrote a post about how he and Cisco Talos Incident Response are seeing an increase in these types of attacks in the wild</a>. And while the term &quot;insider threat&quot; may sound like someone actively seeking to do something bad, that&apos;s now always the case. This week&apos;s episode discusses how to prepare for Insider Threats and some of the hallmarks of the spam emails, calls and mobile notifications we&apos;re seeing in these campaigns. </p>]]></description>
    <content:encoded><![CDATA[<p>Nick Biasini is back on once again to talk to Jon about Insider Threats. <a href='https://blog.talosintelligence.com/2022/09/insider-threats-increasing.html'>Nick recently wrote a post about how he and Cisco Talos Incident Response are seeing an increase in these types of attacks in the wild</a>. And while the term &quot;insider threat&quot; may sound like someone actively seeking to do something bad, that&apos;s now always the case. This week&apos;s episode discusses how to prepare for Insider Threats and some of the hallmarks of the spam emails, calls and mobile notifications we&apos;re seeing in these campaigns. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11413990-an-insider-threat-doesn-t-always-have-to-know-they-re-a-threat.mp3" length="5183488" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11413990</guid>
    <pubDate>Fri, 30 Sep 2022 10:00:00 -0400</pubDate>
    <itunes:duration>421</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>115</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Once more into the Lazarus Pit</itunes:title>
    <title>Once more into the Lazarus Pit</title>
    <itunes:summary><![CDATA[Vitor Ventura from the Talos Outreach team joins the show this week to run down Talos' recent research into the Lazarus Group. This well-known North Korean state-sponsored threat actor is well known for their ransomware and cryptocurrency-related cyber attacks, but we recently found them launching a new information-stealing trojan targeting energy companies. Vitor talks about the new trojan, MagicRAT, and how it fits into their larger plans and motivations. ]]></itunes:summary>
    <description><![CDATA[<p>Vitor Ventura from the Talos Outreach team joins the show this week to run down Talos&apos; recent research into the Lazarus Group. This well-known North Korean state-sponsored threat actor is well known for their ransomware and cryptocurrency-related cyber attacks, but we recently found them <a href='https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html'>launching a new information-stealing trojan targeting energy companies</a>. Vitor talks about <a href='https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html'>the new trojan, MagicRAT,</a> and how it fits into their larger plans and motivations. </p>]]></description>
    <content:encoded><![CDATA[<p>Vitor Ventura from the Talos Outreach team joins the show this week to run down Talos&apos; recent research into the Lazarus Group. This well-known North Korean state-sponsored threat actor is well known for their ransomware and cryptocurrency-related cyber attacks, but we recently found them <a href='https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html'>launching a new information-stealing trojan targeting energy companies</a>. Vitor talks about <a href='https://blog.talosintelligence.com/2022/09/lazarus-magicrat.html'>the new trojan, MagicRAT,</a> and how it fits into their larger plans and motivations. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11372621-once-more-into-the-lazarus-pit.mp3" length="5945601" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11372621</guid>
    <pubDate>Fri, 23 Sep 2022 10:00:00 -0400</pubDate>
    <itunes:duration>484</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>114</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Digging into Gamaredon&#39;s cave and its recent campaign against Ukraine</itunes:title>
    <title>Digging into Gamaredon&#39;s cave and its recent campaign against Ukraine</title>
    <itunes:summary><![CDATA[Guilherme Venere of the Outreach team joins Jon this week to discuss the Gamaredon APT group. This Russian state-sponsored actor is infamous at this point in its life, but it keeps growing by adding new tools and malware. Recently, Guilherme helped to discover a new campaign targeting users and organizations in Ukraine, a common target of Gamaredon since the onset of Russia's invasion. They discuss what's unique about this particular attack, and why we can't just assume their activities will ...]]></itunes:summary>
    <description><![CDATA[<p>Guilherme Venere of the Outreach team joins Jon this week to discuss the Gamaredon APT group. This Russian state-sponsored actor is infamous at this point in its life, but it keeps growing by adding new tools and malware. Recently, Guilherme helped to <a href='https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html'>discover a new campaign targeting users and organizations in Ukraine</a>, a common target of Gamaredon since the onset of Russia&apos;s invasion. They discuss what&apos;s unique about this particular attack, and why we can&apos;t just assume their activities will stay isolated to Ukraine for the time being. </p>]]></description>
    <content:encoded><![CDATA[<p>Guilherme Venere of the Outreach team joins Jon this week to discuss the Gamaredon APT group. This Russian state-sponsored actor is infamous at this point in its life, but it keeps growing by adding new tools and malware. Recently, Guilherme helped to <a href='https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html'>discover a new campaign targeting users and organizations in Ukraine</a>, a common target of Gamaredon since the onset of Russia&apos;s invasion. They discuss what&apos;s unique about this particular attack, and why we can&apos;t just assume their activities will stay isolated to Ukraine for the time being. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11332516-digging-into-gamaredon-s-cave-and-its-recent-campaign-against-ukraine.mp3" length="4862466" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11332516</guid>
    <pubDate>Fri, 16 Sep 2022 13:00:00 -0400</pubDate>
    <itunes:duration>394</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>113</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Back to school advice for teachers, students, parents, admins and everyone in between</itunes:title>
    <title>Back to school advice for teachers, students, parents, admins and everyone in between</title>
    <itunes:summary><![CDATA[We're headed back to school with Talos Takes again! Pierre Cadieux from Cisco Talos Incident Response joins the show to talk about advice for educational institutions. Jon asks him about common incident response advice for the education sector and we cover security advice for school admins, parents and students who have to worry about electronic devices traveling to and from school and connecting to all sorts of networks. This episode is particularly relevant this week given some recent major...]]></itunes:summary>
    <description><![CDATA[<p>We&apos;re headed back to school with Talos Takes again! Pierre Cadieux from Cisco Talos Incident Response joins the show to talk about advice for educational institutions. Jon asks him about common incident response advice for the education sector and we cover security advice for school admins, parents and students who have to worry about electronic devices traveling to and from school and connecting to all sorts of networks. This episode is particularly relevant this week given some recent major cyber attacks against the education sector, including a major event at the <a href='https://www.npr.org/2022/09/07/1121422336/a-cyberattack-hits-the-los-angeles-school-district-raising-alarm-across-the-coun'>combined Los Angeles school district</a>. </p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;re headed back to school with Talos Takes again! Pierre Cadieux from Cisco Talos Incident Response joins the show to talk about advice for educational institutions. Jon asks him about common incident response advice for the education sector and we cover security advice for school admins, parents and students who have to worry about electronic devices traveling to and from school and connecting to all sorts of networks. This episode is particularly relevant this week given some recent major cyber attacks against the education sector, including a major event at the <a href='https://www.npr.org/2022/09/07/1121422336/a-cyberattack-hits-the-los-angeles-school-district-raising-alarm-across-the-coun'>combined Los Angeles school district</a>. </p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11283506-back-to-school-advice-for-teachers-students-parents-admins-and-everyone-in-between.mp3" length="8966126" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11283506</guid>
    <pubDate>Fri, 09 Sep 2022 08:00:00 -0400</pubDate>
    <podcast:soundbite startTime="190.0" duration="43.0" />
    <itunes:duration>736</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>112</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>XL Edition: Talos&#39; update on our work in Ukraine</itunes:title>
    <title>XL Edition: Talos&#39; update on our work in Ukraine</title>
    <itunes:summary><![CDATA[This week, we have the audio version of our recent livestream for Ukraine Independence Day. Talos assembled a panel of experts who have been working hands-on to defend critical Ukraine systems and its citizens from cyber threats. JJ Cummings, Ashlee Benge and Dmytro Krozhevin answer questions from Hazel Burton about the current security threats Ukraine faces, what Talos has done to hunt for threats in the region and how Cisco is supporting its employees in Ukraine.]]></itunes:summary>
    <description><![CDATA[<p>This week, we have the audio version of our recent livestream for Ukraine Independence Day. Talos assembled a panel of experts who have been working hands-on to defend critical Ukraine systems and its citizens from cyber threats. JJ Cummings, Ashlee Benge and Dmytro Krozhevin answer questions from Hazel Burton about the current security threats Ukraine faces, what Talos has done to hunt for threats in the region and how Cisco is supporting its employees in Ukraine.</p>]]></description>
    <content:encoded><![CDATA[<p>This week, we have the audio version of our recent livestream for Ukraine Independence Day. Talos assembled a panel of experts who have been working hands-on to defend critical Ukraine systems and its citizens from cyber threats. JJ Cummings, Ashlee Benge and Dmytro Krozhevin answer questions from Hazel Burton about the current security threats Ukraine faces, what Talos has done to hunt for threats in the region and how Cisco is supporting its employees in Ukraine.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11249235-xl-edition-talos-update-on-our-work-in-ukraine.mp3" length="40259387" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11249235</guid>
    <pubDate>Fri, 02 Sep 2022 09:00:00 -0400</pubDate>
    <itunes:duration>3344</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>111</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #110: The kinetic and cyber threats Ukrainian agriculture faces</itunes:title>
    <title>Talos Takes Ep. #110: The kinetic and cyber threats Ukrainian agriculture faces</title>
    <itunes:summary><![CDATA[An underrated aspect of Russia’s invasion of Ukraine is the effect it’s had on the global food supply chain. Ukraine is a major importer and exporter of grain and other food staples, but the industry now faces kinetic and cyber threats. Joe Marshall of Talos has spent months learning all about agricultural cybersecurity and the unique position farming equipment and infrastructure is in. Joe recently wrote about these threats for the Talos blog and joins Talos Takes to talk about how important...]]></itunes:summary>
    <description><![CDATA[<ul><li>An underrated aspect of Russia’s invasion of Ukraine is the effect it’s had on the global food supply chain. Ukraine is a major importer and exporter of grain and other food staples, but the industry now faces kinetic and cyber threats. Joe Marshall of Talos has spent months learning all about agricultural cybersecurity and the unique position farming equipment and infrastructure is in. Joe <a href='https://blog.talosintelligence.com/2022/08/ukraine-and-fragility-of-agriculture.html'>recently wrote about these threats for the Talos blog</a> and joins Talos Takes to talk about how important Ukraine is to the global food supply chain and what law enforcement and global governments can do to prepare for potential state-sponsored attacks.</li></ul>]]></description>
    <content:encoded><![CDATA[<ul><li>An underrated aspect of Russia’s invasion of Ukraine is the effect it’s had on the global food supply chain. Ukraine is a major importer and exporter of grain and other food staples, but the industry now faces kinetic and cyber threats. Joe Marshall of Talos has spent months learning all about agricultural cybersecurity and the unique position farming equipment and infrastructure is in. Joe <a href='https://blog.talosintelligence.com/2022/08/ukraine-and-fragility-of-agriculture.html'>recently wrote about these threats for the Talos blog</a> and joins Talos Takes to talk about how important Ukraine is to the global food supply chain and what law enforcement and global governments can do to prepare for potential state-sponsored attacks.</li></ul>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11208132-talos-takes-ep-110-the-kinetic-and-cyber-threats-ukrainian-agriculture-faces.mp3" length="6106783" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11208132</guid>
    <pubDate>Fri, 26 Aug 2022 09:00:00 -0400</pubDate>
    <itunes:duration>498</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>110</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #109: Why cybercrime is going small-time</itunes:title>
    <title>Talos Takes Ep. #109: Why cybercrime is going small-time</title>
    <itunes:summary><![CDATA[The public traditionally thinks about cyber attacks as being from some well-funded, state-sponsored actor. But increasingly small-time criminals are turning to the internet to make their money. Increasingly, they’re not carrying out one-off robberies, and instead are working on insurance fraud scams and spam emails. Nick Biasini joins Talos Takes this week to discuss his recent research into this topic and shares what the data shows about the growth of small-time cybercrime.]]></itunes:summary>
    <description><![CDATA[<p>The public traditionally thinks about cyber attacks as being from some well-funded, state-sponsored actor. But increasingly small-time criminals are turning to the internet to make their money. Increasingly, they’re not carrying out one-off robberies, and instead are working on insurance fraud scams and spam emails. Nick Biasini joins Talos Takes this week to discuss his <a href='https://blog.talosintelligence.com/2022/08/smalltime-cybercrime.html'>recent research into this topic</a> and shares what the data shows about the growth of small-time cybercrime.</p>]]></description>
    <content:encoded><![CDATA[<p>The public traditionally thinks about cyber attacks as being from some well-funded, state-sponsored actor. But increasingly small-time criminals are turning to the internet to make their money. Increasingly, they’re not carrying out one-off robberies, and instead are working on insurance fraud scams and spam emails. Nick Biasini joins Talos Takes this week to discuss his <a href='https://blog.talosintelligence.com/2022/08/smalltime-cybercrime.html'>recent research into this topic</a> and shares what the data shows about the growth of small-time cybercrime.</p>]]></content:encoded>
    <itunes:author>Cisco Talos</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11165673-talos-takes-ep-109-why-cybercrime-is-going-small-time.mp3" length="6192764" type="audio/mpeg" />
    <guid isPermaLink="false">Buzzsprout-11165673</guid>
    <pubDate>Fri, 19 Aug 2022 09:00:00 -0400</pubDate>
    <itunes:duration>505</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episode>109</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #61: Why does SideCopy seem so familiar?</itunes:title>
    <title>Talos Takes Ep. #61: Why does SideCopy seem so familiar?</title>
    <itunes:summary><![CDATA[The last time Jon had Asheer Malhotra from Talos Outreach on the show, they covered the Transparent Tribe APT. Asheer joins the show again this week to talk about another threat actor that is very similar to Transparent Tribe, but is just a tad different. Asheer recently co-authored a research paper on the aptly named SideCopy actor, which borrows many TTPs from their fellow actors, including Transparent Tribe. This episode, we’ll talk about SideCopy’s methods, why they may be borrowing so mu...]]></itunes:summary>
    <description><![CDATA[<div>The last time Jon had Asheer Malhotra from Talos Outreach on the show, they covered the <a href='https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html'>Transparent Tribe APT</a>. Asheer joins the show again this week to talk about another threat actor that is <em>very</em> similar to Transparent Tribe, but is just a tad different. Asheer recently co-authored <a href='https://talosintelligence.com/resources/257'>a research paper</a> on the <a href='https://blog.talosintelligence.com/2021/07/sidecopy.html'>aptly named SideCopy actor</a>, which borrows many TTPs from their fellow actors, including Transparent Tribe. This episode, we’ll talk about SideCopy’s methods, why they may be borrowing so much from those around them and where they could go from here.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The last time Jon had Asheer Malhotra from Talos Outreach on the show, they covered the <a href='https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html'>Transparent Tribe APT</a>. Asheer joins the show again this week to talk about another threat actor that is <em>very</em> similar to Transparent Tribe, but is just a tad different. Asheer recently co-authored <a href='https://talosintelligence.com/resources/257'>a research paper</a> on the <a href='https://blog.talosintelligence.com/2021/07/sidecopy.html'>aptly named SideCopy actor</a>, which borrows many TTPs from their fellow actors, including Transparent Tribe. This episode, we’ll talk about SideCopy’s methods, why they may be borrowing so much from those around them and where they could go from here.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127958-talos-takes-ep-61-why-does-sidecopy-seem-so-familiar.mp3" length="6207372" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/459</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>508</itunes:duration>
    <itunes:keywords>APTs, SideCopy, RATs, trojans, spam, phishing</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #59: A deep dive into vulnerabilities in a home security station</itunes:title>
    <title>Talos Takes Ep. #59: A deep dive into vulnerabilities in a home security station</title>
    <itunes:summary><![CDATA[We’ve spent many minutes (that’s the point of the podcast, after all) discussing internet-of-things devices on this podcast. As consumers start having more “smart” devices connected to their home network, they may want an easy solution to keeping those devices safe. But what if that device gets owned?Carl Hurd of our vulnerability research team recently discovered several vulnerabilities in Trend Micro’s Home Network Security Station. He joins the show for the first time to talk about his res...]]></itunes:summary>
    <description><![CDATA[<div>We’ve spent many minutes (that’s the point of the podcast, after all) discussing internet-of-things devices on this podcast. As consumers start having more “smart” devices connected to their home network, they may want an easy solution to keeping those devices safe. But what if <em>that</em> device gets owned?<br/><br/></div><div>Carl Hurd of our vulnerability research team <a href='https://blog.talosintelligence.com/2021/05/vuln-spotlight-trend-i.html'>recently discovered several vulnerabilities</a> in Trend Micro’s Home Network Security Station. He joins the show for the first time to talk about his research, the pros and cons of these all-in-one home network security devices, and how an attacker could exploit these issues to spy on your devices.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We’ve spent many minutes (that’s the point of the podcast, after all) discussing internet-of-things devices on this podcast. As consumers start having more “smart” devices connected to their home network, they may want an easy solution to keeping those devices safe. But what if <em>that</em> device gets owned?<br/><br/></div><div>Carl Hurd of our vulnerability research team <a href='https://blog.talosintelligence.com/2021/05/vuln-spotlight-trend-i.html'>recently discovered several vulnerabilities</a> in Trend Micro’s Home Network Security Station. He joins the show for the first time to talk about his research, the pros and cons of these all-in-one home network security devices, and how an attacker could exploit these issues to spy on your devices.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Carl Hurd (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127957-talos-takes-ep-59-a-deep-dive-into-vulnerabilities-in-a-home-security-station.mp3" length="7612789" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/457</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>625</itunes:duration>
    <itunes:keywords>vulnerabilities, IoT, home security</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #58: It&#39;s time to get serious about protecting critical infrastructure</itunes:title>
    <title>Talos Takes Ep. #58: It&#39;s time to get serious about protecting critical infrastructure</title>
    <itunes:summary><![CDATA[With major cyber attacks in recent years against major U.S. critical infrastructure suppliers like Norsk Hydro and Colonial Pipeline, we’re in a new world of CI cybersecurity. New threats require new approaches to defense. And in the U.S., this is likely going to include partnerships between those who manage critical infrastructure, government and the private cybersecurity sector.Talos recently outlined what this may look like in America. One of the authors of that post, Joe Marshall, joins J...]]></itunes:summary>
    <description><![CDATA[<div>With major cyber attacks in recent years against major U.S. critical infrastructure suppliers like <a href='https://news.microsoft.com/transform/hackers-hit-norsk-hydro-ransomware-company-responded-transparency/'>Norsk Hydro</a> and <a href='https://www.zdnet.com/article/colonial-pipeline-ransomware-attack-everything-you-need-to-know/'>Colonial Pipeline</a>, we’re in a new world of CI cybersecurity. New threats require new approaches to defense. And in the U.S., this is likely going to include partnerships between those who manage critical infrastructure, government and the private cybersecurity sector.<br/><br/></div><div>Talos <a href='https://blog.talosintelligence.com/2021/06/new-world-after-pipeline-ransomware-ONG.html'>recently outlined what this may look like in America</a>. One of the authors of that post, Joe Marshall, joins Jon Munshaw this week on Talos Takes to talk about public-private partnerships to defend critical infrastructure.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>With major cyber attacks in recent years against major U.S. critical infrastructure suppliers like <a href='https://news.microsoft.com/transform/hackers-hit-norsk-hydro-ransomware-company-responded-transparency/'>Norsk Hydro</a> and <a href='https://www.zdnet.com/article/colonial-pipeline-ransomware-attack-everything-you-need-to-know/'>Colonial Pipeline</a>, we’re in a new world of CI cybersecurity. New threats require new approaches to defense. And in the U.S., this is likely going to include partnerships between those who manage critical infrastructure, government and the private cybersecurity sector.<br/><br/></div><div>Talos <a href='https://blog.talosintelligence.com/2021/06/new-world-after-pipeline-ransomware-ONG.html'>recently outlined what this may look like in America</a>. One of the authors of that post, Joe Marshall, joins Jon Munshaw this week on Talos Takes to talk about public-private partnerships to defend critical infrastructure.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Joe Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127956-talos-takes-ep-58-it-s-time-to-get-serious-about-protecting-critical-infrastructure.mp3" length="6360006" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/456</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>521</itunes:duration>
    <itunes:keywords>critical infrastructure, oil and natural gas, ransomware, operational technology</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #57: What&#39;s in it for both sides of the ransomware-as-a-service model?</itunes:title>
    <title>Talos Takes Ep. #57: What&#39;s in it for both sides of the ransomware-as-a-service model?</title>
    <itunes:summary><![CDATA[How much is ransomware-as-a-service like a McDonald’s franchise? More similar than you’d think! The RaaS model has entered the mainstream over the past few months with groups such as DarkSide attacking the Colonial Pipeline.In these transactions, what’s in it for the original ransomware creator? And what do the operators themselves get out of it? Nick Biasini joins Jon Munshaw this week to talk about this business model, what it means for the rise in ransomware attacks, and how you can stay p...]]></itunes:summary>
    <description><![CDATA[<div>How much is ransomware-as-a-service like a McDonald’s franchise? More similar than you’d think! The RaaS model has entered the mainstream over the past few months with groups such as <a href='https://blog.talosintelligence.com/2021/06/new-world-after-pipeline-ransomware-ONG.html'>DarkSide attacking the Colonial Pipeline</a>.<br/><br/></div><div>In these transactions, what’s in it for the original ransomware creator? And what do the operators themselves get out of it? Nick Biasini joins Jon Munshaw this week to talk about this business model, what it means for the rise in ransomware attacks, and how you can stay protected.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>How much is ransomware-as-a-service like a McDonald’s franchise? More similar than you’d think! The RaaS model has entered the mainstream over the past few months with groups such as <a href='https://blog.talosintelligence.com/2021/06/new-world-after-pipeline-ransomware-ONG.html'>DarkSide attacking the Colonial Pipeline</a>.<br/><br/></div><div>In these transactions, what’s in it for the original ransomware creator? And what do the operators themselves get out of it? Nick Biasini joins Jon Munshaw this week to talk about this business model, what it means for the rise in ransomware attacks, and how you can stay protected.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127955-talos-takes-ep-57-what-s-in-it-for-both-sides-of-the-ransomware-as-a-service-model.mp3" length="4038139" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/454</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>327</itunes:duration>
    <itunes:keywords>ransomware, ransomware-as-a-service, OT, critical infrastructure</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #62: There&#39;s still plenty of mileage left in BEC</itunes:title>
    <title>Talos Takes Ep. #62: There&#39;s still plenty of mileage left in BEC</title>
    <itunes:summary><![CDATA[Business email compromise may seem like last decade’s threat, but it’s still just as prevalent as ever. A recent FBI report found that it cost users more than $1 billion in 2020, and attackers are now capitalizing on everything from PlayStation 5 sales to the COVID-19 pandemic to still scam people. On this week’s Talos Takes, Nick Biasini recaps his recent research into BEC and discusses why there are some reasons why this threat may never go away (hint: users).]]></itunes:summary>
    <description><![CDATA[<div><a href='https://blog.talosintelligence.com/2021/06/business-email-compromise.html'>Business email compromise</a> may seem like last decade’s threat, but it’s still just as prevalent as ever. A recent FBI report found that it cost users more than $1 billion in 2020, and attackers are now capitalizing on everything from PlayStation 5 sales to the COVID-19 pandemic to still scam people. On this week’s Talos Takes, Nick Biasini recaps his recent research into BEC and discusses why there are some reasons why this threat may never go away (hint: users).<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div><a href='https://blog.talosintelligence.com/2021/06/business-email-compromise.html'>Business email compromise</a> may seem like last decade’s threat, but it’s still just as prevalent as ever. A recent FBI report found that it cost users more than $1 billion in 2020, and attackers are now capitalizing on everything from PlayStation 5 sales to the COVID-19 pandemic to still scam people. On this week’s Talos Takes, Nick Biasini recaps his recent research into BEC and discusses why there are some reasons why this threat may never go away (hint: users).<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127954-talos-takes-ep-62-there-s-still-plenty-of-mileage-left-in-bec.mp3" length="4008395" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/461</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>325</itunes:duration>
    <itunes:keywords>business email compromise, spam, phishing, email</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #56: The first security steps when returning to the office</itunes:title>
    <title>Talos Takes Ep. #56: The first security steps when returning to the office</title>
    <itunes:summary><![CDATA[We started out the COVID-19 pandemic by thinking we’d be away from the office for a month — maybe two. More than 12 months later, we’re still here, working from home (at least part-time).But some businesses are starting to reopen now and welcoming workers back into the office. After so much time working out of the office, what should security professionals do once they get back? In this week’s episode, Beers with Talos’ own Craig Williams joins the show to talk about triple-checking for patch...]]></itunes:summary>
    <description><![CDATA[<div>We started out the COVID-19 pandemic by thinking we’d be away from the office for a month — maybe two. More than 12 months later, we’re still here, working from home (at least part-time).<br/><br/></div><div>But some businesses are starting to reopen now and welcoming workers back into the office. After so much time working out of the office, what should security professionals do once they get back? In this week’s episode, Beers with Talos’ own Craig Williams joins the show to talk about triple-checking for patches, changing passwords and more. Plus, how should you handle the new hybrid worker?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We started out the COVID-19 pandemic by thinking we’d be away from the office for a month — maybe two. More than 12 months later, we’re still here, working from home (at least part-time).<br/><br/></div><div>But some businesses are starting to reopen now and welcoming workers back into the office. After so much time working out of the office, what should security professionals do once they get back? In this week’s episode, Beers with Talos’ own Craig Williams joins the show to talk about triple-checking for patches, changing passwords and more. Plus, how should you handle the new hybrid worker?<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127953-talos-takes-ep-56-the-first-security-steps-when-returning-to-the-office.mp3" length="7926609" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/421</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>651</itunes:duration>
    <itunes:keywords>work from home, COVID, patching</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #55: What&#39;s next for Transparent Tribe?</itunes:title>
    <title>Talos Takes Ep. #55: What&#39;s next for Transparent Tribe?</title>
    <itunes:summary><![CDATA[Asheer Malhotra from Talos Outreach has followed Transparent Tribe for years now. This APT has been all over the place using all sorts of trojans. So where my they go next? Asheer joins Talos Takes this week to discuss the malware this group deploys and how they use typo-squatted domains to lure victims in.]]></itunes:summary>
    <description><![CDATA[<div>Asheer Malhotra from Talos Outreach has followed <a href='https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html'>Transparent Tribe</a> for years now. This APT has been all over the place using <a href='https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html'>all sorts of trojans</a>. So where my they go next? Asheer joins Talos Takes this week to discuss the malware this group deploys and how they use typo-squatted domains to lure victims in.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Asheer Malhotra from Talos Outreach has followed <a href='https://blog.talosintelligence.com/2021/05/transparent-tribe-infra-and-targeting.html'>Transparent Tribe</a> for years now. This APT has been all over the place using <a href='https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html'>all sorts of trojans</a>. So where my they go next? Asheer joins Talos Takes this week to discuss the malware this group deploys and how they use typo-squatted domains to lure victims in.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127952-talos-takes-ep-55-what-s-next-for-transparent-tribe.mp3" length="6206448" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/420</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>508</itunes:duration>
    <itunes:keywords>malware, trojans, APTs, threats</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #60 (XL Edition): Kaseya emergency show</itunes:title>
    <title>Talos Takes Ep. #60 (XL Edition): Kaseya emergency show</title>
    <itunes:summary><![CDATA[In this special “XL edition” of Talos Takes, we’re bringing you the audio version of our live stream this week discussing the Kaseya supply chain attack. Nick Biasini from Talos Outreach went live with Hazel Burton, a Cisco product marketing manager, to discuss what transpired over the long Fourth of July weekend. Nick discussed the Kaseya exploit leveraged in this campaign, plus the follow-on ransomware attacks. This is the best place to get the tl;dr on what happened, what you need to ...]]></itunes:summary>
    <description><![CDATA[<div>In this special “XL edition” of Talos Takes, we’re bringing you the audio version of our <a href='https://youtu.be/YJLgBcbt0gs'>live stream</a> this week discussing the <a href='https://blog.talosintelligence.com/2021/07/revil-ransomware-actors-attack-kaseya.html'>Kaseya supply chain attack</a>. Nick Biasini from Talos Outreach went live with Hazel Burton, a Cisco product marketing manager, to discuss what transpired over the long Fourth of July weekend. <br/>Nick discussed the Kaseya exploit leveraged in this campaign, plus the follow-on ransomware attacks. This is the best place to get the tl;dr on what happened, what you need to be doing now, and what Cisco Secure solutions can keep you protected.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>In this special “XL edition” of Talos Takes, we’re bringing you the audio version of our <a href='https://youtu.be/YJLgBcbt0gs'>live stream</a> this week discussing the <a href='https://blog.talosintelligence.com/2021/07/revil-ransomware-actors-attack-kaseya.html'>Kaseya supply chain attack</a>. Nick Biasini from Talos Outreach went live with Hazel Burton, a Cisco product marketing manager, to discuss what transpired over the long Fourth of July weekend. <br/>Nick discussed the Kaseya exploit leveraged in this campaign, plus the follow-on ransomware attacks. This is the best place to get the tl;dr on what happened, what you need to be doing now, and what Cisco Secure solutions can keep you protected.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Hazel Burton (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127951-talos-takes-ep-60-xl-edition-kaseya-emergency-show.mp3" length="15713912" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/458</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>1300</itunes:duration>
    <itunes:keywords>Kaseya, supply chain, ransomware, REvil</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #54: Incident response is really just the friends we made along the way</itunes:title>
    <title>Talos Takes Ep. #54: Incident response is really just the friends we made along the way</title>
    <itunes:summary><![CDATA[Welcome to the unofficial incident response week at Talos! As part of the RSA Conference, we’ve released two new case studies detailing some malware cases Cisco Talos Incident Response helped resolve. Brad Garnett, this week’s guest, also released a new blog post where he wrote about why incident response is “the ultimate team sport.” Brad joins host Jon Munshaw this week to take a deeper dive into one of these engagements, in which an attacker tried to use Cobalt Strike to infect a target wi...]]></itunes:summary>
    <description><![CDATA[<div>Welcome to the unofficial incident response week at Talos! As part of the RSA Conference, we’ve released <a href='https://talosintelligence.com/resources/211'>two</a> <a href='https://talosintelligence.com/resources/212'>new case studies</a> detailing some malware cases Cisco Talos Incident Response helped resolve. Brad Garnett, this week’s guest, also released <a href='https://blog.talosintelligence.com/2021/05/ctir-case-study.html'>a new blog post</a> where he wrote about why incident response is “the ultimate team sport.” Brad joins host Jon Munshaw this week to take a deeper dive into one of these engagements, in which an attacker tried to use Cobalt Strike to infect a target with ransomware (hint: this would have been really bad!) Brad talks about how the strong personal relationships CTIR built with the customer in question set everyone up for success.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Welcome to the unofficial incident response week at Talos! As part of the RSA Conference, we’ve released <a href='https://talosintelligence.com/resources/211'>two</a> <a href='https://talosintelligence.com/resources/212'>new case studies</a> detailing some malware cases Cisco Talos Incident Response helped resolve. Brad Garnett, this week’s guest, also released <a href='https://blog.talosintelligence.com/2021/05/ctir-case-study.html'>a new blog post</a> where he wrote about why incident response is “the ultimate team sport.” Brad joins host Jon Munshaw this week to take a deeper dive into one of these engagements, in which an attacker tried to use Cobalt Strike to infect a target with ransomware (hint: this would have been really bad!) Brad talks about how the strong personal relationships CTIR built with the customer in question set everyone up for success.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Brad Garnett (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127950-talos-takes-ep-54-incident-response-is-really-just-the-friends-we-made-along-the-way.mp3" length="6039250" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/418</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>494</itunes:duration>
    <itunes:keywords>incident response, Cobalt Strike, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #52: Why not a world passwordless day?</itunes:title>
    <title>Talos Takes Ep. #52: Why not a world passwordless day?</title>
    <itunes:summary><![CDATA[To celebrate World Password Day this week, we’re talking about getting rid of passwords! Dave Lewis, a global advisory CISO for Cisco Secure, joins Jon to talk about all things passwordless. This is a new initiative Cisco Secure and Duo have undertaken to get network administrators to move away from using passwords in favor of other forms of authentication. Jon and Dave discuss why passwords can be dangerous, the benefits of going passwordless and how to convince longtime users to ditch tradi...]]></itunes:summary>
    <description><![CDATA[<div>To celebrate World Password Day this week, we’re talking about getting rid of passwords! Dave Lewis, a global advisory CISO for Cisco Secure, joins Jon to talk about all things passwordless. This is a new initiative Cisco Secure and Duo have undertaken to get network administrators to move away from using passwords in favor of other forms of authentication. Jon and Dave discuss why passwords can be dangerous, the benefits of going passwordless and how to convince longtime users to ditch traditional login credentials.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>To celebrate World Password Day this week, we’re talking about getting rid of passwords! Dave Lewis, a global advisory CISO for Cisco Secure, joins Jon to talk about all things passwordless. This is a new initiative Cisco Secure and Duo have undertaken to get network administrators to move away from using passwords in favor of other forms of authentication. Jon and Dave discuss why passwords can be dangerous, the benefits of going passwordless and how to convince longtime users to ditch traditional login credentials.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Dave Lewis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127949-talos-takes-ep-52-why-not-a-world-passwordless-day.mp3" length="7064499" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/415</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>580</itunes:duration>
    <itunes:keywords>passwords, passwordless, MFA, Duo</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #51: COVID and tax scams go hand-in-hand this year</itunes:title>
    <title>Talos Takes Ep. #51: COVID and tax scams go hand-in-hand this year</title>
    <itunes:summary><![CDATA[We can set our watches to tax scams every year in April. The bad guys are always looking to steal your information, promising to get you a bigger tax return or do your taxes for you. This year is a bit different because Tax Day is a bit later than usual thanks to — you guessed it — COVID. Attackers are now combining these two topics to create spam campaigns, promising to provide you new information about how COVID affects your taxes, or even promising to send you a gift in exchange for receiv...]]></itunes:summary>
    <description><![CDATA[<div>We can set our watches to tax scams every year in April. The bad guys are always looking to steal your information, promising to get you a bigger tax return or do your taxes for you. This year is a bit different because Tax Day is a bit later than usual thanks to — you guessed it — COVID. Attackers are now combining these two topics to create spam campaigns, promising to provide you new information about how COVID affects your taxes, or even promising to send you a gift in exchange for receiving your COVID vaccine. Jaeson Schultz makes his inaugural appearance on Talos Takes to discuss what he’s seeing in the wild and how you can avoid these common scams.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We can set our watches to tax scams every year in April. The bad guys are always looking to steal your information, promising to get you a bigger tax return or do your taxes for you. This year is a bit different because Tax Day is a bit later than usual thanks to — you guessed it — COVID. Attackers are now combining these two topics to create spam campaigns, promising to provide you new information about how COVID affects your taxes, or even promising to send you a gift in exchange for receiving your COVID vaccine. Jaeson Schultz makes his inaugural appearance on Talos Takes to discuss what he’s seeing in the wild and how you can avoid these common scams.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Jaeson Schultz (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127948-talos-takes-ep-51-covid-and-tax-scams-go-hand-in-hand-this-year.mp3" length="9681510" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/414</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>798</itunes:duration>
    <itunes:keywords>scams, spam, COVID, tax day, email</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #50: Attackers are using Discord just as much as you are</itunes:title>
    <title>Talos Takes Ep. #50: Attackers are using Discord just as much as you are</title>
    <itunes:summary><![CDATA[Cisco Talos recently discovered a wave of attackers spreading malware via collaboration apps like Discord and Slack. On this week’s episode of Talos Takes, Nick Biasini joins the show to bring us inside his research process for this post and discuss why these attacks have been so successful. Jon brings up his Dungeons &amp; Dragons group, too, if you’re interested in that sort of thing.]]></itunes:summary>
    <description><![CDATA[<div>Cisco Talos recently discovered a wave of attackers spreading malware via <a href='https://blog.talosintelligence.com/2021/04/collab-app-abuse.html'>collaboration apps like Discord and Slack</a>. On this week’s episode of Talos Takes, Nick Biasini joins the show to bring us inside his research process for this post and discuss why these attacks have been so successful. Jon brings up his Dungeons &amp; Dragons group, too, if you’re interested in that sort of thing.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Cisco Talos recently discovered a wave of attackers spreading malware via <a href='https://blog.talosintelligence.com/2021/04/collab-app-abuse.html'>collaboration apps like Discord and Slack</a>. On this week’s episode of Talos Takes, Nick Biasini joins the show to bring us inside his research process for this post and discuss why these attacks have been so successful. Jon brings up his Dungeons &amp; Dragons group, too, if you’re interested in that sort of thing.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127947-talos-takes-ep-50-attackers-are-using-discord-just-as-much-as-you-are.mp3" length="5355151" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/413</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>437</itunes:duration>
    <itunes:keywords>malware, Discord, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #53: What can we learn from those air fryer vulnerabilities?</itunes:title>
    <title>Talos Takes Ep. #53: What can we learn from those air fryer vulnerabilities?</title>
    <itunes:summary><![CDATA[Everyone had jokes when it came to the vulnerabilities we recently disclosed in a WiFi-connected air fryer. But there are actually some lessons to take away from this, such as: “Not everything needs to be connected to the internet.” Joe Marshall joins the show this week to discuss all things “smart” appliances, how to protect your network and the repercussions of these specific air fryer vulnerabilities.]]></itunes:summary>
    <description><![CDATA[<div>Everyone had jokes when it came to the vulnerabilities <a href='https://blog.talosintelligence.com/2021/04/vuln-spotlight-co.html'>we recently disclosed in a WiFi-connected air fryer</a>. But there are actually some lessons to take away from this, such as: “Not everything needs to be connected to the internet.” Joe Marshall joins the show this week to discuss all things “smart” appliances, how to protect your network and the repercussions of these specific air fryer vulnerabilities.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Everyone had jokes when it came to the vulnerabilities <a href='https://blog.talosintelligence.com/2021/04/vuln-spotlight-co.html'>we recently disclosed in a WiFi-connected air fryer</a>. But there are actually some lessons to take away from this, such as: “Not everything needs to be connected to the internet.” Joe Marshall joins the show this week to discuss all things “smart” appliances, how to protect your network and the repercussions of these specific air fryer vulnerabilities.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Joe Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127946-talos-takes-ep-53-what-can-we-learn-from-those-air-fryer-vulnerabilities.mp3" length="8024880" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/416</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>660</itunes:duration>
    <itunes:keywords>IoT, ICS, vulnerabilities, patching</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #49: LodaRAT&#39;s connection to Android devices</itunes:title>
    <title>Talos Takes Ep. #49: LodaRAT&#39;s connection to Android devices</title>
    <itunes:summary><![CDATA[Chris Neal from Talos Outreach has followed LodaRAT for years now. It’s gone from a fairly small threat to a full-on malware with several features that target all sorts of Android devices. Chris joins the show this week to discuss his history of researching LodaRAT and updates us on its latest TTPs. Find out how this trojan tries to trick users into downloading it on their phones and how it hunts for your banking information.]]></itunes:summary>
    <description><![CDATA[<div>Chris Neal from Talos Outreach has <a href='https://blog.talosintelligence.com/2020/02/loda-rat-grows-up.html'>followed LodaRAT for years</a> now. It’s gone from a fairly small threat to a <a href='https://blog.talosintelligence.com/2021/02/kasablanka-lodarat.html'>full-on malware with several features</a> that target all sorts of Android devices. Chris joins the show this week to discuss his history of researching LodaRAT and updates us on its latest TTPs. Find out how this trojan tries to trick users into downloading it on their phones and how it hunts for your banking information.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Chris Neal from Talos Outreach has <a href='https://blog.talosintelligence.com/2020/02/loda-rat-grows-up.html'>followed LodaRAT for years</a> now. It’s gone from a fairly small threat to a <a href='https://blog.talosintelligence.com/2021/02/kasablanka-lodarat.html'>full-on malware with several features</a> that target all sorts of Android devices. Chris joins the show this week to discuss his history of researching LodaRAT and updates us on its latest TTPs. Find out how this trojan tries to trick users into downloading it on their phones and how it hunts for your banking information.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Chris Neal (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127945-talos-takes-ep-49-lodarat-s-connection-to-android-devices.mp3" length="4485382" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/411</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>365</itunes:duration>
    <itunes:keywords>malware, trojans, banking trojan, mobile malware, LodaRAT</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #48: The history of ObliqueRAT</itunes:title>
    <title>Talos Takes Ep. #48: The history of ObliqueRAT</title>
    <itunes:summary><![CDATA[After researching and writing about ObliqueRAT for several months now, Asheer Malhotra joins Talos Takes for the first time to discuss this trojan. We’ve seen this malware evolve over the past year or so to ad new evasion techniques and find ways to avoid email filters and usual antivirus protections. Asheer talks about his history researching this malware and provides some advice on how to avoid email spam and the other maldocs these actors try to spread.]]></itunes:summary>
    <description><![CDATA[<div>After researching and writing about <a href='https://blog.talosintelligence.com/2020/02/obliquerat-hits-victims-via-maldocs.html'>ObliqueRAT</a> for several months now, Asheer Malhotra joins Talos Takes for the first time to discuss this trojan. We’ve seen this malware <a href='https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html'>evolve over the past year</a> or so to ad new evasion techniques and find ways to avoid email filters and usual antivirus protections. Asheer talks about his history researching this malware and provides some advice on how to avoid email spam and the other maldocs these actors try to spread.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>After researching and writing about <a href='https://blog.talosintelligence.com/2020/02/obliquerat-hits-victims-via-maldocs.html'>ObliqueRAT</a> for several months now, Asheer Malhotra joins Talos Takes for the first time to discuss this trojan. We’ve seen this malware <a href='https://blog.talosintelligence.com/2021/02/obliquerat-new-campaign.html'>evolve over the past year</a> or so to ad new evasion techniques and find ways to avoid email filters and usual antivirus protections. Asheer talks about his history researching this malware and provides some advice on how to avoid email spam and the other maldocs these actors try to spread.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127944-talos-takes-ep-48-the-history-of-obliquerat.mp3" length="5791238" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/410</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>474</itunes:duration>
    <itunes:keywords>ObliqueRAT, malware, trojans, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #45: Finding an alternative to SMS multi-factor authentication</itunes:title>
    <title>Talos Takes Ep. #45: Finding an alternative to SMS multi-factor authentication</title>
    <itunes:summary><![CDATA[It was only a matter of time before we had Wendy Nather from Cisco Secure Duo on the show. We finally met Beers with Talos’ level of stardom, as Wendy joins the show to discuss SMS messages as a form of multi-factor authentication. We break down why SMS authentication is still around and used by some of our most important services like banks, and what alternatives are out there. We also discuss the dangers of SIM-jacking attacks and the benefits of using Duo’s app-based authentication.]]></itunes:summary>
    <description><![CDATA[<div>It was only a matter of time before we had Wendy Nather from Cisco Secure Duo on the show. We finally met Beers with Talos’ level of stardom, as Wendy joins the show to discuss SMS messages as a form of multi-factor authentication. We break down why SMS authentication is still around and used by some of our most important services like banks, and what alternatives are out there. We also discuss the dangers of SIM-jacking attacks and the benefits of using Duo’s app-based authentication.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>It was only a matter of time before we had Wendy Nather from Cisco Secure Duo on the show. We finally met Beers with Talos’ level of stardom, as Wendy joins the show to discuss SMS messages as a form of multi-factor authentication. We break down why SMS authentication is still around and used by some of our most important services like banks, and what alternatives are out there. We also discuss the dangers of SIM-jacking attacks and the benefits of using Duo’s app-based authentication.<br/><br/></div>]]></content:encoded>
    <itunes:author>Wendy Nather (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127943-talos-takes-ep-45-finding-an-alternative-to-sms-multi-factor-authentication.mp3" length="6220846" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/374</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>510</itunes:duration>
    <itunes:keywords>MFA, SMS, 2FA, passwords</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #44: A super-sized edition for a roundtable discussion on SolarWinds</itunes:title>
    <title>Talos Takes Ep. #44: A super-sized edition for a roundtable discussion on SolarWinds</title>
    <itunes:summary><![CDATA[Welcome to the first-ever XL edition of Talos Takes. This one is a little longer than usual, but we promise you it’s worth it. We recently brought together researchers from all corners of Talos to talk about what we know about SolarWinds so far, and what’s still to be discovered. Our various teams have spent the past several months diving deep into the SolarWinds supply chain attack, and this is a collection of Talos’ knowledge on the current situation. Talking points include whether it’s fai...]]></itunes:summary>
    <description><![CDATA[<div>Welcome to the first-ever XL edition of Talos Takes. This one is a little longer than usual, but we promise you it’s worth it. We recently brought together researchers from all corners of Talos to talk about <a href='https://talosintelligence.com/podcasts/365'>what we know about SolarWinds so far</a>, and what’s still to be discovered. Our various teams have spent the past several months diving deep into the <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>SolarWinds supply chain attack</a>, and this is a collection of Talos’ knowledge on the current situation. Talking points include whether it’s fair to refer to this campaign as “SolarWinds,” what other initial infection vectors there may be, the breadth of the attack and more boots-on-the-ground intelligence. If you want to watch the video version, head to our <a href='https://youtu.be/PAsAtkn1Ex4'>YouTube page</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Welcome to the first-ever XL edition of Talos Takes. This one is a little longer than usual, but we promise you it’s worth it. We recently brought together researchers from all corners of Talos to talk about <a href='https://talosintelligence.com/podcasts/365'>what we know about SolarWinds so far</a>, and what’s still to be discovered. Our various teams have spent the past several months diving deep into the <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>SolarWinds supply chain attack</a>, and this is a collection of Talos’ knowledge on the current situation. Talking points include whether it’s fair to refer to this campaign as “SolarWinds,” what other initial infection vectors there may be, the breadth of the attack and more boots-on-the-ground intelligence. If you want to watch the video version, head to our <a href='https://youtu.be/PAsAtkn1Ex4'>YouTube page</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker), Jon Munshaw (host), Joe Marshall (speaker), and Pierre Cadieux (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127942-talos-takes-ep-44-a-super-sized-edition-for-a-roundtable-discussion-on-solarwinds.mp3" length="25180353" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/373</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>2090</itunes:duration>
    <itunes:keywords>SolarWinds, Incident Response, supply chain, news, Headlines</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #43: Microsoft Exchange Server emergency show</itunes:title>
    <title>Talos Takes Ep. #43: Microsoft Exchange Server emergency show</title>
    <itunes:summary><![CDATA[We put this week’s Talos Takes episode together last minute to discuss the Microsoft Exchange Server zero-day vulnerabilities Microsoft disclosed earlier this week. Nick Biasini joins the show to discuss mitigation strategies and what these vulnerabilities mean for your environment at-large. Plus, we discuss why this is another case of patching above all else. For more coverage on this topic, check out the Talos blog.]]></itunes:summary>
    <description><![CDATA[<div>We put this week’s Talos Takes episode together last minute to discuss the Microsoft Exchange Server zero-day vulnerabilities <a href='https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b'>Microsoft disclosed earlier this week</a>. Nick Biasini joins the show to discuss mitigation strategies and what these vulnerabilities mean for your environment at-large. Plus, we discuss why this is another case of patching above all else. For more coverage on this topic, check out the <a href='https://blog.talosintelligence.com/2021/03/threat-advisory-hafnium-and-microsoft.html'>Talos blog</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We put this week’s Talos Takes episode together last minute to discuss the Microsoft Exchange Server zero-day vulnerabilities <a href='https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-march-2-2021-kb5000871-9800a6bb-0a21-4ee7-b9da-fa85b3e1d23b'>Microsoft disclosed earlier this week</a>. Nick Biasini joins the show to discuss mitigation strategies and what these vulnerabilities mean for your environment at-large. Plus, we discuss why this is another case of patching above all else. For more coverage on this topic, check out the <a href='https://blog.talosintelligence.com/2021/03/threat-advisory-hafnium-and-microsoft.html'>Talos blog</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127941-talos-takes-ep-43-microsoft-exchange-server-emergency-show.mp3" length="4059401" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/372</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>330</itunes:duration>
    <itunes:keywords>Microsoft, Exchange, vulnerabilities, CVEs, zero-day</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #42: Seriously folks, save your logs</itunes:title>
    <title>Talos Takes Ep. #42: Seriously folks, save your logs</title>
    <itunes:summary><![CDATA[When Pierre Cadieux steps into a Cisco Talos Incident Response engagement, the first thing he wants to do is check out the customer’s logs. But if there are no logs to be found, he’ll be pretty limited in the kinds of insights he can provide.This has come up several times during the SolarWinds era, when customers are wanting to know if they were targeted in the widespread supply chain attack. So in this episode of Talos Takes, Pierre joins the show to discuss why it’s so important to keep log...]]></itunes:summary>
    <description><![CDATA[<div>When Pierre Cadieux steps into a <a href='https://talosintelligence.com/incident_response'>Cisco Talos Incident Response</a> engagement, the first thing he wants to do is check out the customer’s logs. But if there are no logs to be found, he’ll be pretty limited in the kinds of insights he can provide.<br/><br/></div><div>This has come up several times during the SolarWinds era, when customers are wanting to know if they were targeted in the <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>widespread supply chain attack</a>. So in this episode of Talos Takes, Pierre joins the show to discuss why it’s so important to keep logs for everything — log-ins, events, applications and more.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>When Pierre Cadieux steps into a <a href='https://talosintelligence.com/incident_response'>Cisco Talos Incident Response</a> engagement, the first thing he wants to do is check out the customer’s logs. But if there are no logs to be found, he’ll be pretty limited in the kinds of insights he can provide.<br/><br/></div><div>This has come up several times during the SolarWinds era, when customers are wanting to know if they were targeted in the <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>widespread supply chain attack</a>. So in this episode of Talos Takes, Pierre joins the show to discuss why it’s so important to keep logs for everything — log-ins, events, applications and more.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Pierre Cadieux (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127940-talos-takes-ep-42-seriously-folks-save-your-logs.mp3" length="5492843" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/371</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>449</itunes:duration>
    <itunes:keywords>SolarWinds, Incident Response, security logs, Cisco Talos Incident Response, security</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #41: Why you should upgrade to Snort 3</itunes:title>
    <title>Talos Takes Ep. #41: Why you should upgrade to Snort 3</title>
    <itunes:summary><![CDATA[For this week’s episode of Talos Takes, we’re switching back to Snort talk. For anyone who hasn’t been on security Twitter over the past month, you may not know that we released the Snort 3 GA last month — formally known as Snort 3.1.0. To celebrate, Nick Mavis joins the show again to discuss Snort 3’s new features and upgrades over 2.9.X. Nick, who regularly writes Snort rules for Cisco Talos and has been working hands-on with both versions of Snort for years, talks about how the rules impro...]]></itunes:summary>
    <description><![CDATA[<div>For this week’s episode of Talos Takes, we’re switching back to Snort talk. For anyone who hasn’t been on security Twitter over the past month, you may not know that <a href='https://blog.snort.org/2021/01/snort-3-officially-released.html'>we released the Snort 3 GA last month</a> — formally known as Snort 3.1.0. To celebrate, Nick Mavis joins the show again to discuss Snort 3’s new features and upgrades over 2.9.X. Nick, who regularly writes Snort rules for Cisco Talos and has been working hands-on with both versions of Snort for years, talks about how the rules improve with Snort 3, why detection and protection are better and everything else he loves about Snort 3. For more, check out the <a href='https://snort.org/snort3'>Snort 3 page</a> on Snort.org.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>For this week’s episode of Talos Takes, we’re switching back to Snort talk. For anyone who hasn’t been on security Twitter over the past month, you may not know that <a href='https://blog.snort.org/2021/01/snort-3-officially-released.html'>we released the Snort 3 GA last month</a> — formally known as Snort 3.1.0. To celebrate, Nick Mavis joins the show again to discuss Snort 3’s new features and upgrades over 2.9.X. Nick, who regularly writes Snort rules for Cisco Talos and has been working hands-on with both versions of Snort for years, talks about how the rules improve with Snort 3, why detection and protection are better and everything else he loves about Snort 3. For more, check out the <a href='https://snort.org/snort3'>Snort 3 page</a> on Snort.org.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Nicholas Mavis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127939-talos-takes-ep-41-why-you-should-upgrade-to-snort-3.mp3" length="4443489" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/369</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>362</itunes:duration>
    <itunes:keywords>Snort, Snort 3</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #47: Masslogger</itunes:title>
    <title>Talos Takes Ep. #47: Masslogger</title>
    <itunes:summary><![CDATA[On this week’s episode of Talos Takes, we go back a month or so to reflect on the Masslogger trojan Talos wrote about earlier this year. This malware may not make national headlines, but that doesn’t mean you should just ignore it. Find out where this trojan is hiding and why it’s after your Outlook and Google Chrome login credentials.]]></itunes:summary>
    <description><![CDATA[<div>On this week’s episode of Talos Takes, we go back a month or so to reflect on the Masslogger trojan Talos wrote about earlier this year. This malware may not make national headlines, but that doesn’t mean you should just ignore it. Find out where this trojan is hiding and why it’s after your Outlook and Google Chrome login credentials.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>On this week’s episode of Talos Takes, we go back a month or so to reflect on the Masslogger trojan Talos wrote about earlier this year. This malware may not make national headlines, but that doesn’t mean you should just ignore it. Find out where this trojan is hiding and why it’s after your Outlook and Google Chrome login credentials.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127938-talos-takes-ep-47-masslogger.mp3" length="3598934" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/408</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>291</itunes:duration>
    <itunes:keywords>trojan, Masslogger, malware, Threats</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #40: Lessons learned from our conversations with a ransomware operator</itunes:title>
    <title>Talos Takes Ep. #40: Lessons learned from our conversations with a ransomware operator</title>
    <itunes:summary><![CDATA[For the first time in Talos Takes history, we have a whopping TWO guests on to talk about Talos’ latest research paper. In this episode, Dmytro Korzhevin and Azim Khodjibaev discuss their work interviewing a LockBit ransomware operator. They spent multiple weeks speaking to this actor over social media, and eventually turned their conversations into a paper that lays out what we learned about the ransomware landscape. Dmytro and Azim talked about lessons learned, what surprised them about the...]]></itunes:summary>
    <description><![CDATA[<div>For the first time in Talos Takes history, we have a whopping TWO guests on to talk about <a href='https://talosintelligence.com/resources/152'>Talos’ latest research paper</a>. In this episode, Dmytro Korzhevin and Azim Khodjibaev discuss their work interviewing a LockBit ransomware operator. They spent multiple weeks speaking to this actor over social media, and eventually turned their conversations into a paper that lays out what we learned about the ransomware landscape. Dmytro and Azim talked about lessons learned, what surprised them about the threat actor, and how actors choose their targets.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>For the first time in Talos Takes history, we have a whopping TWO guests on to talk about <a href='https://talosintelligence.com/resources/152'>Talos’ latest research paper</a>. In this episode, Dmytro Korzhevin and Azim Khodjibaev discuss their work interviewing a LockBit ransomware operator. They spent multiple weeks speaking to this actor over social media, and eventually turned their conversations into a paper that lays out what we learned about the ransomware landscape. Dmytro and Azim talked about lessons learned, what surprised them about the threat actor, and how actors choose their targets.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host), Azim Khodjibaev (speaker), and Dmytro Korzhevin (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127937-talos-takes-ep-40-lessons-learned-from-our-conversations-with-a-ransomware-operator.mp3" length="6005141" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/367</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>492</itunes:duration>
    <itunes:keywords>LockBit, ransomware, malware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #39: An update on SolarWinds as it relates to IoT and OT</itunes:title>
    <title>Talos Takes Ep. #39: An update on SolarWinds as it relates to IoT and OT</title>
    <itunes:summary><![CDATA[We know we just talked about supply chain attacks and SolarWinds last week, but it’s still all anyone in security is talking about. Joe Marshall joins the show this time to approach the SolarWinds breach from an internet-of-things and operational security perspective. He recently co-wrote a blog for Cisco detailing how outsourcing OT over the past few years has made the SolarWinds compromise worse. Joe, a lifelong researcher and security practitioner in the OT and infrastructure space, discus...]]></itunes:summary>
    <description><![CDATA[<div>We know we just talked about supply chain attacks and SolarWinds last week, but it’s still all anyone in security is talking about. Joe Marshall joins the show this time to approach the SolarWinds breach from an internet-of-things and operational security perspective. He recently <a href='https://blogs.cisco.com/security/the-solarwinds-orion-breach-and-what-you-should-know'>co-wrote a blog for Cisco</a> detailing how outsourcing OT over the past few years has made the SolarWinds compromise worse. Joe, a lifelong researcher and security practitioner in the OT and infrastructure space, discusses what we still don’t know about this attack, what you should do if you think you may be affected, and how we can learn from this going forward. For more on Talos’ coverage and defense against the SolarWinds campaign, check out our blog post <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>here</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We know we just talked about supply chain attacks and SolarWinds last week, but it’s still all anyone in security is talking about. Joe Marshall joins the show this time to approach the SolarWinds breach from an internet-of-things and operational security perspective. He recently <a href='https://blogs.cisco.com/security/the-solarwinds-orion-breach-and-what-you-should-know'>co-wrote a blog for Cisco</a> detailing how outsourcing OT over the past few years has made the SolarWinds compromise worse. Joe, a lifelong researcher and security practitioner in the OT and infrastructure space, discusses what we still don’t know about this attack, what you should do if you think you may be affected, and how we can learn from this going forward. For more on Talos’ coverage and defense against the SolarWinds campaign, check out our blog post <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>here</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Joe Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127936-talos-takes-ep-39-an-update-on-solarwinds-as-it-relates-to-iot-and-ot.mp3" length="9091605" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/366</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>749</itunes:duration>
    <itunes:keywords>SolarWinds, IoT, operational technology, infrastructure</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #37: What&#39;s with all this talk about supply chain attacks?</itunes:title>
    <title>Talos Takes Ep. #37: What&#39;s with all this talk about supply chain attacks?</title>
    <itunes:summary><![CDATA[The major SolarWinds campaign has been generating headlines for weeks now. And while its specific targets make this attack unique, this is far from the first-ever supply chain attack. So what is a supply chain attack? And should your organization be prepared for them? In this episode of Talos Takes, Nick Biasini talks about the history of supply chain attacks, and how they can even be traced back to the 1970s.]]></itunes:summary>
    <description><![CDATA[<div>The major <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>SolarWinds campaign</a> has been generating headlines for weeks now. And while its specific targets make this attack unique, this is far from the first-ever supply chain attack. So what is a supply chain attack? And should your organization be prepared for them? In this episode of Talos Takes, Nick Biasini talks about the history of supply chain attacks, and how they can even be traced back to the 1970s.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The major <a href='https://blog.talosintelligence.com/2020/12/solarwinds-supplychain-coverage.html'>SolarWinds campaign</a> has been generating headlines for weeks now. And while its specific targets make this attack unique, this is far from the first-ever supply chain attack. So what is a supply chain attack? And should your organization be prepared for them? In this episode of Talos Takes, Nick Biasini talks about the history of supply chain attacks, and how they can even be traced back to the 1970s.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127935-talos-takes-ep-37-what-s-with-all-this-talk-about-supply-chain-attacks.mp3" length="5851589" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/365</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>479</itunes:duration>
    <itunes:keywords>SolarWinds, malware, supply chain, APTs, FireEye</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #36: Ransomware&#39;s big 2020</itunes:title>
    <title>Talos Takes Ep. #36: Ransomware&#39;s big 2020</title>
    <itunes:summary><![CDATA[Everything was on fire this year, and the internet was no different. Ransomware was the leading cause of headaches and late night for defenders and IT experts this year. On the latest Talos Takes episode (and last of 2020), Azim Khodjibaev joins us to talk about ransomware’s big year. We talk about why adversaries wanted to go big-game hunting, and what this could mean for trends in 2021.]]></itunes:summary>
    <description><![CDATA[<div>Everything was on fire this year, and the internet was no different. Ransomware was the leading cause of headaches and late night for defenders and IT experts this year. On the latest Talos Takes episode (and last of 2020), Azim Khodjibaev joins us to talk about ransomware’s big year. We talk about why adversaries wanted to go big-game hunting, and what this could mean for trends in 2021.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Everything was on fire this year, and the internet was no different. Ransomware was the leading cause of headaches and late night for defenders and IT experts this year. On the latest Talos Takes episode (and last of 2020), Azim Khodjibaev joins us to talk about ransomware’s big year. We talk about why adversaries wanted to go big-game hunting, and what this could mean for trends in 2021.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Azim Khodjibaev (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127934-talos-takes-ep-36-ransomware-s-big-2020.mp3" length="5250748" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/362</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>429</itunes:duration>
    <itunes:keywords>ransomware, year in review, malware, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #46 (XL Edition): Snort 3 roundtable discussion</itunes:title>
    <title>Talos Takes Ep. #46 (XL Edition): Snort 3 roundtable discussion</title>
    <itunes:summary><![CDATA[We’ve got another special XL episode this week, this time about Snort 3. This roundtable covers everything you could know about Snort 3’s life, going back as far as its inception in the early 2010s. We even went out of our way to get Marty Roesch, the creator of Snort.Marty, along with our other panelists, discusses the origins of Snort 3, what benefits you can gain by upgrading and what other features you can expect to see in the future.]]></itunes:summary>
    <description><![CDATA[<div>We’ve got another special XL episode this week, this time about <a href='https://snort.org/snort3'>Snort 3</a>. This roundtable covers everything you could know about Snort 3’s life, going back as far as its inception in the early 2010s. We even went out of our way to get Marty Roesch, the creator of Snort.<br/><br/></div><div>Marty, along with our other panelists, discusses the origins of Snort 3, what benefits you can gain by upgrading and what other features you can expect to see in the future.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We’ve got another special XL episode this week, this time about <a href='https://snort.org/snort3'>Snort 3</a>. This roundtable covers everything you could know about Snort 3’s life, going back as far as its inception in the early 2010s. We even went out of our way to get Marty Roesch, the creator of Snort.<br/><br/></div><div>Marty, along with our other panelists, discusses the origins of Snort 3, what benefits you can gain by upgrading and what other features you can expect to see in the future.<br/><br/></div>]]></content:encoded>
    <itunes:author>Joel Esler (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127933-talos-takes-ep-46-xl-edition-snort-3-roundtable-discussion.mp3" length="38412989" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/375</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>3192</itunes:duration>
    <itunes:keywords>Snort, Snort 3</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #35: If a deal seems too good to be true, it probably is</itunes:title>
    <title>Talos Takes Ep. #35: If a deal seems too good to be true, it probably is</title>
    <itunes:summary><![CDATA[More shoppers are expected to buy online this year than ever. Everyone’s encouraged to stay home and avoid lines and crowds due to the COVID-19 pandemic, which has left retailers offering deals earlier in November than ever before. So how can you stay safe while doing all your holiday shopping online? In this episode of Talos Takes, we’ll talk through some of the common schemes we’re seeing and talk about what makes this year unique when it comes to spam campaigns.]]></itunes:summary>
    <description><![CDATA[<div>More shoppers are expected to buy online this year than ever. Everyone’s encouraged to stay home and avoid lines and crowds due to the COVID-19 pandemic, which has left retailers offering deals earlier in November than ever before. So how can you stay safe while doing all your holiday shopping online? In this episode of Talos Takes, we’ll talk through some of the common schemes we’re seeing and talk about what makes this year unique when it comes to spam campaigns.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>More shoppers are expected to buy online this year than ever. Everyone’s encouraged to stay home and avoid lines and crowds due to the COVID-19 pandemic, which has left retailers offering deals earlier in November than ever before. So how can you stay safe while doing all your holiday shopping online? In this episode of Talos Takes, we’ll talk through some of the common schemes we’re seeing and talk about what makes this year unique when it comes to spam campaigns.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127932-talos-takes-ep-35-if-a-deal-seems-too-good-to-be-true-it-probably-is.mp3" length="4153972" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/359</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>338</itunes:duration>
    <itunes:keywords>security skills, spam, online shopping, scams</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #34: Free and low-cost security tools</itunes:title>
    <title>Talos Takes Ep. #34: Free and low-cost security tools</title>
    <itunes:summary><![CDATA[Say you’ve got the basics of security down, and now you want to start putting it into practice. Where do you start? In this Talos Takes episode, we run through some free and low-cost security tools anyone can use to beef up their network. We talk about Snort, built-in security tools on operating systems and more.]]></itunes:summary>
    <description><![CDATA[<div>Say you’ve got the basics of security down, and now you want to start putting it into practice. Where do you start? In this Talos Takes episode, we run through some free and low-cost security tools anyone can use to beef up their network. We talk about Snort, built-in security tools on operating systems and more.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Say you’ve got the basics of security down, and now you want to start putting it into practice. Where do you start? In this Talos Takes episode, we run through some free and low-cost security tools anyone can use to beef up their network. We talk about Snort, built-in security tools on operating systems and more.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127931-talos-takes-ep-34-free-and-low-cost-security-tools.mp3" length="5190401" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/358</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>424</itunes:duration>
    <itunes:keywords>Snort, tools, security, IPS, firewall</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #33: How to talk to your parents about cyber security</itunes:title>
    <title>Talos Takes Ep. #33: How to talk to your parents about cyber security</title>
    <itunes:summary><![CDATA[It’s National Cyber Security Awareness Month! And you know what that means? It’s time to make everyone more aware! Since we all have that special someone in our lives who could use a refresher on internet hygenie, we figured it was time to talk about bringing up the topic of security to your friends and family who may not be as computer literate as you are. Jon Munshaw and Nick Biasini talk about basic tips to give even your oldest family members and user-friendly programs and services that c...]]></itunes:summary>
    <description><![CDATA[<div>It’s National Cyber Security Awareness Month! And you know what that means? It’s time to make everyone more aware! Since we all have that special someone in our lives who could use a refresher on internet hygenie, we figured it was time to talk about bringing up the topic of security to your friends and family who may not be as computer literate as you are. Jon Munshaw and Nick Biasini talk about basic tips to give even your oldest family members and user-friendly programs and services that can improve everyone’s security.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>It’s National Cyber Security Awareness Month! And you know what that means? It’s time to make everyone more aware! Since we all have that special someone in our lives who could use a refresher on internet hygenie, we figured it was time to talk about bringing up the topic of security to your friends and family who may not be as computer literate as you are. Jon Munshaw and Nick Biasini talk about basic tips to give even your oldest family members and user-friendly programs and services that can improve everyone’s security.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127930-talos-takes-ep-33-how-to-talk-to-your-parents-about-cyber-security.mp3" length="5923324" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/355</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>485</itunes:duration>
    <itunes:keywords>cyber security, security, internet, browsers</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #32: How to keep your children safe while they attend school online</itunes:title>
    <title>Talos Takes Ep. #32: How to keep your children safe while they attend school online</title>
    <itunes:summary><![CDATA[Jon doesn’t have any children. So he found someone who does — Beers with Talos’ own Craig Williams — to talk about remote learning. Children are back to school, and many of them are doing so online. Craig and Jon talk about DNS filters, parental controls, meeting passwords and more that are sure to help parents and teachers adjust to this new normal.]]></itunes:summary>
    <description><![CDATA[<div>Jon doesn’t have any children. So he found someone who does — Beers with Talos’ own Craig Williams — to talk about remote learning. Children are back to school, and many of them are doing so online. Craig and Jon talk about DNS filters, parental controls, meeting passwords and more that are sure to help parents and teachers adjust to this new normal.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Jon doesn’t have any children. So he found someone who does — Beers with Talos’ own Craig Williams — to talk about remote learning. Children are back to school, and many of them are doing so online. Craig and Jon talk about DNS filters, parental controls, meeting passwords and more that are sure to help parents and teachers adjust to this new normal.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127929-talos-takes-ep-32-how-to-keep-your-children-safe-while-they-attend-school-online.mp3" length="5951334" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/354</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>488</itunes:duration>
    <itunes:keywords>school, online learning</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #28: Sharing information on information-sharing</itunes:title>
    <title>Talos Takes Ep. #28: Sharing information on information-sharing</title>
    <itunes:summary><![CDATA[Talos intakes a ridiculous amount of information every day. So how do we parse what is and isn’t important enough to share? In this episode of Talos Takes, Amy Henderson from our Threat Intelligence and Interdiction team talks about our information-sharing partnerships with both private and public entities. How do we disseminate important information to our friends in the field? And why are security organizations like the Cyber Threat Alliance so important?]]></itunes:summary>
    <description><![CDATA[<div>Talos intakes a ridiculous amount of information every day. So how do we parse what is and isn’t important enough to share? In this episode of Talos Takes, Amy Henderson from our Threat Intelligence and Interdiction team talks about our information-sharing partnerships with both private and public entities. How do we disseminate important information to our friends in the field? And why are security organizations like the Cyber Threat Alliance so important?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Talos intakes a ridiculous amount of information every day. So how do we parse what is and isn’t important enough to share? In this episode of Talos Takes, Amy Henderson from our Threat Intelligence and Interdiction team talks about our information-sharing partnerships with both private and public entities. How do we disseminate important information to our friends in the field? And why are security organizations like the Cyber Threat Alliance so important?<br/><br/></div>]]></content:encoded>
    <itunes:author>Amy Henderson (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127928-talos-takes-ep-28-sharing-information-on-information-sharing.mp3" length="7788065" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/347</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>641</itunes:duration>
    <itunes:keywords>information sharing, intel, threat intel, Talos, CTA</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #27: Why are we so obsessed with attribution?</itunes:title>
    <title>Talos Takes Ep. #27: Why are we so obsessed with attribution?</title>
    <itunes:summary><![CDATA[On this episode of Talos Takes, we talk all about attribution. Our guest, Martin Lee, recently co-authored a post on the hurdles government agencies and private researchers alike face when trying to place blame for a cyber attack. Martin talks about why we’re so obsessed with placing the blame, what false flags are and what helpful things can actually come from attributing a threat.]]></itunes:summary>
    <description><![CDATA[<div>On this episode of Talos Takes, we talk all about attribution. Our guest, Martin Lee, recently co-authored <a href='https://blog.talosintelligence.com/2020/08/attribution-puzzle.html'>a post</a> on the hurdles government agencies and private researchers alike face when trying to place blame for a cyber attack. Martin talks about why we’re so obsessed with placing the blame, what false flags are and what helpful things can actually come from attributing a threat.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>On this episode of Talos Takes, we talk all about attribution. Our guest, Martin Lee, recently co-authored <a href='https://blog.talosintelligence.com/2020/08/attribution-puzzle.html'>a post</a> on the hurdles government agencies and private researchers alike face when trying to place blame for a cyber attack. Martin talks about why we’re so obsessed with placing the blame, what false flags are and what helpful things can actually come from attributing a threat.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Martin Lee (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127927-talos-takes-ep-27-why-are-we-so-obsessed-with-attribution.mp3" length="7248887" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/346</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>596</itunes:duration>
    <itunes:keywords>attribution, APTs, malware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #26: How to safely browse the web</itunes:title>
    <title>Talos Takes Ep. #26: How to safely browse the web</title>
    <itunes:summary><![CDATA[There are so many options now for basic web browsing. There are ad-blocking plugins, privacy browsers, incognito mode, password managers — but for the average user, this can be a lot to keep up with. In this episode of Talos Takes, we dissect all these options and talk about what your best options are to keep your information safe while doing some everyday web browsing.]]></itunes:summary>
    <description><![CDATA[<div>There are so many options now for basic web browsing. There are ad-blocking plugins, privacy browsers, incognito mode, password managers — but for the average user, this can be a lot to keep up with. In this episode of Talos Takes, we dissect all these options and talk about what your best options are to keep your information safe while doing some everyday web browsing.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>There are so many options now for basic web browsing. There are ad-blocking plugins, privacy browsers, incognito mode, password managers — but for the average user, this can be a lot to keep up with. In this episode of Talos Takes, we dissect all these options and talk about what your best options are to keep your information safe while doing some everyday web browsing.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127926-talos-takes-ep-26-how-to-safely-browse-the-web.mp3" length="5993246" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/343</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>491</itunes:duration>
    <itunes:keywords>web browsers, privacy, passwords</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #25: WastedLocker</itunes:title>
    <title>Talos Takes Ep. #25: WastedLocker</title>
    <itunes:summary><![CDATA[This week’s Talos Takes episode is another malware deep dive. Edmund Brumaghin joins the show to talk about WastedLocker, a recent ransomware family he and some other Talos researchers reverse-engineered. Here’s everything you need to know about what makes this threat unique and how it uses LoLBins to survive.]]></itunes:summary>
    <description><![CDATA[<div>This week’s Talos Takes episode is another malware deep dive. Edmund Brumaghin joins the show to talk about WastedLocker, a recent ransomware family he and some other Talos researchers reverse-engineered. Here’s everything you need to know about what makes this threat unique and how it uses LoLBins to survive.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>This week’s Talos Takes episode is another malware deep dive. Edmund Brumaghin joins the show to talk about WastedLocker, a recent ransomware family he and some other Talos researchers reverse-engineered. Here’s everything you need to know about what makes this threat unique and how it uses LoLBins to survive.<br/><br/></div>]]></content:encoded>
    <itunes:author>Edmund Brumaghin (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127925-talos-takes-ep-25-wastedlocker.mp3" length="3899697" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/342</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>317</itunes:duration>
    <itunes:keywords>LoLBins, WastedLocker, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #23: How Talos utilizes honeypots</itunes:title>
    <title>Talos Takes Ep. #23: How Talos utilizes honeypots</title>
    <itunes:summary><![CDATA[Honeypots are an important part of threat research and detection. In this episode of Talos Takes, we talk to Christopher Evans, who is our resident honeypot expert at Talos. Chris talks about how he uses them every day, why they’re important to Talos’ overall mission and balancing the use of them with the potential for making attackers smarter.]]></itunes:summary>
    <description><![CDATA[<div>Honeypots are an important part of threat research and detection. In this episode of Talos Takes, we talk to Christopher Evans, who is our resident honeypot expert at Talos. Chris talks about how he uses them every day, why they’re important to Talos’ overall mission and balancing the use of them with the potential for making attackers smarter.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Honeypots are an important part of threat research and detection. In this episode of Talos Takes, we talk to Christopher Evans, who is our resident honeypot expert at Talos. Chris talks about how he uses them every day, why they’re important to Talos’ overall mission and balancing the use of them with the potential for making attackers smarter.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Christopher Evans (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127924-talos-takes-ep-23-how-talos-utilizes-honeypots.mp3" length="7668847" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/339</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>631</itunes:duration>
    <itunes:keywords>honeypots, threat intelligence, threat detection</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #24: LoLBins</itunes:title>
    <title>Talos Takes Ep. #24: LoLBins</title>
    <itunes:summary><![CDATA[LoLBins sound like they’d be funny, but they’re anything but. These “living-off-the-land binaries” make it so that attackers can more easily hide on your system as they disguise themselves as legitimate processes. On this episode of Talos Takes, Nick Biasini talks about what LoLBins are, exactly, how adversaries use them and how you can spot them on your environment.]]></itunes:summary>
    <description><![CDATA[<div>LoLBins sound like they’d be funny, but they’re anything but. These “living-off-the-land binaries” make it so that attackers can more easily hide on your system as they disguise themselves as legitimate processes. On this episode of Talos Takes, Nick Biasini talks about what LoLBins are, exactly, how adversaries use them and how you can spot them on your environment.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>LoLBins sound like they’d be funny, but they’re anything but. These “living-off-the-land binaries” make it so that attackers can more easily hide on your system as they disguise themselves as legitimate processes. On this episode of Talos Takes, Nick Biasini talks about what LoLBins are, exactly, how adversaries use them and how you can spot them on your environment.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127923-talos-takes-ep-24-lolbins.mp3" length="4019247" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/340</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>327</itunes:duration>
    <itunes:keywords>LoLBins, binaries, PowerShell</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #29: Election security roundtable excerpt</itunes:title>
    <title>Talos Takes Ep. #29: Election security roundtable excerpt</title>
    <itunes:summary><![CDATA[This week’s episode is actually an excerpt from our recently released roundtable on disinformation and American election security. This is a small part of our larger discussion on fake news, state-sponsored actors using fake social media accounts, and what can be done to combat the spread of disinformation. To see the whole thing, click here.]]></itunes:summary>
    <description><![CDATA[<div>This week’s episode is actually an excerpt from our recently released roundtable on disinformation and American election security. This is a small part of our larger discussion on fake news, state-sponsored actors using fake social media accounts, and what can be done to combat the spread of disinformation. To see the whole thing, <a href='https://www.youtube.com/channel/UCPZ1DtzQkStYBSG3GTNoyfg'>click here</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>This week’s episode is actually an excerpt from our recently released roundtable on disinformation and American election security. This is a small part of our larger discussion on fake news, state-sponsored actors using fake social media accounts, and what can be done to combat the spread of disinformation. To see the whole thing, <a href='https://www.youtube.com/channel/UCPZ1DtzQkStYBSG3GTNoyfg'>click here</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127922-talos-takes-ep-29-election-security-roundtable-excerpt.mp3" length="5089256" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/349</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>416</itunes:duration>
    <itunes:keywords>disinformation, fake news, election security</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #22: Snort 101</itunes:title>
    <title>Talos Takes Ep. #22: Snort 101</title>
    <itunes:summary><![CDATA[The quick and dirty beginner’s guide to what Snort is and how to use. This the podcast accompaniment to the rest of our Snort 101 materials, which can be found on Snort.org/Resources.]]></itunes:summary>
    <description><![CDATA[<div>The quick and dirty beginner’s guide to what Snort is and how to use. This the podcast accompaniment to the rest of our Snort 101 materials, which can be found on Snort.org/Resources.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The quick and dirty beginner’s guide to what Snort is and how to use. This the podcast accompaniment to the rest of our Snort 101 materials, which can be found on Snort.org/Resources.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Nicholas Mavis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127921-talos-takes-ep-22-snort-101.mp3" length="4737655" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/302</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>387</itunes:duration>
    <itunes:keywords>Snort, Snort rules, Talos rules</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #21: What&#39;s really hiding inside the dark web</itunes:title>
    <title>Talos Takes Ep. #21: What&#39;s really hiding inside the dark web</title>
    <itunes:summary><![CDATA[The dark web sounds scary — and it is. But what exactly does this dark web consist of? Despite what the name may suggest, it’s actually not people selling organs or stolen video games that happened to fall off the back of a truck. But what is actually on these forums? Azim Khodjibaev joins Jon Munshaw this week to discuss his experience with the dark web.]]></itunes:summary>
    <description><![CDATA[<div>The dark web sounds scary — and it is. But what exactly does this dark web consist of? Despite what the name may suggest, it’s actually not people selling organs or stolen video games that happened to fall off the back of a truck. But what is actually on these forums? Azim Khodjibaev joins Jon Munshaw this week to discuss his experience with the dark web.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The dark web sounds scary — and it is. But what exactly does this dark web consist of? Despite what the name may suggest, it’s actually not people selling organs or stolen video games that happened to fall off the back of a truck. But what is actually on these forums? Azim Khodjibaev joins Jon Munshaw this week to discuss his experience with the dark web.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Azim Khodjibaev (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127920-talos-takes-ep-21-what-s-really-hiding-inside-the-dark-web.mp3" length="6602268" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/301</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>542</itunes:duration>
    <itunes:keywords>dark web, Talos Takes, podcasts, stolen information</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #20: What is an APT, exactly?</itunes:title>
    <title>Talos Takes Ep. #20: What is an APT, exactly?</title>
    <itunes:summary><![CDATA[We use the term “APT” in cyber security a lot. But what does it mean, exactly? Does a group have to break a certain threshold to become an APT? Does the term refer to a specific malware family or a group of actors? On this week’s Talos Takes, Jon Munshaw talks to Azim from Talos’ Threat Intelligence team about this very topic.]]></itunes:summary>
    <description><![CDATA[<div>We use the term “APT” in cyber security a lot. But what does it mean, exactly? Does a group have to break a certain threshold to become an APT? Does the term refer to a specific malware family or a group of actors? On this week’s Talos Takes, Jon Munshaw talks to Azim from Talos’ Threat Intelligence team about this very topic.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We use the term “APT” in cyber security a lot. But what does it mean, exactly? Does a group have to break a certain threshold to become an APT? Does the term refer to a specific malware family or a group of actors? On this week’s Talos Takes, Jon Munshaw talks to Azim from Talos’ Threat Intelligence team about this very topic.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Azim Khodjibaev (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127919-talos-takes-ep-20-what-is-an-apt-exactly.mp3" length="4857915" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/295</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>397</itunes:duration>
    <itunes:keywords>APTs, threat actors, threats</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #19: How to keep your online meetings safe</itunes:title>
    <title>Talos Takes Ep. #19: How to keep your online meetings safe</title>
    <itunes:summary><![CDATA[Everyone is meeting virtually now. Whether it be important business or the average happy hour with friends and family, there’s no shortage of invites to chat rooms, presentations and software you’ve never heard of before you started working from home. And, of course, this software comes with its own set of security concerns and vulnerabilities. So Matt Valites joins Jon Munshaw this week to talk about the basics of securing your next friendly meetup or presentation to the board.]]></itunes:summary>
    <description><![CDATA[<div>Everyone is meeting virtually now. Whether it be important business or the average happy hour with friends and family, there’s no shortage of invites to chat rooms, presentations and software you’ve never heard of before you started working from home. And, of course, this software comes with its own set of security concerns and vulnerabilities. So Matt Valites joins Jon Munshaw this week to talk about the basics of securing your next friendly meetup or presentation to the board.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Everyone is meeting virtually now. Whether it be important business or the average happy hour with friends and family, there’s no shortage of invites to chat rooms, presentations and software you’ve never heard of before you started working from home. And, of course, this software comes with its own set of security concerns and vulnerabilities. So Matt Valites joins Jon Munshaw this week to talk about the basics of securing your next friendly meetup or presentation to the board.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127918-talos-takes-ep-19-how-to-keep-your-online-meetings-safe.mp3" length="3754293" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/293</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>305</itunes:duration>
    <itunes:keywords>meetings, online, video chat, video conferencing, Zoom, WebEx</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #18: Where do cryptominers stand in 2020?</itunes:title>
    <title>Talos Takes Ep. #18: Where do cryptominers stand in 2020?</title>
    <itunes:summary><![CDATA[The value of cryptocurrencies is nowhere near where it was just two years ago. So does that mean cryptominers have gone away as a threat? Jon Munshaw and Nick Biasini sit down in this episode of Talos Takes to discuss where cryptominers stand in 2020. Why aren’t we reading about them as much? And why is being hit with one a sign of worse things to come?]]></itunes:summary>
    <description><![CDATA[<div>The value of cryptocurrencies is nowhere near where it was just two years ago. So does that mean cryptominers have gone away as a threat? Jon Munshaw and Nick Biasini sit down in this episode of Talos Takes to discuss where cryptominers stand in 2020. Why aren’t we reading about them as much? And why is being hit with one a sign of worse things to come?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The value of cryptocurrencies is nowhere near where it was just two years ago. So does that mean cryptominers have gone away as a threat? Jon Munshaw and Nick Biasini sit down in this episode of Talos Takes to discuss where cryptominers stand in 2020. Why aren’t we reading about them as much? And why is being hit with one a sign of worse things to come?<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127917-talos-takes-ep-18-where-do-cryptominers-stand-in-2020.mp3" length="4673437" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/291</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>381</itunes:duration>
    <itunes:keywords>cryptominers, malware, miners, cryptocurrencies</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #17: How MedusaLocker is different than other ransomware</itunes:title>
    <title>Talos Takes Ep. #17: How MedusaLocker is different than other ransomware</title>
    <itunes:summary><![CDATA[We published our findings on a ransomware family known as MedusaLocker last week. On its surface, it’s just like any other ransomware family — steals your stuff, encrypts it, and asks for some money to get it back. But there are some secret tricks hidden beneath the surface, and Edmund Brumaghin is here to talk about them.]]></itunes:summary>
    <description><![CDATA[<div>We published our findings on a ransomware family known as MedusaLocker last week. On its surface, it’s just like any other ransomware family — steals your stuff, encrypts it, and asks for some money to get it back. But there are some secret tricks hidden beneath the surface, and Edmund Brumaghin is here to talk about them.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We published our findings on a ransomware family known as MedusaLocker last week. On its surface, it’s just like any other ransomware family — steals your stuff, encrypts it, and asks for some money to get it back. But there are some secret tricks hidden beneath the surface, and Edmund Brumaghin is here to talk about them.<br/><br/></div>]]></content:encoded>
    <itunes:author>Edmund Brumaghin (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127916-talos-takes-ep-17-how-medusalocker-is-different-than-other-ransomware.mp3" length="3365681" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/289</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>273</itunes:duration>
    <itunes:keywords>ransomware, MedusaLocker, malware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #16: Inside thew newly discovered PoetRAT</itunes:title>
    <title>Talos Takes Ep. #16: Inside thew newly discovered PoetRAT</title>
    <itunes:summary><![CDATA[Threat actors all over the place are trying to capitalize on COVID-19. We recently discovered a campaign we’re calling “PoetRAT” using lure documents themed around the pandemic attempting to trick victims into downloading malware. In this week’s Talos Takes episode, Nick Biasini chats with one of the researchers on the project, Warren Mercer, about this threat.]]></itunes:summary>
    <description><![CDATA[<div>Threat actors all over the place are trying to capitalize on COVID-19. We recently discovered a campaign we’re calling “PoetRAT” using lure documents themed around the pandemic attempting to trick victims into downloading malware. In this week’s Talos Takes episode, Nick Biasini chats with one of the researchers on the project, Warren Mercer, about this threat.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Threat actors all over the place are trying to capitalize on COVID-19. We recently discovered a campaign we’re calling “PoetRAT” using lure documents themed around the pandemic attempting to trick victims into downloading malware. In this week’s Talos Takes episode, Nick Biasini chats with one of the researchers on the project, Warren Mercer, about this threat.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127915-talos-takes-ep-16-inside-thew-newly-discovered-poetrat.mp3" length="5849972" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/287</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>480</itunes:duration>
    <itunes:keywords>APTs, threat actors, COVID-19, PoetRAT</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #15: What is FUD and how adversaries leverage it</itunes:title>
    <title>Talos Takes Ep. #15: What is FUD and how adversaries leverage it</title>
    <itunes:summary><![CDATA[Threat researchers like to throw around the acronym “FUD” a lot. But is FUD, exactly? Why should you look out for it? And why do attackers win when they sow FUD? Joe Marshall and Jon Munshaw walk you through fear, uncertainty and doubt and discuss why panic and misinformation play right into attackers’ hands.]]></itunes:summary>
    <description><![CDATA[<div>Threat researchers like to throw around the acronym “FUD” a lot. But is FUD, exactly? Why should you look out for it? And why do attackers win when they sow FUD? Joe Marshall and Jon Munshaw walk you through fear, uncertainty and doubt and discuss why panic and misinformation play right into attackers’ hands.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Threat researchers like to throw around the acronym “FUD” a lot. But is FUD, exactly? Why should you look out for it? And why do attackers win when they sow FUD? Joe Marshall and Jon Munshaw walk you through fear, uncertainty and doubt and discuss why panic and misinformation play right into attackers’ hands.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Joe Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127914-talos-takes-ep-15-what-is-fud-and-how-adversaries-leverage-it.mp3" length="5336399" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/285</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>437</itunes:duration>
    <itunes:keywords>FUD, APTs, fake news, misinformation</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #14: Summing up our recent research on fingerprint scanners</itunes:title>
    <title>Talos Takes Ep. #14: Summing up our recent research on fingerprint scanners</title>
    <itunes:summary><![CDATA[Earlier this week, we released an in-depth blog post on fingerprint scanners used as physical security gates on devices. To save you a bit of time, and to summarize it for those non-technical folks out there, Nick Biasini and Jon Munshaw dedicate this episode to breaking down Talos’ research. What was the endgame of our research? And can you rely only on your fingerprint to keep your device secure?]]></itunes:summary>
    <description><![CDATA[<div>Earlier this week, we released an in-depth <a href='https://blog.talosintelligence.com/2020/04/fingerprint-research.html'>blog post on fingerprint scanners</a> used as physical security gates on devices. To save you a bit of time, and to summarize it for those non-technical folks out there, Nick Biasini and Jon Munshaw dedicate this episode to breaking down Talos’ research. What was the endgame of our research? And can you rely only on your fingerprint to keep your device secure?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Earlier this week, we released an in-depth <a href='https://blog.talosintelligence.com/2020/04/fingerprint-research.html'>blog post on fingerprint scanners</a> used as physical security gates on devices. To save you a bit of time, and to summarize it for those non-technical folks out there, Nick Biasini and Jon Munshaw dedicate this episode to breaking down Talos’ research. What was the endgame of our research? And can you rely only on your fingerprint to keep your device secure?<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127913-talos-takes-ep-14-summing-up-our-recent-research-on-fingerprint-scanners.mp3" length="4376088" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/283</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>357</itunes:duration>
    <itunes:keywords>fingerprint, mobile security, security, device security, fingerprint scanners, biometrics</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #13: Special precautions to take with VPN and RDP</itunes:title>
    <title>Talos Takes Ep. #13: Special precautions to take with VPN and RDP</title>
    <itunes:summary><![CDATA[People across the world are working from home now, and employers are increasingly turning to VPN services and Windows Remote Desktop Protocol to make sure their workers have access to their files. In this Talos Takes episode, we run down some common security concerns with these services and discuss what employees should do to stay safe while accessing their files online.]]></itunes:summary>
    <description><![CDATA[<div>People across the world are working from home now, and employers are increasingly turning to VPN services and Windows Remote Desktop Protocol to make sure their workers have access to their files. In this Talos Takes episode, we run down some common security concerns with these services and discuss what employees should do to stay safe while accessing their files online.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>People across the world are working from home now, and employers are increasingly turning to VPN services and Windows Remote Desktop Protocol to make sure their workers have access to their files. In this Talos Takes episode, we run down some common security concerns with these services and discuss what employees should do to stay safe while accessing their files online.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127912-talos-takes-ep-13-special-precautions-to-take-with-vpn-and-rdp.mp3" length="4038912" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/248</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>329</itunes:duration>
    <itunes:keywords>working from home, COVID-19, WFH, coronavirus, RDP, VPN, remote access</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #12: Preparing for the worst with Cisco Talos Incident Response</itunes:title>
    <title>Talos Takes Ep. #12: Preparing for the worst with Cisco Talos Incident Response</title>
    <itunes:summary><![CDATA[Now that Cisco Incident Response has been a part of the Talos family for a few months now, we figured it was time to check back in with them. On this episode of Talos Takes, Brad Garnett from CTIR joins the show to talk about his organization’s new Cyber Range offering, part of the standard CTIR retainer. Brad discusses how a Cyber Range exercise can prepare your organization for the worst and how it helps dispel some myths around what happens during a cyber intrusion.]]></itunes:summary>
    <description><![CDATA[<div>Now that Cisco Incident Response has been a part of the Talos family for a few months now, we figured it was time to check back in with them. On this episode of Talos Takes, Brad Garnett from CTIR joins the show to talk about his organization’s new Cyber Range offering, part of the standard CTIR retainer. Brad discusses how a Cyber Range exercise can prepare your organization for the worst and how it helps dispel some myths around what happens during a cyber intrusion.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Now that Cisco Incident Response has been a part of the Talos family for a few months now, we figured it was time to check back in with them. On this episode of Talos Takes, Brad Garnett from CTIR joins the show to talk about his organization’s new Cyber Range offering, part of the standard CTIR retainer. Brad discusses how a Cyber Range exercise can prepare your organization for the worst and how it helps dispel some myths around what happens during a cyber intrusion.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Brad Garnett (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127911-talos-takes-ep-12-preparing-for-the-worst-with-cisco-talos-incident-response.mp3" length="5355648" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/247</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>439</itunes:duration>
    <itunes:keywords>incident response, CTIR, Talos Incident Response, Cyber Range</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #10: The basics of RATs</itunes:title>
    <title>Talos Takes Ep. #10: The basics of RATs</title>
    <itunes:summary><![CDATA[We’ve been covering several different generic types of malware over the past few weeks. Next up, we’ve got our overview of remote access trojans (or tools), also known as RATs. What goes into a RAT, and how is it different than other types of malware? What are some of their inherent capabiliites? We/ve got the rundown here.]]></itunes:summary>
    <description><![CDATA[<div>We’ve been covering several different generic types of malware over the past few weeks. Next up, we’ve got our overview of remote access trojans (or tools), also known as RATs. What goes into a RAT, and how is it different than other types of malware? What are some of their inherent capabiliites? We/ve got the rundown here.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We’ve been covering several different generic types of malware over the past few weeks. Next up, we’ve got our overview of remote access trojans (or tools), also known as RATs. What goes into a RAT, and how is it different than other types of malware? What are some of their inherent capabiliites? We/ve got the rundown here.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127910-talos-takes-ep-10-the-basics-of-rats.mp3" length="3228097" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/244</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>261</itunes:duration>
    <itunes:keywords>trojans, RATs, remote access tools, malware, backdoors</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #11: Avoiding fake news during the times of COVID-19</itunes:title>
    <title>Talos Takes Ep. #11: Avoiding fake news during the times of COVID-19</title>
    <itunes:summary><![CDATA[Don’t attackers know we need a break right now? Alas, they’re doing everything they can to capitalize on the COVID-19 pandemic. This includes spreading fear, uncertainty and doubt with fake news, malicious advertisements and misleading information. In this Talos Takes episode, former journalist Jon Munshaw and researcher Nick Biasini discuss best practices for fact-checking, avoiding fake news and intaking the correct information during this trying time.]]></itunes:summary>
    <description><![CDATA[<div>Don’t attackers know we need a break right now? Alas, they’re doing everything they can to capitalize on the COVID-19 pandemic. This includes spreading fear, uncertainty and doubt with fake news, malicious advertisements and misleading information. In this Talos Takes episode, former journalist Jon Munshaw and researcher Nick Biasini discuss best practices for fact-checking, avoiding fake news and intaking the correct information during this trying time.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Don’t attackers know we need a break right now? Alas, they’re doing everything they can to capitalize on the COVID-19 pandemic. This includes spreading fear, uncertainty and doubt with fake news, malicious advertisements and misleading information. In this Talos Takes episode, former journalist Jon Munshaw and researcher Nick Biasini discuss best practices for fact-checking, avoiding fake news and intaking the correct information during this trying time.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127909-talos-takes-ep-11-avoiding-fake-news-during-the-times-of-covid-19.mp3" length="4613918" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/246</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>377</itunes:duration>
    <itunes:keywords>coronavirus, COVID-19, COVID, virus, pandemic, fake news, spam, malicious advertising, malvertising</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #9: The basics of information stealers</itunes:title>
    <title>Talos Takes Ep. #9: The basics of information stealers</title>
    <itunes:summary><![CDATA[Yes, adversaries are always looking for new ways to make money. But what’s their No. 2 priority? Information. In this episode of Talos Takes, Nick Biasini and Earl Carter break down the basics of information-stealers and why they’re so important to keep out.]]></itunes:summary>
    <description><![CDATA[<div>Yes, adversaries are always looking for new ways to make money. But what’s their No. 2 priority? Information. In this episode of Talos Takes, Nick Biasini and Earl Carter break down the basics of information-stealers and why they’re so important to keep out.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Yes, adversaries are always looking for new ways to make money. But what’s their No. 2 priority? Information. In this episode of Talos Takes, Nick Biasini and Earl Carter break down the basics of information-stealers and why they’re so important to keep out.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127908-talos-takes-ep-9-the-basics-of-information-stealers.mp3" length="3033651" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/242</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>245</itunes:duration>
    <itunes:keywords>infostealers, information stealers, malware, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #4: What&#39;s the best way to manage your passwords?</itunes:title>
    <title>Talos Takes Ep. #4: What&#39;s the best way to manage your passwords?</title>
    <itunes:summary><![CDATA[Talos Takes is finally back with its own feed and a new episode. Nick Biasini and Earl Carter discuss the best password practices. Should you use a password manager? What are some best practices? And what does all of this have to do with Disney Plus?]]></itunes:summary>
    <description><![CDATA[<div>Talos Takes is finally back with its own feed and a new episode. Nick Biasini and Earl Carter discuss the best password practices. Should you use a password manager? What are some best practices? And what does all of this have to do with Disney Plus?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Talos Takes is finally back with its own feed and a new episode. Nick Biasini and Earl Carter discuss the best password practices. Should you use a password manager? What are some best practices? And what does all of this have to do with Disney Plus?<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127907-talos-takes-ep-4-what-s-the-best-way-to-manage-your-passwords.mp3" length="4121230" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/232</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>336</itunes:duration>
    <itunes:keywords>passwords, password managers, accounts, data breach</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #30: Spamming from Salfram</itunes:title>
    <title>Talos Takes Ep. #30: Spamming from Salfram</title>
    <itunes:summary><![CDATA[On this week’s episode, Edmund Brumaghin joins the show again to talk about a recent blog post on Salfram. This threat actor is spreading lots and lots of spam and using it to deliver a variety of malware. Here’s why this threat specifically caught our eye and how it’s evolving over time.]]></itunes:summary>
    <description><![CDATA[<div>On this week’s episode, Edmund Brumaghin joins the show again to talk about a recent blog post on <a href='https://blog.talosintelligence.com/2020/09/salfram-robbing-place-without-removing.html'>Salfram</a>. This threat actor is spreading lots and lots of spam and using it to deliver a variety of malware. Here’s why this threat specifically caught our eye and how it’s evolving over time.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>On this week’s episode, Edmund Brumaghin joins the show again to talk about a recent blog post on <a href='https://blog.talosintelligence.com/2020/09/salfram-robbing-place-without-removing.html'>Salfram</a>. This threat actor is spreading lots and lots of spam and using it to deliver a variety of malware. Here’s why this threat specifically caught our eye and how it’s evolving over time.<br/><br/></div>]]></content:encoded>
    <itunes:author>Edmund Brumaghin (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127906-talos-takes-ep-30-spamming-from-salfram.mp3" length="3623451" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/350</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>294</itunes:duration>
    <itunes:keywords>Salfram, spam, phishing, malware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #8: Decoding the EKANS malware</itunes:title>
    <title>Talos Takes Ep. #8: Decoding the EKANS malware</title>
    <itunes:summary><![CDATA[In this episode of Talos Takes, content manager Jon Munshaw sits down with researcher Joe Marshall to discuss the recently discovered EKANS/SNAKE malware. This is one of the first ransomware strains to specifically target ICS systems. And Joe, who has experiencing protecting the ICS space, discusses what’s unique about this family and what it means for the future of cyber security in the infrastructure field.]]></itunes:summary>
    <description><![CDATA[<div>In this episode of Talos Takes, content manager Jon Munshaw sits down with researcher Joe Marshall to discuss the recently discovered EKANS/SNAKE malware. This is one of the first ransomware strains to specifically target ICS systems. And Joe, who has experiencing protecting the ICS space, discusses what’s unique about this family and what it means for the future of cyber security in the infrastructure field.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>In this episode of Talos Takes, content manager Jon Munshaw sits down with researcher Joe Marshall to discuss the recently discovered EKANS/SNAKE malware. This is one of the first ransomware strains to specifically target ICS systems. And Joe, who has experiencing protecting the ICS space, discusses what’s unique about this family and what it means for the future of cyber security in the infrastructure field.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Joe Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127905-talos-takes-ep-8-decoding-the-ekans-malware.mp3" length="4252541" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/241</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>347</itunes:duration>
    <itunes:keywords>ransomware, ICS, infrastructure, manufacturing, EKANS, SNAKE, ICS malware, IoT</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #7: How attackers are capitalizing on coronavirus fears</itunes:title>
    <title>Talos Takes Ep. #7: How attackers are capitalizing on coronavirus fears</title>
    <itunes:summary><![CDATA[With the RSA conference just days away, notable vendors such as IBM and AT&amp;T have withdrawn from the annual event over coronavirus concerns. The fast-spreading disease has captured headlines across the globe, and adversaries are trying to strike quickly. Continuing our look at attackers’ use of current events to spread malware, Nick Biasini and Earl Carter sit down to discuss malware campaigns that are hoping to scare victims into opening malicious emails and documents on coronavirus.]]></itunes:summary>
    <description><![CDATA[<div>With the RSA conference just days away, notable vendors such as IBM and AT&amp;T have withdrawn from the annual event over coronavirus concerns. The fast-spreading disease has captured headlines across the globe, and adversaries are trying to strike quickly. Continuing our look at attackers’ use of current events to spread malware, Nick Biasini and Earl Carter sit down to discuss malware campaigns that are hoping to scare victims into opening malicious emails and documents on coronavirus.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>With the RSA conference just days away, notable vendors such as IBM and AT&amp;T have withdrawn from the annual event over coronavirus concerns. The fast-spreading disease has captured headlines across the globe, and adversaries are trying to strike quickly. Continuing our look at attackers’ use of current events to spread malware, Nick Biasini and Earl Carter sit down to discuss malware campaigns that are hoping to scare victims into opening malicious emails and documents on coronavirus.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127904-talos-takes-ep-7-how-attackers-are-capitalizing-on-coronavirus-fears.mp3" length="3592891" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/239</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>292</itunes:duration>
    <itunes:keywords>news, cyber news, malware, spam, coronavirus, maldocs, RSA</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #6: Big Game Hunting</itunes:title>
    <title>Talos Takes Ep. #6: Big Game Hunting</title>
    <itunes:summary><![CDATA[With the Equifax attack back in the headlines, we take a closer look at Big Game Hunting this week on Talos Takes. Why do threat actors look at these massive targets, and what do they hope to get out of it? Is there anything smaller organizations can learn from these high-stakes campaigns?]]></itunes:summary>
    <description><![CDATA[<div>With the Equifax attack back in the headlines, we take a closer look at Big Game Hunting this week on Talos Takes. Why do threat actors look at these massive targets, and what do they hope to get out of it? Is there anything smaller organizations can learn from these high-stakes campaigns?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>With the Equifax attack back in the headlines, we take a closer look at Big Game Hunting this week on Talos Takes. Why do threat actors look at these massive targets, and what do they hope to get out of it? Is there anything smaller organizations can learn from these high-stakes campaigns?<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127903-talos-takes-ep-6-big-game-hunting.mp3" length="3389996" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/237</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>275</itunes:duration>
    <itunes:keywords>Big Game Hunting, APTs, big name, threat actors, state-sponsored actors, malware, cyber attacks</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #5: The evolution of ransomware</itunes:title>
    <title>Talos Takes Ep. #5: The evolution of ransomware</title>
    <itunes:summary><![CDATA[2019 was a huge year for ransomware. Cities across the U.S. had their government services attacked, and adversaries changed up their techniques in the hopes of making a larger profit and infecting more users. What other changes do we see coming to the ransomware space? Are adversaries’ motivations changing at all? And will defense techniques change along with them?]]></itunes:summary>
    <description><![CDATA[<div>2019 was a huge year for ransomware. Cities across the U.S. had their government services attacked, and adversaries changed up their techniques in the hopes of making a larger profit and infecting more users. What other changes do we see coming to the ransomware space? Are adversaries’ motivations changing at all? And will defense techniques change along with them?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>2019 was a huge year for ransomware. Cities across the U.S. had their government services attacked, and adversaries changed up their techniques in the hopes of making a larger profit and infecting more users. What other changes do we see coming to the ransomware space? Are adversaries’ motivations changing at all? And will defense techniques change along with them?<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127902-talos-takes-ep-5-the-evolution-of-ransomware.mp3" length="3130748" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/236</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>253</itunes:duration>
    <itunes:keywords>ransomware, ransom payments, extortion, RATs, trojans</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #2: How to keep your fancy new IoT toy secure</itunes:title>
    <title>Talos Takes Ep. #2: How to keep your fancy new IoT toy secure</title>
    <itunes:summary><![CDATA[The holidays have come and gone, and so have the sales. Maybe you got a new drone, or a home AI assistant. So what should you do to make sure those new toys don’t turn against you? Nick Biasini and Earl Carter have some tips for you.]]></itunes:summary>
    <description><![CDATA[<div>The holidays have come and gone, and so have the sales. Maybe you got a new drone, or a home AI assistant. So what should you do to make sure those new toys don’t turn against you? Nick Biasini and Earl Carter have some tips for you.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The holidays have come and gone, and so have the sales. Maybe you got a new drone, or a home AI assistant. So what should you do to make sure those new toys don’t turn against you? Nick Biasini and Earl Carter have some tips for you.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127901-talos-takes-ep-2-how-to-keep-your-fancy-new-iot-toy-secure.mp3" length="3765198" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/235</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>306</itunes:duration>
    <itunes:keywords>IoT, tech, smart devices, patching, smart, vulnerabilities</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #3: The basics of malvertising</itunes:title>
    <title>Talos Takes Ep. #3: The basics of malvertising</title>
    <itunes:summary><![CDATA[We’ve all seen the supposed stories online that promise to give you “The one secret to weight loss doctors WON’T tell you about.” Or “You won’t believe who Kim Kardashian is talking about now.” So how harmful are these malicious ads? Why do some of them deliver malware, and others don’t? In this episode of Talos Takes, Nick Biasini and Earl Carter dive into the basics of malvertising.]]></itunes:summary>
    <description><![CDATA[<div>We’ve all seen the supposed stories online that promise to give you “The one secret to weight loss doctors WON’T tell you about.” Or “You won’t believe who Kim Kardashian is talking about now.” So how harmful are these malicious ads? Why do some of them deliver malware, and others don’t? In this episode of Talos Takes, Nick Biasini and Earl Carter dive into the basics of malvertising.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We’ve all seen the supposed stories online that promise to give you “The one secret to weight loss doctors WON’T tell you about.” Or “You won’t believe who Kim Kardashian is talking about now.” So how harmful are these malicious ads? Why do some of them deliver malware, and others don’t? In this episode of Talos Takes, Nick Biasini and Earl Carter dive into the basics of malvertising.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127900-talos-takes-ep-3-the-basics-of-malvertising.mp3" length="4569166" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/233</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>373</itunes:duration>
    <itunes:keywords>malvertising, malicious ads, advertising, malware, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #1: How to avoid common holiday shopping scams</itunes:title>
    <title>Talos Takes Ep. #1: How to avoid common holiday shopping scams</title>
    <itunes:summary><![CDATA[We first brought you this episode in the Beers with Talos feedback in December. We’re uploading this to the Talos Takes feed for posterity now, and let’s face it, these holiday shopping reminders can apply to any time you’re shopping online.]]></itunes:summary>
    <description><![CDATA[<div>We first brought you this episode in the Beers with Talos feedback in December. We’re uploading this to the Talos Takes feed for posterity now, and let’s face it, these holiday shopping reminders can apply to any time you’re shopping online.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We first brought you this episode in the Beers with Talos feedback in December. We’re uploading this to the Talos Takes feed for posterity now, and let’s face it, these holiday shopping reminders can apply to any time you’re shopping online.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (host) and Jon Munshaw (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127899-talos-takes-ep-1-how-to-avoid-common-holiday-shopping-scams.mp3" length="3178386" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/234</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>257</itunes:duration>
    <itunes:keywords>holiday, shopping, scams, holiday shopping, online scams, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #31: Diving even deeper into Cobalt Strike</itunes:title>
    <title>Talos Takes Ep. #31: Diving even deeper into Cobalt Strike</title>
    <itunes:summary><![CDATA[Snort researcher and rule-writer Nick Mavis takes time out of his busy schedule to join us again this week. Nick recently published a research paper on the bevy of detection he wrote for Cobalt Strike, a tool attackers are increasingly using. Nick talks about his process of working on the paper, why Cobalt Strike has become so popular and what he learned during the research process.]]></itunes:summary>
    <description><![CDATA[<div>Snort researcher and rule-writer Nick Mavis takes time out of his busy schedule to join us again this week. Nick recently published <a href='https://blog.talosintelligence.com/2020/09/coverage-strikes-back-cobalt-strike-paper.html'>a research paper</a> on the bevy of detection he wrote for Cobalt Strike, a tool attackers are increasingly using. Nick talks about his process of working on the paper, why Cobalt Strike has become so popular and what he learned during the research process.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Snort researcher and rule-writer Nick Mavis takes time out of his busy schedule to join us again this week. Nick recently published <a href='https://blog.talosintelligence.com/2020/09/coverage-strikes-back-cobalt-strike-paper.html'>a research paper</a> on the bevy of detection he wrote for Cobalt Strike, a tool attackers are increasingly using. Nick talks about his process of working on the paper, why Cobalt Strike has become so popular and what he learned during the research process.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Nicholas Mavis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127898-talos-takes-ep-31-diving-even-deeper-into-cobalt-strike.mp3" length="3697321" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/352</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>300</itunes:duration>
    <itunes:keywords>Cobalt Strike, Snort, malware, detection</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #108 (XL Edition): On Air with Cisco Talos Incident Response</itunes:title>
    <title>Talos Takes Ep. #108 (XL Edition): On Air with Cisco Talos Incident Response</title>
    <itunes:summary><![CDATA[This week’s episode of Talos Takes is a special extra large edition. We’ve got the audio version of our recent Cisco Talos Incident Response On Air stream where some of our responders got together to discuss the past threats of the top quarter. Liz Waddell and other team members covered everything from recent ransomware actor drama, to the importance of saving logs and other tips they picked up over the past few months.]]></itunes:summary>
    <description><![CDATA[<div>This week’s episode of Talos Takes is a special extra large edition. We’ve got the audio version of our <a href='https://youtu.be/uq7DzgpXhS0'>recent Cisco Talos Incident Response On Air stream</a> where some of our responders got together to discuss the past threats of the top quarter. Liz Waddell and other team members covered everything from recent ransomware actor drama, to the importance of saving logs and other tips they picked up over the past few months.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>This week’s episode of Talos Takes is a special extra large edition. We’ve got the audio version of our <a href='https://youtu.be/uq7DzgpXhS0'>recent Cisco Talos Incident Response On Air stream</a> where some of our responders got together to discuss the past threats of the top quarter. Liz Waddell and other team members covered everything from recent ransomware actor drama, to the importance of saving logs and other tips they picked up over the past few months.<br/><br/></div>]]></content:encoded>
    <itunes:author>Liz Waddell (host), Brett Ellis (speaker), and Nate Pors (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127897-talos-takes-ep-108-xl-edition-on-air-with-cisco-talos-incident-response.mp3" length="31045081" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/665</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>2576</itunes:duration>
    <itunes:keywords>Incident Response, trends, CTIR, stream, ransomware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #107: Infostealers 101</itunes:title>
    <title>Talos Takes Ep. #107: Infostealers 101</title>
    <itunes:summary><![CDATA[It’s been a while since we re-visited our Malware 101 series. So we’re going back to class to learn about information-stealers. Aliza Johnson from the Talos Threat Intelligence &amp; Interdiction team joins the show to talk about her recent research into and overview of infostealers. Although the name is pretty self-explanatory, this type of malware comes in many shapes and sizes for many purposes.]]></itunes:summary>
    <description><![CDATA[<div>It’s been a while since we re-visited our Malware 101 series. So we’re going back to class to learn about information-stealers. Aliza Johnson from the Talos Threat Intelligence &amp; Interdiction team joins the show to talk about her recent <a href='https://talosintelligence.com/resources/488'>research into and overview of infostealers</a>. Although the name is pretty self-explanatory, this type of malware comes in many shapes and sizes for many purposes.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>It’s been a while since we re-visited our Malware 101 series. So we’re going back to class to learn about information-stealers. Aliza Johnson from the Talos Threat Intelligence &amp; Interdiction team joins the show to talk about her recent <a href='https://talosintelligence.com/resources/488'>research into and overview of infostealers</a>. Although the name is pretty self-explanatory, this type of malware comes in many shapes and sizes for many purposes.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Aliza Johnson (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127896-talos-takes-ep-107-infostealers-101.mp3" length="5989494" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/664</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>488</itunes:duration>
    <itunes:keywords>malware, cyber attack, infostealers, data theft</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #106: The top attacker trends from the past quarter</itunes:title>
    <title>Talos Takes Ep. #106: The top attacker trends from the past quarter</title>
    <itunes:summary><![CDATA[Nate Pors joins the show this week to recap the recently released Cisco Talos Incident Response Quarterly Report. He and Jon recap the top attacker trends from the past quarter, including highlighting which types of attacks CTIR saw in the field and what new techniques adversaries are using. Topics discussed include the increased targeting of telecommunications companies, a decline in ransomware attacks and more business email compromise.]]></itunes:summary>
    <description><![CDATA[<div>Nate Pors joins the show this week to recap the recently released Cisco Talos Incident Response Quarterly Report. He and Jon recap the top attacker trends from the past quarter, including highlighting which types of attacks CTIR saw in the field and what new techniques adversaries are using. Topics discussed include the increased targeting of telecommunications companies, a decline in ransomware attacks and more business email compromise.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Nate Pors joins the show this week to recap the recently released Cisco Talos Incident Response Quarterly Report. He and Jon recap the top attacker trends from the past quarter, including highlighting which types of attacks CTIR saw in the field and what new techniques adversaries are using. Topics discussed include the increased targeting of telecommunications companies, a decline in ransomware attacks and more business email compromise.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Nate Pors (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127895-talos-takes-ep-106-the-top-attacker-trends-from-the-past-quarter.mp3" length="5989054" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/662</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>488</itunes:duration>
    <itunes:keywords>Incident response, ransomware, malware, quarterly trends, APTs, BEC</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #105: We return once more to Transparent Tribe</itunes:title>
    <title>Talos Takes Ep. #105: We return once more to Transparent Tribe</title>
    <itunes:summary><![CDATA[Yes, this is the third time we’ve talked about Transparent Tribe on Talos Takes, you’re not going crazy. But they keep giving us reasons to bring them up! This time, Nick Biasini joins the show to discuss the latest evolution of this threat actor: The targeting of higher education institutions in India. Jon and Nick discuss why colleges are always a high-priority target and what this could mean for the evolution of the actor.]]></itunes:summary>
    <description><![CDATA[<div>Yes, this is the third time we’ve talked about Transparent Tribe on Talos Takes, you’re not going crazy. But they keep giving us reasons to bring them up! This time, Nick Biasini joins the show to discuss the latest evolution of this threat actor: The targeting of higher education institutions in India. Jon and Nick discuss why colleges are always a high-priority target and what this could mean for the evolution of the actor.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Yes, this is the third time we’ve talked about Transparent Tribe on Talos Takes, you’re not going crazy. But they keep giving us reasons to bring them up! This time, Nick Biasini joins the show to discuss the latest evolution of this threat actor: The targeting of higher education institutions in India. Jon and Nick discuss why colleges are always a high-priority target and what this could mean for the evolution of the actor.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127894-talos-takes-ep-105-we-return-once-more-to-transparent-tribe.mp3" length="4859517" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/661</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>394</itunes:duration>
    <itunes:keywords>Transparent Tribe, threat actor, colleges, higher education, intellectual property</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #104: The psychology of multi-factor authentication</itunes:title>
    <title>Talos Takes Ep. #104: The psychology of multi-factor authentication</title>
    <itunes:summary><![CDATA[We go back to college this week with a Psychology 101 class. And today, we’re covering multi-factor authentication. Jon has Dave Lewis, one of Cisco Duo’s advisory CISOs, on the show to talk about the psychology behind using these apps and talking to users about implementing it across their environments. They discuss moving around the accept and reject buttons in the UI, how we communicate the benefits of MFA to administrators and the recent wave of brute-force attacks.]]></itunes:summary>
    <description><![CDATA[<div>We go back to college this week with a Psychology 101 class. And today, we’re covering multi-factor authentication. Jon has Dave Lewis, one of Cisco Duo’s advisory CISOs, on the show to talk about the psychology behind using these apps and talking to users about implementing it across their environments. They discuss moving around the accept and reject buttons in the UI, how we communicate the benefits of MFA to administrators and the recent wave of brute-force attacks.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We go back to college this week with a Psychology 101 class. And today, we’re covering multi-factor authentication. Jon has Dave Lewis, one of Cisco Duo’s advisory CISOs, on the show to talk about the psychology behind using these apps and talking to users about implementing it across their environments. They discuss moving around the accept and reject buttons in the UI, how we communicate the benefits of MFA to administrators and the recent wave of brute-force attacks.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Dave Lewis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127893-talos-takes-ep-104-the-psychology-of-multi-factor-authentication.mp3" length="6854368" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/659</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>560</itunes:duration>
    <itunes:keywords>MFA, multi-factor authentication, brute force</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #103: What we can learn from a recent AvosLocker attack</itunes:title>
    <title>Talos Takes Ep. #103: What we can learn from a recent AvosLocker attack</title>
    <itunes:summary><![CDATA[Chris Neal from Talos Outreach recently dove into a recent AvosLocker ransomware attack in the wild. This week, he joins the show to recap his major takeaways from this attack that other potential targets can learn from. He and Jon talk about the current ransomware-as-a-service landscape, the use of living-off-the-land binaries and other calling cards from this actor to keep an eye out for.]]></itunes:summary>
    <description><![CDATA[<div>Chris Neal from Talos Outreach recently dove into a <a href='https://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html'>recent AvosLocker ransomware attack</a> in the wild. This week, he joins the show to recap his major takeaways from this attack that other potential targets can learn from. He and Jon talk about the current ransomware-as-a-service landscape, the use of <a href='https://talosintelligence.com/podcasts/shows/talos_takes/episodes/24'>living-off-the-land binaries</a> and other calling cards from this actor to keep an eye out for.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Chris Neal from Talos Outreach recently dove into a <a href='https://blog.talosintelligence.com/2022/06/avoslocker-new-arsenal.html'>recent AvosLocker ransomware attack</a> in the wild. This week, he joins the show to recap his major takeaways from this attack that other potential targets can learn from. He and Jon talk about the current ransomware-as-a-service landscape, the use of <a href='https://talosintelligence.com/podcasts/shows/talos_takes/episodes/24'>living-off-the-land binaries</a> and other calling cards from this actor to keep an eye out for.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Chris Neal (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127892-talos-takes-ep-103-what-we-can-learn-from-a-recent-avoslocker-attack.mp3" length="6225380" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/657</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>508</itunes:duration>
    <itunes:keywords>LoLBins, ransomware, AvosLocker, cyber attack, ransomware-as-a-service</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #102: Unmasking ransomware groups on the dark web</itunes:title>
    <title>Talos Takes Ep. #102: Unmasking ransomware groups on the dark web</title>
    <itunes:summary><![CDATA[Paul Eubanks joins this week’s episode of Talos Takes to look at his recent blog post on de-anonymizing ransomware groups on the whispers dark web. Paul and his team recently used several tactics to unmask several threat actors and disclosure their tactics to stay hidden. Jon interviews Paul about ransomware actors’ usual operations on the dark web, the specific tools and tactics he used and the pros and cons of calling out actors for their opsec failures.]]></itunes:summary>
    <description><![CDATA[<div>Paul Eubanks joins this week’s episode of Talos Takes to look at his recent blog post on de-anonymizing ransomware groups on the <em>whispers</em> dark web. Paul and his team recently used several tactics to unmask several threat actors and disclosure their tactics to stay hidden. Jon interviews Paul about ransomware actors’ usual operations on the dark web, the specific tools and tactics he used and the pros and cons of calling out actors for their opsec failures.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Paul Eubanks joins this week’s episode of Talos Takes to look at his recent blog post on de-anonymizing ransomware groups on the <em>whispers</em> dark web. Paul and his team recently used several tactics to unmask several threat actors and disclosure their tactics to stay hidden. Jon interviews Paul about ransomware actors’ usual operations on the dark web, the specific tools and tactics he used and the pros and cons of calling out actors for their opsec failures.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Paul Eubanks (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127891-talos-takes-ep-102-unmasking-ransomware-groups-on-the-dark-web.mp3" length="6094377" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/656</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>497</itunes:duration>
    <itunes:keywords>ransomware, dark web, APTs</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #101: Cisco Live Talos roundup</itunes:title>
    <title>Talos Takes Ep. #101: Cisco Live Talos roundup</title>
    <itunes:summary><![CDATA[Jon reports live from the floor of Cisco Live U.S. this week. He interviewed several Talos speakers about their talks at Cisco Live and some of the major takeaways from conversations with users and customers this week.]]></itunes:summary>
    <description><![CDATA[<div>Jon reports live from the floor of Cisco Live U.S. this week. He interviewed several Talos speakers about their talks at Cisco Live and some of the major takeaways from conversations with users and customers this week.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Jon reports live from the floor of Cisco Live U.S. this week. He interviewed several Talos speakers about their talks at Cisco Live and some of the major takeaways from conversations with users and customers this week.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host), Joe Marshall (speaker), and Alexis Merritt (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127890-talos-takes-ep-101-cisco-live-talos-roundup.mp3" length="3784682" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/655</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>304</itunes:duration>
    <itunes:keywords>Cisco Live, ICS, cybersecurity, incident response, CTIR</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #100: Cisco Live U.S. preview</itunes:title>
    <title>Talos Takes Ep. #100: Cisco Live U.S. preview</title>
    <itunes:summary><![CDATA[Get ready for Cisco Live next week in Vegas with a quick primer on everything Talos has going on at the conference. We’re excited to be back in person interacting with customers and users. Jon has a complete rundown of the Talos space at the conference, some talk highlights and other things you should know before you go. For a complete agenda, check out the Cisco Live Session Catalog.]]></itunes:summary>
    <description><![CDATA[<div>Get ready for Cisco Live next week in Vegas with a quick primer on everything Talos has going on at the conference. We’re excited to be back in person interacting with customers and users. Jon has a complete rundown of the Talos space at the conference, some talk highlights and other things you should know before you go. For a complete agenda, check out the <a href='https://www.ciscolive.com/global/attend/sessions/session-catalog.html'>Cisco Live Session Catalog</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Get ready for Cisco Live next week in Vegas with a quick primer on everything Talos has going on at the conference. We’re excited to be back in person interacting with customers and users. Jon has a complete rundown of the Talos space at the conference, some talk highlights and other things you should know before you go. For a complete agenda, check out the <a href='https://www.ciscolive.com/global/attend/sessions/session-catalog.html'>Cisco Live Session Catalog</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Alexis Merritt (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127889-talos-takes-ep-100-cisco-live-u-s-preview.mp3" length="4107013" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/652</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>331</itunes:duration>
    <itunes:keywords>conferences, news, Cisco Live</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #99: A primer on Talos at RSA</itunes:title>
    <title>Talos Takes Ep. #99: A primer on Talos at RSA</title>
    <itunes:summary><![CDATA[We’re doing something a bit different this week — it’s just Jon for a few minutes talking about Talos’ plans at the RSA Conference coming up next week. Catch up on our plans for the week and here about some special events we have planned. To stay up-to-date on the latest, follow us on Twitter. And if you prefer a written preview, read this week’s Threat Source newsletter.]]></itunes:summary>
    <description><![CDATA[<div>We’re doing something a bit different this week — it’s just Jon for a few minutes talking about Talos’ plans at the RSA Conference coming up next week. Catch up on our plans for the week and here about some special events we have planned. To stay up-to-date on the latest, <a href='https://twitter.com/TalosSecurity'>follow us on Twitter</a>. And if you prefer a written preview, <a href='https://blog.talosintelligence.com/2022/06/threat-source-newsletter-june-2-2022.html'>read this week’s Threat Source newsletter</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We’re doing something a bit different this week — it’s just Jon for a few minutes talking about Talos’ plans at the RSA Conference coming up next week. Catch up on our plans for the week and here about some special events we have planned. To stay up-to-date on the latest, <a href='https://twitter.com/TalosSecurity'>follow us on Twitter</a>. And if you prefer a written preview, <a href='https://blog.talosintelligence.com/2022/06/threat-source-newsletter-june-2-2022.html'>read this week’s Threat Source newsletter</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127888-talos-takes-ep-99-a-primer-on-talos-at-rsa.mp3" length="3492746" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/650</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>280</itunes:duration>
    <itunes:keywords>conferences, RSA, RSAC, podcasts</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #98: Maybe don&#39;t panic about that F5 BIG-IP vulnerability</itunes:title>
    <title>Talos Takes Ep. #98: Maybe don&#39;t panic about that F5 BIG-IP vulnerability</title>
    <itunes:summary><![CDATA[The recently disclosed vulnerability in F5 BIG-IP took security Twitter by storm two weeks ago, and continues to make headlines now. It immediately prompted warnings from CISA and security researchers everywhere warning users to patch as soon as possible. Of course, it’s important to patch. But maybe we started panicking a little too early that this was going to be the next PrintNightmare. On this week’s episode of Talos Takes, Jon is joined by Jerry Gamblin from Kenna Security to talk about ...]]></itunes:summary>
    <description><![CDATA[<div>The recently <a href='https://blog.talosintelligence.com/2022/05/threat-advisory-critical-f5-big-ip-vuln.html'>disclosed vulnerability in F5 BIG-IP</a> took security Twitter by storm two weeks ago, and continues to make headlines now. It immediately prompted <a href='https://www.cisa.gov/uscert/ncas/alerts/aa22-138a#:~:text=This%20recently%20disclosed%20vulnerability%20in,port%20or%20self%2DIP%20addresses'>warnings from CISA</a> and security researchers everywhere warning users to patch as soon as possible. Of course, it’s important to patch. But maybe we started panicking a little too early that this was going to be the next PrintNightmare. On this week’s episode of Talos Takes, Jon is joined by Jerry Gamblin from Kenna Security to talk about the ins and outs of this vulnerability and while it is serious, it’s incredibly unlikely that an attacker can or would exploit it in the wild.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>The recently <a href='https://blog.talosintelligence.com/2022/05/threat-advisory-critical-f5-big-ip-vuln.html'>disclosed vulnerability in F5 BIG-IP</a> took security Twitter by storm two weeks ago, and continues to make headlines now. It immediately prompted <a href='https://www.cisa.gov/uscert/ncas/alerts/aa22-138a#:~:text=This%20recently%20disclosed%20vulnerability%20in,port%20or%20self%2DIP%20addresses'>warnings from CISA</a> and security researchers everywhere warning users to patch as soon as possible. Of course, it’s important to patch. But maybe we started panicking a little too early that this was going to be the next PrintNightmare. On this week’s episode of Talos Takes, Jon is joined by Jerry Gamblin from Kenna Security to talk about the ins and outs of this vulnerability and while it is serious, it’s incredibly unlikely that an attacker can or would exploit it in the wild.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Jerry Gamblin (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127887-talos-takes-ep-98-maybe-don-t-panic-about-that-f5-big-ip-vulnerability.mp3" length="5979067" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/649</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>487</itunes:duration>
    <itunes:keywords>vulnerabilities, patching, Kenna, BIG-IP</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #97: MustangPanda stays agnostic</itunes:title>
    <title>Talos Takes Ep. #97: MustangPanda stays agnostic</title>
    <itunes:summary><![CDATA[See people, this is what happens when you finally let a panda drive a sports car! This week’s episode of Talos Takes covers the basics of MustangPanda, a Chinese state-sponsored actor we wrote about recently. Asheer Maholtra joins the show to go over his research into this group. Mainly, we discuss why this actor, despite being aligned with China, is targeting Russian government entities and organizations. Though the two countries seem to be allies, all is fair in love and cyber espionage.]]></itunes:summary>
    <description><![CDATA[<div>See people, this is what happens when you finally let a panda drive a sports car! This week’s episode of Talos Takes covers the basics of MustangPanda, a Chinese state-sponsored actor <a href='https://blog.talosintelligence.com/2022/05/mustang-panda-targets-europe.html'>we wrote about recently</a>. Asheer Maholtra joins the show to go over his research into this group. Mainly, we discuss why this actor, despite being aligned with China, is targeting Russian government entities and organizations. Though the two countries seem to be allies, all is fair in love and cyber espionage.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>See people, this is what happens when you finally let a panda drive a sports car! This week’s episode of Talos Takes covers the basics of MustangPanda, a Chinese state-sponsored actor <a href='https://blog.talosintelligence.com/2022/05/mustang-panda-targets-europe.html'>we wrote about recently</a>. Asheer Maholtra joins the show to go over his research into this group. Mainly, we discuss why this actor, despite being aligned with China, is targeting Russian government entities and organizations. Though the two countries seem to be allies, all is fair in love and cyber espionage.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127886-talos-takes-ep-97-mustangpanda-stays-agnostic.mp3" length="5884803" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/648</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>480</itunes:duration>
    <itunes:keywords>MustangPanda, APTs, state-sponsored, ransomware, trojans</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #96: Takeaways from victim chats with two ransomware groups</itunes:title>
    <title>Talos Takes Ep. #96: Takeaways from victim chats with two ransomware groups</title>
    <itunes:summary><![CDATA[Kendall McKay joins Jon this week to discuss the Hive and Conti ransomware chats she and her colleagues recently reviewed. We obtained some leaked chats between these ransomware groups and some of their victims, showing us what communicating with an attacker is really like. Jon and Kendall discuss the negotiation process over a ransom payment and what else we learned from these chat logs.]]></itunes:summary>
    <description><![CDATA[<div>Kendall McKay joins Jon this week to discuss the <a href='https://blog.talosintelligence.com/2022/05/conti-and-hive-ransomware-operations.html'>Hive and Conti ransomware chats</a> she and her colleagues recently reviewed. We obtained some leaked chats between these ransomware groups and some of their victims, showing us what communicating with an attacker is really like. Jon and Kendall discuss the negotiation process over a ransom payment and what else we learned from these chat logs.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Kendall McKay joins Jon this week to discuss the <a href='https://blog.talosintelligence.com/2022/05/conti-and-hive-ransomware-operations.html'>Hive and Conti ransomware chats</a> she and her colleagues recently reviewed. We obtained some leaked chats between these ransomware groups and some of their victims, showing us what communicating with an attacker is really like. Jon and Kendall discuss the negotiation process over a ransom payment and what else we learned from these chat logs.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Kendall McKay (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127885-talos-takes-ep-96-takeaways-from-victim-chats-with-two-ransomware-groups.mp3" length="8599635" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/615</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>706</itunes:duration>
    <itunes:keywords>Hive, Conti, ransomware, malware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #95 (XL Edition): CTIR recaps last quarter&#39;s top threats</itunes:title>
    <title>Talos Takes Ep. #95 (XL Edition): CTIR recaps last quarter&#39;s top threats</title>
    <itunes:summary><![CDATA[On this week’s episode of Talos Takes, we’re bringing you the recording of last week’s live stream with Cisco Talos Incident Response. Beers with Talos’ own Liz Waddell hosted the first in our new “On Air” series with CTIR, where she and her fellow Talosians recapped the previous quarter’s top threats. They run through the malware families CTIR saw most in the field and discussed other trends that threat actors are starting to adapt.]]></itunes:summary>
    <description><![CDATA[<div>On this week’s episode of Talos Takes, we’re bringing you the recording of last week’s live stream with Cisco Talos Incident Response. Beers with Talos’ own Liz Waddell hosted the first in our new “On Air” series with CTIR, where she and her fellow Talosians recapped the previous quarter’s top threats. They run through the malware families CTIR saw most in the field and discussed other trends that threat actors are starting to adapt.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>On this week’s episode of Talos Takes, we’re bringing you the recording of last week’s live stream with Cisco Talos Incident Response. Beers with Talos’ own Liz Waddell hosted the first in our new “On Air” series with CTIR, where she and her fellow Talosians recapped the previous quarter’s top threats. They run through the malware families CTIR saw most in the field and discussed other trends that threat actors are starting to adapt.<br/><br/></div>]]></content:encoded>
    <itunes:author>Liz Waddell (host), Caitlin Huey (speaker), Alexis Merritt (speaker), and Laurie Varner (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127884-talos-takes-ep-95-xl-edition-ctir-recaps-last-quarter-s-top-threats.mp3" length="28399712" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/609</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>2356</itunes:duration>
    <itunes:keywords>CTIR, Incident Response, ransomware, malware</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #94: Everything you need to know about the BlackCat ransomware group</itunes:title>
    <title>Talos Takes Ep. #94: Everything you need to know about the BlackCat ransomware group</title>
    <itunes:summary><![CDATA[BlackCat, BlackMatter, DarkSide, BlackByte…it’s too hard to keep up with all these ransomware group names these days. So we’re here to break down one of these groups, BlackCat, for you so you can figure out what makes them actually memorable. Aliza Berk from our Talos Threat Intelligence &amp; Interdiction team joins Jon Munshaw this week to talk about BlackCat and their ransomware that’s recently become a major player on the malware landscape. Aliza recently compiled our latest Threat Assess...]]></itunes:summary>
    <description><![CDATA[<div>BlackCat, BlackMatter, DarkSide, BlackByte…it’s too hard to keep up with all these ransomware group names these days. So we’re here to break down one of these groups, BlackCat, for you so you can figure out what makes them actually memorable. Aliza Berk from our Talos Threat Intelligence &amp; Interdiction team joins Jon Munshaw this week to talk about BlackCat and their ransomware that’s recently become a major player on the malware landscape. Aliza recently compiled our latest Threat Assessment Report on this group and assisted in our research around the group. Jon and Aliza discuss how the use of the Rust programming language and using triple extortion tactics make this group a threat.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>BlackCat, BlackMatter, DarkSide, BlackByte…it’s too hard to keep up with all these ransomware group names these days. So we’re here to break down one of these groups, BlackCat, for you so you can figure out what makes them actually memorable. Aliza Berk from our Talos Threat Intelligence &amp; Interdiction team joins Jon Munshaw this week to talk about BlackCat and their ransomware that’s recently become a major player on the malware landscape. Aliza recently compiled our latest Threat Assessment Report on this group and assisted in our research around the group. Jon and Aliza discuss how the use of the Rust programming language and using triple extortion tactics make this group a threat.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Aliza Berk (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127883-talos-takes-ep-94-everything-you-need-to-know-about-the-blackcat-ransomware-group.mp3" length="6114285" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/608</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>499</itunes:duration>
    <itunes:keywords>BlackCat, ransomware, BlackMatter, malware, APTs</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #93: Kenna 101 — Best patching and mitigation strategies</itunes:title>
    <title>Talos Takes Ep. #93: Kenna 101 — Best patching and mitigation strategies</title>
    <itunes:summary><![CDATA[Continuing the “Kenna 101” series over at Talos Takes, Ed Bellis re-joins the show to talk about patching and mitigation strategies. So far, we’ve talked about how to tell when you should take a CVE seriously. But what if there’s no patch for it? Or what if you have to patch 50 vulnerabilities in the same product? We talk about how Kenna can help security teams of all sizes prioritize their patching strategies and create mitigation strategies in the worst-case scenario. For the other entries ...]]></itunes:summary>
    <description><![CDATA[<div>Continuing the “Kenna 101” series over at Talos Takes, Ed Bellis re-joins the show to talk about patching and mitigation strategies. So far, we’ve talked about how to tell when you should take a CVE seriously. But what if there’s no patch for it? Or what if you have to patch 50 vulnerabilities in the same product? We talk about how Kenna can help security teams of all sizes prioritize their patching strategies and create mitigation strategies in the worst-case scenario. For the other entries in our Kenna 101 series, listen <a href='https://talosintelligence.com/podcasts/shows/talos_takes/episodes/90'>here</a> and <a href='https://talosintelligence.com/podcasts/shows/talos_takes/episodes/92'>here</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Continuing the “Kenna 101” series over at Talos Takes, Ed Bellis re-joins the show to talk about patching and mitigation strategies. So far, we’ve talked about how to tell when you should take a CVE seriously. But what if there’s no patch for it? Or what if you have to patch 50 vulnerabilities in the same product? We talk about how Kenna can help security teams of all sizes prioritize their patching strategies and create mitigation strategies in the worst-case scenario. For the other entries in our Kenna 101 series, listen <a href='https://talosintelligence.com/podcasts/shows/talos_takes/episodes/90'>here</a> and <a href='https://talosintelligence.com/podcasts/shows/talos_takes/episodes/92'>here</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Ed Bellis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127882-talos-takes-ep-93-kenna-101-best-patching-and-mitigation-strategies.mp3" length="6981766" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/607</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>571</itunes:duration>
    <itunes:keywords>vulnerabilities, patching, Kenna Security, vulnerability research</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #92: Kenna 101 — How to read a CVE</itunes:title>
    <title>Talos Takes Ep. #92: Kenna 101 — How to read a CVE</title>
    <itunes:summary><![CDATA[Continuing our “Kenna 101” series, Jon is joined this week by Jerry Gamblin, Kenna’s director of security research. Jerry is an expert at all things CVE’s, so we reflect on reading vulnerability reports and analyzing specific CVEs. We discuss if “severity” scores even really mean anything, and how to interpret a maximum 10/10 score versus an attacker vector or type of vulnerability.]]></itunes:summary>
    <description><![CDATA[<div>Continuing our “Kenna 101” series, Jon is joined this week by Jerry Gamblin, Kenna’s director of security research. Jerry is an expert at all things CVE’s, so we reflect on reading vulnerability reports and analyzing specific CVEs. We discuss if “severity” scores even really mean anything, and how to interpret a maximum 10/10 score versus an attacker vector or type of vulnerability.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Continuing our “Kenna 101” series, Jon is joined this week by Jerry Gamblin, Kenna’s director of security research. Jerry is an expert at all things CVE’s, so we reflect on reading vulnerability reports and analyzing specific CVEs. We discuss if “severity” scores even really mean anything, and how to interpret a maximum 10/10 score versus an attacker vector or type of vulnerability.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Jerry Gamblin (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127881-talos-takes-ep-92-kenna-101-how-to-read-a-cve.mp3" length="7278096" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/605</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>596</itunes:duration>
    <itunes:keywords>Kenna, vulnerabilities, patching, exploits, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #91: The tax scams cometh</itunes:title>
    <title>Talos Takes Ep. #91: The tax scams cometh</title>
    <itunes:summary><![CDATA[It’s tax season! You know what that means — sadness, frustration and scams. Host Jon Munshaw sat down with Nick Biasini from the Talos Outreach team to talk about common tactics adversaries use around this “holiday” to try and spread malware, steal personal information and take users’ money. We talk about free security tools you can deploy to block these types of threats, common spam tactics to keep an eye out for and other services that can help you prepare for a worst-case scenario.]]></itunes:summary>
    <description><![CDATA[<div>It’s tax season! You know what that means — sadness, frustration and scams. Host Jon Munshaw sat down with Nick Biasini from the Talos Outreach team to talk about common tactics adversaries use around this “holiday” to try and spread malware, steal personal information and take users’ money. We talk about free security tools you can deploy to block these types of threats, common spam tactics to keep an eye out for and other services that can help you prepare for a worst-case scenario.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>It’s tax season! You know what that means — sadness, frustration and scams. Host Jon Munshaw sat down with Nick Biasini from the Talos Outreach team to talk about common tactics adversaries use around this “holiday” to try and spread malware, steal personal information and take users’ money. We talk about free security tools you can deploy to block these types of threats, common spam tactics to keep an eye out for and other services that can help you prepare for a worst-case scenario.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127880-talos-takes-ep-91-the-tax-scams-cometh.mp3" length="4555629" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/604</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>369</itunes:duration>
    <itunes:keywords>tax, Tax Day, spam, scams, email</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #90: Kenna Security 101</itunes:title>
    <title>Talos Takes Ep. #90: Kenna Security 101</title>
    <itunes:summary><![CDATA[We’re kicking off a new series of episodes called “Kenna 101” highlighting Cisco’s newest partner, Kenna Security. Kenna is a risk management platform for vulnerabilities that allows users to view what vulnerabilities exist in their environment and helps them create a plan for patching and mitigation. We’re starting things off with the CTO of Kenna, Ed Bellis, to talk about the basics of Kenna and its risk scores.]]></itunes:summary>
    <description><![CDATA[<div>We’re kicking off a new series of episodes called “Kenna 101” highlighting Cisco’s newest partner, <a href='https://www.kennasecurity.com/'>Kenna Security</a>. Kenna is a risk management platform for vulnerabilities that allows users to view what vulnerabilities exist in their environment and helps them create a plan for patching and mitigation. We’re starting things off with the CTO of Kenna, Ed Bellis, to talk about the basics of Kenna and its risk scores.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We’re kicking off a new series of episodes called “Kenna 101” highlighting Cisco’s newest partner, <a href='https://www.kennasecurity.com/'>Kenna Security</a>. Kenna is a risk management platform for vulnerabilities that allows users to view what vulnerabilities exist in their environment and helps them create a plan for patching and mitigation. We’re starting things off with the CTO of Kenna, Ed Bellis, to talk about the basics of Kenna and its risk scores.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Ed Bellis (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127879-talos-takes-ep-90-kenna-security-101.mp3" length="7277576" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/603</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>596</itunes:duration>
    <itunes:keywords>Kenna, security, vulnerabilities, patching</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #89: Taking the Meta out of the Metaverse</itunes:title>
    <title>Talos Takes Ep. #89: Taking the Meta out of the Metaverse</title>
    <itunes:summary><![CDATA[When most people think of the “Metaverse,” they may first think of the company Meta — the recently rebranded Facebook. After all, what other company would really want everyone taking meetings virtually using avatars while you share your cryptocurrency wallets and personal information with them? The Metaverse is actually much larger than this, though. So in this Talos Takes episode, we’re trying to demystify the Metaverse and look at what it is, exactly. Researcher Jaeson Schultz recaps his re...]]></itunes:summary>
    <description><![CDATA[<div>When most people think of the “Metaverse,” they may first think of the company Meta — the recently rebranded Facebook. After all, what other company would really want everyone taking meetings virtually using avatars while you share your cryptocurrency wallets and personal information with them? The Metaverse is actually much larger than this, though. So in this Talos Takes episode, we’re trying to demystify the Metaverse and look at what it is, exactly. Researcher Jaeson Schultz <a href='https://blog.talosintelligence.com/2022/02/securing-web-3.0-metaverse-and-beyond.html'>recaps his recent blog post</a> on the matter, and then he and Jon talk about the potential security pitfalls that could arise from adopting the Metaverse.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>When most people think of the “Metaverse,” they may first think of the company Meta — the recently rebranded Facebook. After all, what other company would really want everyone taking meetings virtually using avatars while you share your cryptocurrency wallets and personal information with them? The Metaverse is actually much larger than this, though. So in this Talos Takes episode, we’re trying to demystify the Metaverse and look at what it is, exactly. Researcher Jaeson Schultz <a href='https://blog.talosintelligence.com/2022/02/securing-web-3.0-metaverse-and-beyond.html'>recaps his recent blog post</a> on the matter, and then he and Jon talk about the potential security pitfalls that could arise from adopting the Metaverse.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Jaeson Schultz (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127878-talos-takes-ep-89-taking-the-meta-out-of-the-metaverse.mp3" length="9023470" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/601</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>741</itunes:duration>
    <itunes:keywords>Metaverse, Meta, cryptocurrency, scams</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #88: Biden&#39;s crypto executive order is good for good guys and bad for bad guys</itunes:title>
    <title>Talos Takes Ep. #88: Biden&#39;s crypto executive order is good for good guys and bad for bad guys</title>
    <itunes:summary><![CDATA[Jon and Nick sit down for a few minutes to talk about U.S. President Joe Biden’s recent Executive Order on more heavily regulating cryptocurrency. For a primer on this episode, you can read a quick overview here. This episode pretty much sums it up as being a good thing for anyone who uses cryptocurrency legitimately, and bad for anyone who uses crypto to do anything illegal. We discuss how greater regulation could affect ransomware operators who rely on virtual currency for ransom payments a...]]></itunes:summary>
    <description><![CDATA[<div>Jon and Nick sit down for a few minutes to talk about U.S. President Joe Biden’s <a href='https://www.cnbc.com/2022/03/09/heres-whats-in-bidens-executive-order-on-crypto.html'>recent Executive Order on more heavily regulating cryptocurrency</a>. For a primer on this episode, you can read a <a href='https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/09/fact-sheet-president-biden-to-sign-executive-order-on-ensuring-responsible-innovation-in-digital-assets/'>quick overview here</a>. This episode pretty much sums it up as being a good thing for anyone who uses cryptocurrency legitimately, and bad for anyone who uses crypto to do anything illegal. We discuss how greater regulation could affect ransomware operators who rely on virtual currency for ransom payments and illegitimate miners, and why no one using Bitcoin legitimately should be worried.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Jon and Nick sit down for a few minutes to talk about U.S. President Joe Biden’s <a href='https://www.cnbc.com/2022/03/09/heres-whats-in-bidens-executive-order-on-crypto.html'>recent Executive Order on more heavily regulating cryptocurrency</a>. For a primer on this episode, you can read a <a href='https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/09/fact-sheet-president-biden-to-sign-executive-order-on-ensuring-responsible-innovation-in-digital-assets/'>quick overview here</a>. This episode pretty much sums it up as being a good thing for anyone who uses cryptocurrency legitimately, and bad for anyone who uses crypto to do anything illegal. We discuss how greater regulation could affect ransomware operators who rely on virtual currency for ransom payments and illegitimate miners, and why no one using Bitcoin legitimately should be worried.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127877-talos-takes-ep-88-biden-s-crypto-executive-order-is-good-for-good-guys-and-bad-for-bad-guys.mp3" length="5300185" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/600</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>431</itunes:duration>
    <itunes:keywords>cryptocurrency, cryptominers, ransomware, ransom, government</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #87 (XL Edition): Livestream update on the current cybersecurity situation in Ukraine</itunes:title>
    <title>Talos Takes Ep. #87 (XL Edition): Livestream update on the current cybersecurity situation in Ukraine</title>
    <itunes:summary><![CDATA[Cisco Talos threat intelligence team and Cisco ThousandEyes went live on Talos’ social media platforms Friday to provide guidance on current cyberattacks and insight into internet activity in Ukraine. Both teams are actively monitoring the digital landscape and openly sharing essential findings to contribute to the safety of our customers globally.Many of our teams have set aside normal tasks, now spending their time watching over Ukrainian networks. Other teams have focused on protecting ref...]]></itunes:summary>
    <description><![CDATA[<div>Cisco Talos threat intelligence team and Cisco ThousandEyes went live on Talos’ social media platforms Friday to provide guidance on current cyberattacks and insight into internet activity in Ukraine. Both teams are actively monitoring the digital landscape and openly sharing essential findings to contribute to the safety of our customers globally.<br/><br/></div><div>Many of our teams have set aside normal tasks, now spending their time watching over Ukrainian networks. Other teams have focused on protecting refugees, physically and digitally. Still, others have volunteered their free time contributing critical components to our open-source intelligence work. The audio version of this briefing will share what we have seen and how you can protect your data, network and teams.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Cisco Talos threat intelligence team and Cisco ThousandEyes went live on Talos’ social media platforms Friday to provide guidance on current cyberattacks and insight into internet activity in Ukraine. Both teams are actively monitoring the digital landscape and openly sharing essential findings to contribute to the safety of our customers globally.<br/><br/></div><div>Many of our teams have set aside normal tasks, now spending their time watching over Ukrainian networks. Other teams have focused on protecting refugees, physically and digitally. Still, others have volunteered their free time contributing critical components to our open-source intelligence work. The audio version of this briefing will share what we have seen and how you can protect your data, network and teams.<br/><br/></div>]]></content:encoded>
    <itunes:author>Amy Henderson (speaker), Hazel Burton (host), and JJ Cummings (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127876-talos-takes-ep-87-xl-edition-livestream-update-on-the-current-cybersecurity-situation-in-ukraine.mp3" length="39225578" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/597</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>3258</itunes:duration>
    <itunes:keywords>Ukraine,cyberwar,cybersecurity,cyberattack,APTs</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #86: The fallout from the recent REvil arrests</itunes:title>
    <title>Talos Takes Ep. #86: The fallout from the recent REvil arrests</title>
    <itunes:summary><![CDATA[In the latest entry in the “Days of our Ransomware” series, Azim Khodjibaev joins Jon to talk about some recent ransomware drama. Dark web forums have been going nuts since Russia arrested and charged several alleged members of the REvil ransomware gang in January. Azim discusses how there’s been a power grab since those arrests, and we discuss what else it might take to shut down many of these wide-reaching ransomware groups. Threat actors: They get into the same petty arguments we all do in...]]></itunes:summary>
    <description><![CDATA[<div>In the latest entry in the “Days of our Ransomware” series, Azim Khodjibaev joins Jon to talk about some recent ransomware drama. Dark web forums have been going nuts since <a href='https://www.cbsnews.com/news/ransomware-russia-arrests-revil/'>Russia arrested and charged several alleged members of the REvil ransomware gang</a> in January. Azim discusses how there’s been a power grab since those arrests, and we discuss what else it might take to shut down many of these wide-reaching ransomware groups. Threat actors: They get into the same petty arguments we all do in Slack.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>In the latest entry in the “Days of our Ransomware” series, Azim Khodjibaev joins Jon to talk about some recent ransomware drama. Dark web forums have been going nuts since <a href='https://www.cbsnews.com/news/ransomware-russia-arrests-revil/'>Russia arrested and charged several alleged members of the REvil ransomware gang</a> in January. Azim discusses how there’s been a power grab since those arrests, and we discuss what else it might take to shut down many of these wide-reaching ransomware groups. Threat actors: They get into the same petty arguments we all do in Slack.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Azim Khodjibaev (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127875-talos-takes-ep-86-the-fallout-from-the-recent-revil-arrests.mp3" length="6556124" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/596</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>536</itunes:duration>
    <itunes:keywords>ransomware, APTs, RaaS, state-sponsored actors</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #85: ICS as it relates to the current situation in Ukraine</itunes:title>
    <title>Talos Takes Ep. #85: ICS as it relates to the current situation in Ukraine</title>
    <itunes:summary><![CDATA[As the Ukraine situation evolves, we figured it was an important time to check in with the specific threats government agencies across the globe have started to warn us about. Joe Marshall, Talos’ resident industrial control systems expert, joins this week’s episode of Talos Takes to talk about potential threats to Ukraine’s power grid should kinetic warfare break out in the area. We also touch on what potential threats America’s infrastructure faces if our government leaders were to oppose a...]]></itunes:summary>
    <description><![CDATA[<div>As the Ukraine situation evolves, we figured it was an important time to check in with the specific threats government agencies across the globe have started to warn us about. Joe Marshall, Talos’ resident industrial control systems expert, joins this week’s episode of Talos Takes to talk about potential threats to Ukraine’s power grid should kinetic warfare break out in the area. We also touch on what potential threats America’s infrastructure faces if our government leaders were to oppose any Russian actions in the region. It’s admittedly a tangled web currently — but for the most current information on this, check out the <a href='https://blog.talosintelligence.com/2022/01/ukraine-campaign-delivers-defacement.html'>Talos blog on the topic</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>As the Ukraine situation evolves, we figured it was an important time to check in with the specific threats government agencies across the globe have started to warn us about. Joe Marshall, Talos’ resident industrial control systems expert, joins this week’s episode of Talos Takes to talk about potential threats to Ukraine’s power grid should kinetic warfare break out in the area. We also touch on what potential threats America’s infrastructure faces if our government leaders were to oppose any Russian actions in the region. It’s admittedly a tangled web currently — but for the most current information on this, check out the <a href='https://blog.talosintelligence.com/2022/01/ukraine-campaign-delivers-defacement.html'>Talos blog on the topic</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Joe Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127874-talos-takes-ep-85-ics-as-it-relates-to-the-current-situation-in-ukraine.mp3" length="7652619" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/562</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>627</itunes:duration>
    <itunes:keywords>Ukraine, ICS, infrastructure, cyberwarfare</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #84: Commodity RATs 101</itunes:title>
    <title>Talos Takes Ep. #84: Commodity RATs 101</title>
    <itunes:summary><![CDATA[What’s a commodity RAT? And how does that make it different from your run-of-the-mill RAT? Is that RAT different than a trojan? In this week’s Talos Takes episode, we answer these questions and more to provide you a quick overview of remote access trojans/tools (aka RATs) and how commodity RATS specifically differ from their “normal” brethren. Asheer Malhotra from our Outreach team has been looking at several commodity RATs for months now and is here to take you to class for 10 minutes.]]></itunes:summary>
    <description><![CDATA[<div>What’s a commodity RAT? And how does that make it different from your run-of-the-mill RAT? Is that RAT different than a trojan? In this week’s Talos Takes episode, we answer these questions and more to provide you a quick overview of remote access trojans/tools (aka RATs) and how commodity RATS specifically differ from their “normal” brethren. Asheer Malhotra from our Outreach team has been looking at several commodity RATs for months now and is here to take you to class for 10 minutes.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>What’s a commodity RAT? And how does that make it different from your run-of-the-mill RAT? Is that RAT different than a trojan? In this week’s Talos Takes episode, we answer these questions and more to provide you a quick overview of remote access trojans/tools (aka RATs) and how commodity RATS specifically differ from their “normal” brethren. Asheer Malhotra from our Outreach team has been looking at several commodity RATs for months now and is here to take you to class for 10 minutes.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127873-talos-takes-ep-84-commodity-rats-101.mp3" length="6891120" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/561</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>564</itunes:duration>
    <itunes:keywords>RATs, trojans, malware, cybersecurity basics</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #83: The latest on the cybersecurity situation in Ukraine</itunes:title>
    <title>Talos Takes Ep. #83: The latest on the cybersecurity situation in Ukraine</title>
    <itunes:summary><![CDATA[Jon Munshaw and Nick Biasini sit down for a few minutes to discuss the latest on the ongoing cyber attacks and security concerns in Ukraine. They discuss how a recent set of attacks against government-run websites compares to past attacks like NotPetya, and provide guidance for any companies who may be based in, or do business in, Ukraine. For more of Talos’ insight on this, please continue to check back on our blog post here.]]></itunes:summary>
    <description><![CDATA[<div>Jon Munshaw and Nick Biasini sit down for a few minutes to discuss the latest on the ongoing cyber attacks and security concerns in Ukraine. They discuss how a recent set of attacks against government-run websites compares to past attacks like NotPetya, and provide guidance for any companies who may be based in, or do business in, Ukraine. For more of Talos’ insight on this, please continue to check back on our blog post <a href='https://blog.talosintelligence.com/2022/01/ukraine-campaign-delivers-defacement.html'>here</a>.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Jon Munshaw and Nick Biasini sit down for a few minutes to discuss the latest on the ongoing cyber attacks and security concerns in Ukraine. They discuss how a recent set of attacks against government-run websites compares to past attacks like NotPetya, and provide guidance for any companies who may be based in, or do business in, Ukraine. For more of Talos’ insight on this, please continue to check back on our blog post <a href='https://blog.talosintelligence.com/2022/01/ukraine-campaign-delivers-defacement.html'>here</a>.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127872-talos-takes-ep-83-the-latest-on-the-cybersecurity-situation-in-ukraine.mp3" length="4533557" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/560</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>367</itunes:duration>
    <itunes:keywords>NotPetya, Ukraine, Russia, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #82: Log4j followed us into 2022</itunes:title>
    <title>Talos Takes Ep. #82: Log4j followed us into 2022</title>
    <itunes:summary><![CDATA[We thought it was usually all about “New year, new me,” heading into 2022, but turns out it’s the same cybersecurity problems. Join host Jon Munshaw as he welcomes on threat researcher JJ Cummings to discuss how the Log4j vulnerability event evolved over the holiday break. JJ, who you may recognized from our recent live Beers with Talos episode, discusses the new CVE that popped up the week after Christmas, and then discusses what things he and his team will be looking into regarding Log4shel...]]></itunes:summary>
    <description><![CDATA[<div>We thought it was usually all about “New year, new me,” heading into 2022, but turns out it’s the same cybersecurity problems. Join host Jon Munshaw as he welcomes on threat researcher JJ Cummings to discuss how the Log4j vulnerability event evolved over the holiday break. JJ, who you may recognized from our recent live Beers with Talos episode, discusses the new CVE that popped up the week after Christmas, and then discusses what things he and his team will be looking into regarding Log4shell in 2022.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We thought it was usually all about “New year, new me,” heading into 2022, but turns out it’s the same cybersecurity problems. Join host Jon Munshaw as he welcomes on threat researcher JJ Cummings to discuss how the Log4j vulnerability event evolved over the holiday break. JJ, who you may recognized from our recent live Beers with Talos episode, discusses the new CVE that popped up the week after Christmas, and then discusses what things he and his team will be looking into regarding Log4shell in 2022.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and JJ Cummings (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127871-talos-takes-ep-82-log4j-followed-us-into-2022.mp3" length="6667114" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/558</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>545</itunes:duration>
    <itunes:keywords>Log4j, vulnerabilities, Log4shell</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #81 (XL Edition): Log4J roundtable</itunes:title>
    <title>Talos Takes Ep. #81 (XL Edition): Log4J roundtable</title>
    <itunes:summary><![CDATA[This is a special XL edition of Talos Takes that is a replay of a live stream our amazing researchers put on earlier this week. You’ll hear Matt Olney, Amy Henderson and Vitor Ventura, all from Talos, talk about the Log4J vulnerability that is ruining the internet for everyone right now. They discussed the latest news around the vulnerability, provided advice to users who may be affected (i.e., pretty much everyone) and looked at where we go from here. If you’d like to hear more from us, you ...]]></itunes:summary>
    <description><![CDATA[<div>This is a special XL edition of Talos Takes that is a replay of a live stream our amazing researchers put on earlier this week. You’ll hear Matt Olney, Amy Henderson and Vitor Ventura, all from Talos, talk about the <a href='https://blog.talosintelligence.com/2021/12/apache-log4j-rce-vulnerability.html'>Log4J vulnerability that is ruining the internet for everyone right now</a>. They discussed the latest news around the vulnerability, provided advice to users who may be affected (i.e., pretty much everyone) and looked at where we go from here. If you’d like to hear more from us, you can join us LIVE on all of our social media platforms at noon ET on Friday, Dec. 17 for a special episode of Beers with Talos, where we’ll have more updates on Log4J.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>This is a special XL edition of Talos Takes that is a replay of a live stream our amazing researchers put on earlier this week. You’ll hear Matt Olney, Amy Henderson and Vitor Ventura, all from Talos, talk about the <a href='https://blog.talosintelligence.com/2021/12/apache-log4j-rce-vulnerability.html'>Log4J vulnerability that is ruining the internet for everyone right now</a>. They discussed the latest news around the vulnerability, provided advice to users who may be affected (i.e., pretty much everyone) and looked at where we go from here. If you’d like to hear more from us, you can join us LIVE on all of our social media platforms at noon ET on Friday, Dec. 17 for a special episode of Beers with Talos, where we’ll have more updates on Log4J.<br/><br/></div>]]></content:encoded>
    <itunes:author>Matt Olney (speaker), Amy Henderson (speaker), Jon Munshaw (host), and Vitor Ventura (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127870-talos-takes-ep-81-xl-edition-log4j-roundtable.mp3" length="23833252" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/552</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>1976</itunes:duration>
    <itunes:keywords>Log4J, vulnerabilities, patching, malware, threats</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #80: I&#39;ll have a blue Christmas without a CTIR retainer</itunes:title>
    <title>Talos Takes Ep. #80: I&#39;ll have a blue Christmas without a CTIR retainer</title>
    <itunes:summary><![CDATA[We had to give Brad a few minutes to take an Incident Response victory lap after his team received two major accolades over the past two weeks. But aside from that, it’s also a perfect time to have him on ahead of the holidays. The shopping season is always a favorite time for attackers, so it’s as good a time as any to make sure your incident response plan is polished and practiced. We also take some time to look back on what Incident Response lessons Brad learned in 2021.]]></itunes:summary>
    <description><![CDATA[<div>We had to give Brad a few minutes to take an Incident Response victory lap after his team received <a href='https://blog.talosintelligence.com/2021/11/cisco-talos-named-leader-in-incident.html'>two major</a> <a href='https://blog.talosintelligence.com/2021/12/cisco-recognized-by-forrester-as.html'>accolades</a> over the past two weeks. But aside from that, it’s also a perfect time to have him on ahead of the holidays. The shopping season is always a favorite time for attackers, so it’s as good a time as any to make sure your incident response plan is polished and practiced. We also take some time to look back on what Incident Response lessons Brad learned in 2021.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We had to give Brad a few minutes to take an Incident Response victory lap after his team received <a href='https://blog.talosintelligence.com/2021/11/cisco-talos-named-leader-in-incident.html'>two major</a> <a href='https://blog.talosintelligence.com/2021/12/cisco-recognized-by-forrester-as.html'>accolades</a> over the past two weeks. But aside from that, it’s also a perfect time to have him on ahead of the holidays. The shopping season is always a favorite time for attackers, so it’s as good a time as any to make sure your incident response plan is polished and practiced. We also take some time to look back on what Incident Response lessons Brad learned in 2021.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Brad Garnett (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127869-talos-takes-ep-80-i-ll-have-a-blue-christmas-without-a-ctir-retainer.mp3" length="6597533" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/548</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>540</itunes:duration>
    <itunes:keywords>incident response, spam, scams, holiday shopping, news</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #79: Could Emotet be back?</itunes:title>
    <title>Talos Takes Ep. #79: Could Emotet be back?</title>
    <itunes:summary><![CDATA[Emotet was about a month late for Halloween, because it’s got its zombie costume on. The long-known botnet is showing some signs of life in late 2021 after an international law enforcement takedown earlier this year. Nick Biasini joins Talos Takes this week to discuss what signs we’re seeing to indicate Emotet’s return, and provides some advice as to what we should look out for as we head into 2022.]]></itunes:summary>
    <description><![CDATA[<div>Emotet was about a month late for Halloween, because it’s got its zombie costume on. The long-known botnet is showing <a href='https://blog.talosintelligence.com/2021/11/emotet-back-from-the-dead.html'>some signs of life in late 2021</a> after an international law enforcement takedown earlier this year. Nick Biasini joins Talos Takes this week to discuss what signs we’re seeing to indicate Emotet’s return, and provides some advice as to what we should look out for as we head into 2022.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Emotet was about a month late for Halloween, because it’s got its zombie costume on. The long-known botnet is showing <a href='https://blog.talosintelligence.com/2021/11/emotet-back-from-the-dead.html'>some signs of life in late 2021</a> after an international law enforcement takedown earlier this year. Nick Biasini joins Talos Takes this week to discuss what signs we’re seeing to indicate Emotet’s return, and provides some advice as to what we should look out for as we head into 2022.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127868-talos-takes-ep-79-could-emotet-be-back.mp3" length="3781614" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/515</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>305</itunes:duration>
    <itunes:keywords>Emotet, botnet, spam, email </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #78: Attackers know you are still looking for a PS5 this holiday season</itunes:title>
    <title>Talos Takes Ep. #78: Attackers know you are still looking for a PS5 this holiday season</title>
    <itunes:summary><![CDATA[We know, we know. We do one of these every year. But people still falling for scams, so we still have to keep reminding people how to shop safely online! This year is a bit different than past Black Fridays and Cyber Mondays because of the issues around the supply chain. Attackers are sure to try to convince you that the big gift you want this year won’t arrive on time so you have to “ACT NOW!” Plus, there’s the continued frenzy to find PlayStation 5s and XBOX Series X/S’s. Jon and Nick talk ...]]></itunes:summary>
    <description><![CDATA[<div>We know, we know. We do one of these every year. But people still falling for scams, so we still have to keep reminding people how to shop safely online! This year is a bit different than past Black Fridays and Cyber Mondays because of the issues around the supply chain. Attackers are sure to try to convince you that the big gift you want this year won’t arrive on time so you have to “ACT NOW!” Plus, there’s the continued frenzy to find PlayStation 5s and XBOX Series X/S’s. Jon and Nick talk about scams you’re likely to see while shopping online over the long weekend and provide some helpful tips that anyone can use.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We know, we know. We do one of these every year. But people still falling for scams, so we still have to keep reminding people how to shop safely online! This year is a bit different than past Black Fridays and Cyber Mondays because of the issues around the supply chain. Attackers are sure to try to convince you that the big gift you want this year won’t arrive on time so you have to “ACT NOW!” Plus, there’s the continued frenzy to find PlayStation 5s and XBOX Series X/S’s. Jon and Nick talk about scams you’re likely to see while shopping online over the long weekend and provide some helpful tips that anyone can use.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127867-talos-takes-ep-78-attackers-know-you-are-still-looking-for-a-ps5-this-holiday-season.mp3" length="3918302" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/514</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>316</itunes:duration>
    <itunes:keywords>Black Friday, Cyber Monday, shopping, e-commerce, scams, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #72: Emergency Apache HTTP Server episode</itunes:title>
    <title>Talos Takes Ep. #72: Emergency Apache HTTP Server episode</title>
    <itunes:summary><![CDATA[Sorry for dropping two episodes in the feed in one day, but we also needed to find time to talk about the critical zero-day vulnerability in Apache HTTP Server. An attacker could exploit this vulnerability to perform path traversal and eventually remote code execution. Patch for this one as soon as possible, and use the Snort rule we have available now.]]></itunes:summary>
    <description><![CDATA[<div>Sorry for dropping two episodes in the feed in one day, but we also needed to find time to talk about the critical zero-day vulnerability in Apache HTTP Server. An attacker could exploit this vulnerability to perform path traversal and eventually remote code execution. Patch for this one as soon as possible, and use the Snort rule we have available now.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Sorry for dropping two episodes in the feed in one day, but we also needed to find time to talk about the critical zero-day vulnerability in Apache HTTP Server. An attacker could exploit this vulnerability to perform path traversal and eventually remote code execution. Patch for this one as soon as possible, and use the Snort rule we have available now.<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127866-talos-takes-ep-72-emergency-apache-http-server-episode.mp3" length="3785742" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/505</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>305</itunes:duration>
    <itunes:keywords>Apache, patching, vulnerabilities, </itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #77: How to safely connect to (and use) public WiFi</itunes:title>
    <title>Talos Takes Ep. #77: How to safely connect to (and use) public WiFi</title>
    <itunes:summary><![CDATA[For the first time in Talos Takes’ history, we have a formal crossover with Beers with Talos. Mitch Neff, the host of BWT, joins the show to talk about his horror stories using public WiFi networks. He and Jon discuss the safest ways to interact with large, public network in places like libraries, parks and airports, and potential alternatives to public hotspots.]]></itunes:summary>
    <description><![CDATA[<div>For the first time in Talos Takes’ history, we have a formal crossover with Beers with Talos. Mitch Neff, the host of BWT, joins the show to talk about his horror stories using public WiFi networks. He and Jon discuss the safest ways to interact with large, public network in places like libraries, parks and airports, and potential alternatives to public hotspots.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>For the first time in Talos Takes’ history, we have a formal crossover with Beers with Talos. Mitch Neff, the host of BWT, joins the show to talk about his horror stories using public WiFi networks. He and Jon discuss the safest ways to interact with large, public network in places like libraries, parks and airports, and potential alternatives to public hotspots.<br/><br/></div>]]></content:encoded>
    <itunes:author>Mitch Neff (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127865-talos-takes-ep-77-how-to-safely-connect-to-and-use-public-wifi.mp3" length="6356948" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/511</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>520</itunes:duration>
    <itunes:keywords>WiFi, cybersecurity, tips, cybersecurity basics</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #76: What type of secrets could Kimsuky be after?</itunes:title>
    <title>Talos Takes Ep. #76: What type of secrets could Kimsuky be after?</title>
    <itunes:summary><![CDATA[Jon took a break from listening to “Red (Taylor’s Version)” to turn this podcast around quickly to align with our recent research on the Kimsuky APT. This North Korean state-sponsored actor is in the wild again targeting South Korean organizations that house potentially sensitive information. The group set up fake Blogger sites to lure in the victims to read about news related to nuclear disarmament and relations on the Korean peninsula, but instead were hit with infostealing malware. Assheer...]]></itunes:summary>
    <description><![CDATA[<div>Jon took a break from listening to “Red (Taylor’s Version)” to turn this podcast around quickly to align with our recent research on the Kimsuky APT. This North Korean state-sponsored actor is in the wild again targeting South Korean organizations that house potentially sensitive information. The group set up fake Blogger sites to lure in the victims to read about news related to nuclear disarmament and relations on the Korean peninsula, but instead were hit with infostealing malware. Assheer Malhotra, who <a href='https://blog.talosintelligence.com/2021/11/kimsuky-abuses-blogs-delivers-malware.html'>helped research and write our latest blog</a>, joins the show to discuss this group’s motivations, what information they may have been looking for, and how Talos helped put a stop to their actions.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Jon took a break from listening to “Red (Taylor’s Version)” to turn this podcast around quickly to align with our recent research on the Kimsuky APT. This North Korean state-sponsored actor is in the wild again targeting South Korean organizations that house potentially sensitive information. The group set up fake Blogger sites to lure in the victims to read about news related to nuclear disarmament and relations on the Korean peninsula, but instead were hit with infostealing malware. Assheer Malhotra, who <a href='https://blog.talosintelligence.com/2021/11/kimsuky-abuses-blogs-delivers-malware.html'>helped research and write our latest blog</a>, joins the show to discuss this group’s motivations, what information they may have been looking for, and how Talos helped put a stop to their actions.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127864-talos-takes-ep-76-what-type-of-secrets-could-kimsuky-be-after.mp3" length="6071309" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/510</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>496</itunes:duration>
    <itunes:keywords>Kimsuky, malware, APTs, state-sponsored, spam</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #75 (XL Edition): Building the perfect Incident Response Plan</itunes:title>
    <title>Talos Takes Ep. #75 (XL Edition): Building the perfect Incident Response Plan</title>
    <itunes:summary><![CDATA[We have another special extra large-sized version of Talos Takes this week. Enjoy this recording of a live stream we hosted earlier this week with Martin Lee from our Talos Communications team and Paul Lee from Cisco Talos Incident Response. The Lees discuss how to build the perfect Incident Response Plan. First, Martin walks through the basics of creating, editing and iterating on an IR plan. Then, he’s joined by Paul to ask him a few questions, take some Q&amp;A from the audience and learn ...]]></itunes:summary>
    <description><![CDATA[<div>We have another special extra large-sized version of Talos Takes this week. Enjoy this recording of a live stream we hosted earlier this week with Martin Lee from our Talos Communications team and Paul Lee from Cisco Talos Incident Response. The Lees discuss how to build the perfect Incident Response Plan. First, Martin walks through the basics of creating, editing and iterating on an IR plan. Then, he’s joined by Paul to ask him a few questions, take some Q&amp;A from the audience and learn about Paul’s experience from the field.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We have another special extra large-sized version of Talos Takes this week. Enjoy this recording of a live stream we hosted earlier this week with Martin Lee from our Talos Communications team and Paul Lee from Cisco Talos Incident Response. The Lees discuss how to build the perfect Incident Response Plan. First, Martin walks through the basics of creating, editing and iterating on an IR plan. Then, he’s joined by Paul to ask him a few questions, take some Q&amp;A from the audience and learn about Paul’s experience from the field.<br/><br/></div>]]></content:encoded>
    <itunes:author>Mitch Neff (host) and Martin Lee (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127863-talos-takes-ep-75-xl-edition-building-the-perfect-incident-response-plan.mp3" length="35526609" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/509</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>2951</itunes:duration>
    <itunes:keywords>incident response, IR, incident response plan, CTIR</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #74 (NCSAM Edition AND XL Edition): Q&amp;A session with Talos Incident Response</itunes:title>
    <title>Talos Takes Ep. #74 (NCSAM Edition AND XL Edition): Q&amp;A session with Talos Incident Response</title>
    <itunes:summary><![CDATA[This is a double special Talos Takes episode — it’s XL-sized and continues our Cybersecurity Awareness Month theme. This is a recording of our live stream from earlier this week with Brad Garnett, the general manager of Talos Incident Response. Even if you’ve never worked with an incident response team before, or have no idea what IR is, this is a perfect place to start. We provide the tl;dr of the IR process, talk building an IR plan and answer audience questions.]]></itunes:summary>
    <description><![CDATA[<div>This is a double special Talos Takes episode — it’s XL-sized and continues our Cybersecurity Awareness Month theme. This is a recording of our live stream from earlier this week with Brad Garnett, the general manager of Talos Incident Response. Even if you’ve never worked with an incident response team before, or have no idea what IR is, this is a perfect place to start. We provide the tl;dr of the IR process, talk building an IR plan and answer audience questions.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>This is a double special Talos Takes episode — it’s XL-sized and continues our Cybersecurity Awareness Month theme. This is a recording of our live stream from earlier this week with Brad Garnett, the general manager of Talos Incident Response. Even if you’ve never worked with an incident response team before, or have no idea what IR is, this is a perfect place to start. We provide the tl;dr of the IR process, talk building an IR plan and answer audience questions.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Brad Garnett (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127862-talos-takes-ep-74-ncsam-edition-and-xl-edition-q-a-session-with-talos-incident-response.mp3" length="32078795" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/508</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>2663</itunes:duration>
    <itunes:keywords>incident response, CTIR, IR, ransomware, hybrid work</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #73 (NCSAM edition): Fight back against the phish</itunes:title>
    <title>Talos Takes Ep. #73 (NCSAM edition): Fight back against the phish</title>
    <itunes:summary><![CDATA[We continue our special series for National Cybersecurity Awareness Month by addressing everyone’s worst nightmare: phish. Who among us hasn’t gotten the call, “We’re trying to reach out about your car’s extended warranty?” In this Talos Takes, Jaeson Schultz, Talos’ foremost spam and phish expert, breaks down spam emails, phone calls and messages for any user. We discuss new trends we’re seeing from attackers in 2021, talk about the best software solutions available and give advice to Jon’s ...]]></itunes:summary>
    <description><![CDATA[<div>We continue our special series for National Cybersecurity Awareness Month by addressing everyone’s worst nightmare: phish. Who among us hasn’t gotten the call, “We’re trying to reach out about your car’s extended warranty?” In this Talos Takes, Jaeson Schultz, Talos’ foremost spam and phish expert, breaks down spam emails, phone calls and messages for any user. We discuss new trends we’re seeing from attackers in 2021, talk about the best software solutions available and give advice to Jon’s 77-year-old grandmother.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>We continue our special series for National Cybersecurity Awareness Month by addressing everyone’s worst nightmare: phish. Who among us hasn’t gotten the call, “We’re trying to reach out about your car’s extended warranty?” In this Talos Takes, Jaeson Schultz, Talos’ foremost spam and phish expert, breaks down spam emails, phone calls and messages for any user. We discuss new trends we’re seeing from attackers in 2021, talk about the best software solutions available and give advice to Jon’s 77-year-old grandmother.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Jaeson Schultz (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127861-talos-takes-ep-73-ncsam-edition-fight-back-against-the-phish.mp3" length="7745821" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/506</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>635</itunes:duration>
    <itunes:keywords>spam, phishing, spear-phishing, email</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #71 (NCSAM Edition): 2021 in ransomware</itunes:title>
    <title>Talos Takes Ep. #71 (NCSAM Edition): 2021 in ransomware</title>
    <itunes:summary><![CDATA[We are from the first (or last) people to say this, but 2021 is the year of ransomware. It’s by far the biggest story on the security landscape right now. And everything from oil pipelines, to grain co-ops, to hospitals and schools have been targeted by ransomware this year. Azim Khodjibaev joins the show for National Cybersecurity Awareness Month to wrap up everything we’ve seen on the ransomware landscape this year. Azim reflects on his interview with a LockBit operator, the research he’s d...]]></itunes:summary>
    <description><![CDATA[<p>We are from the first (or last) people to say this, but 2021 is the year of ransomware. It’s by far the biggest story on the security landscape right now. And everything from oil pipelines, to grain co-ops, to hospitals and schools have been targeted by ransomware this year. Azim Khodjibaev joins the show for National Cybersecurity Awareness Month to wrap up everything we’ve seen on the ransomware landscape this year. Azim reflects on his <a href='https://blog.talosintelligence.com/2021/02/interview-with-lockbit-ransomware.html'>interview with a LockBit operator</a>, the research he’s done into <a href='https://blog.talosintelligence.com/2021/08/vice-society-ransomware-printnightmare.html'>“double extortion campaigns,”</a> and discusses the lessons defenders can learn from the past 10 months.</p>]]></description>
    <content:encoded><![CDATA[<p>We are from the first (or last) people to say this, but 2021 is the year of ransomware. It’s by far the biggest story on the security landscape right now. And everything from oil pipelines, to grain co-ops, to hospitals and schools have been targeted by ransomware this year. Azim Khodjibaev joins the show for National Cybersecurity Awareness Month to wrap up everything we’ve seen on the ransomware landscape this year. Azim reflects on his <a href='https://blog.talosintelligence.com/2021/02/interview-with-lockbit-ransomware.html'>interview with a LockBit operator</a>, the research he’s done into <a href='https://blog.talosintelligence.com/2021/08/vice-society-ransomware-printnightmare.html'>“double extortion campaigns,”</a> and discusses the lessons defenders can learn from the past 10 months.</p>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Azim Khodjibaev (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127860-talos-takes-ep-71-ncsam-edition-2021-in-ransomware.mp3" length="5128117" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/504</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>417</itunes:duration>
    <itunes:keywords>ransomware, cybersecurity, extortion, ransom, cyber attacks</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #70 (NCSAM edition): For once, a positive spin on hybrid work</itunes:title>
    <title>Talos Takes Ep. #70 (NCSAM edition): For once, a positive spin on hybrid work</title>
    <itunes:summary><![CDATA[Everyone loves to talk and write about how tough it is that we are all working remotely during the COVID-19 pandemic. So for once — to celebrate National Cybersecurity Awareness Month — Talos Takes wants to talk about the positives! Christopher Marshall, the head of Talos’ detection research team, joins the show to discuss how he’s kept his team’s morale up during this time. Cybersecurity is a rough industry to be in, regardless of any external factors. So it’s important for him to avoid empl...]]></itunes:summary>
    <description><![CDATA[<div>Everyone loves to talk and write about how tough it is that we are all working remotely during the COVID-19 pandemic. So for once — to celebrate National Cybersecurity Awareness Month — Talos Takes wants to talk about the positives! Christopher Marshall, the head of Talos’ detection research team, joins the show to discuss how he’s kept his team’s morale up during this time. Cybersecurity is a rough industry to be in, regardless of any external factors. So it’s important for him to avoid employee burnout and turnover. He and Jon also discuss the positives of working remotely, what they’re most looking forward to when they can go back into the office and their favorite pandemic-era hobbies.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Everyone loves to talk and write about how tough it is that we are all working remotely during the COVID-19 pandemic. So for once — to celebrate National Cybersecurity Awareness Month — Talos Takes wants to talk about the positives! Christopher Marshall, the head of Talos’ detection research team, joins the show to discuss how he’s kept his team’s morale up during this time. Cybersecurity is a rough industry to be in, regardless of any external factors. So it’s important for him to avoid employee burnout and turnover. He and Jon also discuss the positives of working remotely, what they’re most looking forward to when they can go back into the office and their favorite pandemic-era hobbies.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Christopher Marshall (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127859-talos-takes-ep-70-ncsam-edition-for-once-a-positive-spin-on-hybrid-work.mp3" length="6858659" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/503</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>562</itunes:duration>
    <itunes:keywords>work from home, COVID, burnout, hiring, security</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #69: Our armadillo in shining armor</itunes:title>
    <title>Talos Takes Ep. #69: Our armadillo in shining armor</title>
    <itunes:summary><![CDATA[Asheer Malhotra joins the show to once again cover a cyber attack in South Asia. This time, it’s an attacker that looks and smells like an APT, but may just be a run-of-the-mill crimeware gang. Asheer discusses he and his colleagues’ research into Operation: Armor Piercer, a campaign targeted at government agencies and military contractors. Needless to say, these are high-profile targets. Find out what this group wants and why they’re aping so much from other groups like Transparent Tribe and...]]></itunes:summary>
    <description><![CDATA[<div>Asheer Malhotra joins the show to once again cover a cyber attack in South Asia. This time, it’s an attacker that looks and smells like an APT, but may just be a run-of-the-mill crimeware gang. Asheer discusses he and his colleagues’ research into <a href='https://blog.talosintelligence.com/2021/09/operation-armor-piercer.html'>Operation: Armor Piercer</a>, a campaign targeted at government agencies and military contractors. Needless to say, these are high-profile targets. Find out what this group wants and why they’re aping so much from other groups like Transparent Tribe and SideCopy.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Asheer Malhotra joins the show to once again cover a cyber attack in South Asia. This time, it’s an attacker that looks and smells like an APT, but may just be a run-of-the-mill crimeware gang. Asheer discusses he and his colleagues’ research into <a href='https://blog.talosintelligence.com/2021/09/operation-armor-piercer.html'>Operation: Armor Piercer</a>, a campaign targeted at government agencies and military contractors. Needless to say, these are high-profile targets. Find out what this group wants and why they’re aping so much from other groups like Transparent Tribe and SideCopy.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127858-talos-takes-ep-69-our-armadillo-in-shining-armor.mp3" length="7312638" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/502</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>600</itunes:duration>
    <itunes:keywords>RATs, malware, APTs, spam, MFA</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #68: It&#39;s a bird, it&#39;s a plane, it&#39;s some rats!</itunes:title>
    <title>Talos Takes Ep. #68: It&#39;s a bird, it&#39;s a plane, it&#39;s some rats!</title>
    <itunes:summary><![CDATA[Allow Vitor Ventura to take you on a journey of discovery, threat actors and attribution. He recently assisted with an investigation into a series of malware and spam campaigns using aviation-themed lures. These include fake flight itineraries, invoices and more. Vitor joins us on this week’s Talos Takes episode to discuss what he learned during this process, including how he connected the campaigns, what he learned (and couldn’t learn) about the actor behind them, and what he’ll take away in...]]></itunes:summary>
    <description><![CDATA[<div>Allow Vitor Ventura to take you on a journey of discovery, threat actors and attribution. He recently <a href='https://blog.talosintelligence.com/2021/09/operation-layover-how-we-tracked-attack.html'>assisted with an investigation into a series of malware and spam campaigns</a> using aviation-themed lures. These include fake flight itineraries, invoices and more. Vitor joins us on this week’s Talos Takes episode to discuss what he learned during this process, including how he connected the campaigns, what he learned (and couldn’t learn) about the actor behind them, and what he’ll take away into his next research. This is a great episode for anyone who is wondering about what kinds of pitfalls are out there for a security researcher.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Allow Vitor Ventura to take you on a journey of discovery, threat actors and attribution. He recently <a href='https://blog.talosintelligence.com/2021/09/operation-layover-how-we-tracked-attack.html'>assisted with an investigation into a series of malware and spam campaigns</a> using aviation-themed lures. These include fake flight itineraries, invoices and more. Vitor joins us on this week’s Talos Takes episode to discuss what he learned during this process, including how he connected the campaigns, what he learned (and couldn’t learn) about the actor behind them, and what he’ll take away into his next research. This is a great episode for anyone who is wondering about what kinds of pitfalls are out there for a security researcher.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Vitor Ventura (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127857-talos-takes-ep-68-it-s-a-bird-it-s-a-plane-it-s-some-rats.mp3" length="4636707" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/501</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>377</itunes:duration>
    <itunes:keywords>malware, spam, email</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #67: Why are ransomware groups getting so emotional?</itunes:title>
    <title>Talos Takes Ep. #67: Why are ransomware groups getting so emotional?</title>
    <itunes:summary><![CDATA[Fresh off of translating an entire ransomware playbook from Russian to English, Azim and Dave from the Talos Threat Intelligence &amp; Interdiction team join Talos Takes to talk about this project. They provide some first-hand insights into what this leaked playbook tells us about the Conti ransomware-as-a-service group. Threat actors — they have feelings just like us!]]></itunes:summary>
    <description><![CDATA[<div>Fresh off of translating an <a href='https://talosintelligence.com/resources/269'>entire ransomware playbook</a> from Russian to English, Azim and Dave from the Talos Threat Intelligence &amp; Interdiction team join Talos Takes to talk about this project. They provide some <a href='https://blog.talosintelligence.com/2021/09/Conti-leak-translation.html'>first-hand insights</a> into what this leaked playbook tells us about the Conti ransomware-as-a-service group. Threat actors — they have feelings just like us!<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Fresh off of translating an <a href='https://talosintelligence.com/resources/269'>entire ransomware playbook</a> from Russian to English, Azim and Dave from the Talos Threat Intelligence &amp; Interdiction team join Talos Takes to talk about this project. They provide some <a href='https://blog.talosintelligence.com/2021/09/Conti-leak-translation.html'>first-hand insights</a> into what this leaked playbook tells us about the Conti ransomware-as-a-service group. Threat actors — they have feelings just like us!<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host), Azim Khodjibaev (speaker), and David Liebenberg (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127856-talos-takes-ep-67-why-are-ransomware-groups-getting-so-emotional.mp3" length="6112592" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/500</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>500</itunes:duration>
    <itunes:keywords>Conti, ransomware, APTs</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #66: Dude, where&#39;s my bandwidth?</itunes:title>
    <title>Talos Takes Ep. #66: Dude, where&#39;s my bandwidth?</title>
    <itunes:summary><![CDATA[“Proxyware” sounds like a complicated topic that you’re too afraid to ask about. But really, it’s just software that allows users to sell off a portion of their internet bandwidth for a small profit. Problem is, attackers are swooping in on this popular software to spread malware and steal users’ money. Edmund Brumaghin joins the show this week to discuss his recent research into proxyware applications and how malware is hiding in plain sight. Edmund discusses why these types of apps are pote...]]></itunes:summary>
    <description><![CDATA[<div>“Proxyware” sounds like a complicated topic that you’re too afraid to ask about. But really, it’s just software that allows users to sell off a portion of their internet bandwidth for a small profit. Problem is, attackers are swooping in on this popular software to spread malware and steal users’ money. Edmund Brumaghin joins the show this week to discuss <a href='https://blog.talosintelligence.com/2021/08/proxyware-abuse.html'>his recent research</a> into proxyware applications and how malware is hiding in plain sight. Edmund discusses why these types of apps are potentially unwanted applications, and what the threat is for enterprise users with remote workers, as well as personal PC users.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>“Proxyware” sounds like a complicated topic that you’re too afraid to ask about. But really, it’s just software that allows users to sell off a portion of their internet bandwidth for a small profit. Problem is, attackers are swooping in on this popular software to spread malware and steal users’ money. Edmund Brumaghin joins the show this week to discuss <a href='https://blog.talosintelligence.com/2021/08/proxyware-abuse.html'>his recent research</a> into proxyware applications and how malware is hiding in plain sight. Edmund discusses why these types of apps are potentially unwanted applications, and what the threat is for enterprise users with remote workers, as well as personal PC users.<br/><br/></div>]]></content:encoded>
    <itunes:author>Edmund Brumaghin (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127855-talos-takes-ep-66-dude-where-s-my-bandwidth.mp3" length="5262328" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/499</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>429</itunes:duration>
    <itunes:keywords>proxyware, malware, spam, scams</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #65: We&#39;re all excited to travel again, but so are attackers</itunes:title>
    <title>Talos Takes Ep. #65: We&#39;re all excited to travel again, but so are attackers</title>
    <itunes:summary><![CDATA[As more people around the world start to get vaccinated against COVID-19, travel is becoming easier, especially during these summer months. But as much as you may be excited to travel, so are threat actors. Asheer Malhotra was part of a team that looked into a series of campaigns targeting users in Latin America, specifically using social engineering tactics centered around travel. Some of the lure documents, in this case, include fake travel itineraries, coupons for flights and hotel reserva...]]></itunes:summary>
    <description><![CDATA[<div>As more people around the world start to get vaccinated against COVID-19, travel is becoming easier, especially during these summer months. But as much as you may be excited to travel, so are threat actors. Asheer Malhotra was part of a team that looked into a <a href='https://blog.talosintelligence.com/2021/08/rat-campaign-targets-latin-america.html'>series of campaigns targeting users in Latin America</a>, specifically using social engineering tactics centered around travel. Some of the lure documents, in this case, include fake travel itineraries, coupons for flights and hotel reservation confirmations. Asheer joins the show this week to discuss the throughline between all these attacks and their potential connections to the Aggah crimeware group.<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>As more people around the world start to get vaccinated against COVID-19, travel is becoming easier, especially during these summer months. But as much as you may be excited to travel, so are threat actors. Asheer Malhotra was part of a team that looked into a <a href='https://blog.talosintelligence.com/2021/08/rat-campaign-targets-latin-america.html'>series of campaigns targeting users in Latin America</a>, specifically using social engineering tactics centered around travel. Some of the lure documents, in this case, include fake travel itineraries, coupons for flights and hotel reservation confirmations. Asheer joins the show this week to discuss the throughline between all these attacks and their potential connections to the Aggah crimeware group.<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Asheer Malhotra (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11127854-talos-takes-ep-65-we-re-all-excited-to-travel-again-but-so-are-attackers.mp3" length="5750904" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/465</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>470</itunes:duration>
    <itunes:keywords>Aggah, malspam, social engineering, COVID-19, spam, RATs</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #64: We go back to school</itunes:title>
    <title>Talos Takes Ep. #64: We go back to school</title>
    <itunes:summary><![CDATA[Students are starting to go back to school across the U.S. There are plenty of things to worry about with the “new normal” while the world still combats COVID-19, and while we can’t help students, teachers and admins with everything, we can at least provide a little security advice. Nick Biasini joins the show once again to discuss the best cybersecurity practices as schools spin back up. What should parents tell their kids about electronic devices they bring home? What will IT admins have le...]]></itunes:summary>
    <description><![CDATA[<div>Students are starting to go back to school across the U.S. There are plenty of things to worry about with the “new normal” while the world still combats COVID-19, and while we can’t help students, teachers and admins with everything, we can at least provide a little security advice. Nick Biasini joins the show once again to discuss the best cybersecurity practices as schools spin back up. What should parents tell their kids about electronic devices they bring home? What will IT admins have learned over the past year and a half plus? And how should we deal with the new norm of hybrid learning?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Students are starting to go back to school across the U.S. There are plenty of things to worry about with the “new normal” while the world still combats COVID-19, and while we can’t help students, teachers and admins with everything, we can at least provide a little security advice. Nick Biasini joins the show once again to discuss the best cybersecurity practices as schools spin back up. What should parents tell their kids about electronic devices they bring home? What will IT admins have learned over the past year and a half plus? And how should we deal with the new norm of hybrid learning?<br/><br/></div>]]></content:encoded>
    <itunes:author>Nick Biasini (speaker) and Jon Munshaw (host)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11082583-talos-takes-ep-64-we-go-back-to-school.mp3" length="6300790" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/464</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>515</itunes:duration>
    <itunes:keywords>school, remote learning, cheating, education, COVID-19, hybrid</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talos Takes Ep. #63: Shield your eyes from the Solarmarker</itunes:title>
    <title>Talos Takes Ep. #63: Shield your eyes from the Solarmarker</title>
    <itunes:summary><![CDATA[Andrew Windsor from our malware research team joins the show for the first time to talk about Solarmarker. This is a campaign Andrew’s followed for a while that recently added new modules that make it particularly dangerous. The attackers behind Solarmarker could basically use this threat to drop whatever they want. At least for now, they’re sticking to information-stealing. But could it ever get worse than that?]]></itunes:summary>
    <description><![CDATA[<div>Andrew Windsor from our malware research team joins the show for the first time to talk about <a href='https://talosintelligence.com/resources/261'>Solarmarker</a>. This is a campaign Andrew’s followed for a while that recently <a href='https://blog.talosintelligence.com/2021/07/threat-spotlight-solarmarker.html'>added new modules</a> that make it particularly dangerous. The attackers behind Solarmarker could basically use this threat to drop whatever they want. At least for now, they’re sticking to information-stealing. But could it ever get worse than that?<br/><br/></div>]]></description>
    <content:encoded><![CDATA[<div>Andrew Windsor from our malware research team joins the show for the first time to talk about <a href='https://talosintelligence.com/resources/261'>Solarmarker</a>. This is a campaign Andrew’s followed for a while that recently <a href='https://blog.talosintelligence.com/2021/07/threat-spotlight-solarmarker.html'>added new modules</a> that make it particularly dangerous. The attackers behind Solarmarker could basically use this threat to drop whatever they want. At least for now, they’re sticking to information-stealing. But could it ever get worse than that?<br/><br/></div>]]></content:encoded>
    <itunes:author>Jon Munshaw (host) and Andrew Windsor (speaker)</itunes:author>
    <enclosure url="https://www.buzzsprout.com/2018149/episodes/11082582-talos-takes-ep-63-shield-your-eyes-from-the-solarmarker.mp3" length="7594967" type="audio/mpeg" />
    <guid isPermaLink="false">https://www.talosintelligence.com/podcasts/463</guid>
    <pubDate>Fri, 12 Aug 2022 12:00:00 -0400</pubDate>
    <itunes:duration>623</itunes:duration>
    <itunes:keywords>malware, Solarmarker, dropper, Uranus, Mars</itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
