Talos Takes Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
- Breaking Down Chaos: Tactics and Origins of a New RaaS Operationby Cisco Talos on August 1, 2025 at 10:00 am
Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s likely connections to former BlackSuit operators. James also shares what defenders should be watching for and how to stay ahead of evolving ransomware tactics.Read the full research blog: https://blog.talosintelligence.com/new-chaos-ransomware
- Why Attackers Love Your Remote Access Toolsby Cisco Talos on July 17, 2025 at 9:00 am
Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these legitimate tools have become such an effective tactic for adversaries.Pierre explains how the flexibility, legitimacy, and built-in capabilities of remote access management tools make them ideal for attackers who want to stay under the radar. They discuss trends Talos Incident Response is seeing in the field, examples of commonly abused tools, and the challenges defenders face when trying to detect misuse.You’ll also hear practical advice on what defenders and IT teams can do today to better secure their environments — and what the rise of remote access management tool abuse tells us about attacker behavior and the current state of cybercrime.Resources mentioned:Talos Incident Response Quarterly Trends ReportWhen Legitimate Tools Go Rogue (Talos Blog)
- Teaching LLMs to spot malicious PowerShell scriptsby Cisco Talos on June 26, 2025 at 9:00 am
Hazel welcomes back Ryan Fetterman from the SURGe team to explore his new research on how large language models (LLMs) can assist those who work in security operations centers to identify malicious PowerShell scripts. From teaching LLMs through examples, to using retrieval-augmented generation and fine-tuning specialized models, Ryan walks us through three distinct approaches, with surprising performance gains. For the full research, head to https://www.splunk.com/en_us/blog/security/guiding-llms-with-security-context.html
- How cybercriminals are camouflaging threats as fake AI tool installersby Cisco Talos on June 5, 2025 at 9:00 am
Chetan Raghuprasad joins Hazel to discuss his threat hunting research into fake AI tool installers, which criminals are using to distribute ransomware, RATS, stealers and other destructive malware. He discusses the attack chain of three different campaigns, including one which even tries to justify its ransom as “humanitarian aid.”For the full research, read Chetan’s blog at https://blog.talosintelligence.com/fake-ai-tool-installers/
- Inside the attack chain: A new methodology for tracking compartmentalized threatsby Cisco Talos on May 22, 2025 at 6:00 am
Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they’re bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it comes to attribution and reporting. He then discusses several solutions which seek to evolve traditional threat modelling, and help provide clarity to defenders.More details can be found in this blog https://blog.talosintelligence.com/compartmentalized-threat-modeling/If you’re interested in our other blog on initial access groups, that can be found at https://blog.talosintelligence.com/redefining-initial-access-brokers/
- Follow the motive: Rethinking defense against Initial Access Groupsby Cisco Talos on May 15, 2025 at 9:00 am
In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distinguishing between different types of IABs. We talk about the need for a new taxonomy to categorize IABs into three types: financially motivated (FIA), state-sponsored (SIA), and opportunistic (OIA) initial access groups. This taxonomy aims to improve threat modeling and defense strategies by providing a clearer understanding of the motivations and behaviors of different IABs. For more details, check out the blog that Ashley co-authored with other Talos researchers https://blog.talosintelligence.com/redefining-initial-access-brokers/
- Year in Review special pt. 4: How AI is influencing the threat landscape?by Cisco Talos on May 1, 2025 at 9:00 am
A jam packed episode of guests means a slightly longer Talos Takes for your feed today! We welcome Amy Chang and Omar Santos from Cisco, Vitor Ventura from Talos, and Ryan Fetterman from Splunk. Together, we discuss how AI isn’t rewriting the cybercrime playbook, but it is turbo charging some of the old tricks, particularly on the social engineering side. We also touch on threat actor-built LLMs and where things may be headed. We then talk about how defensive strategies can leverage AI, particularly in the SOC, to increase visibility and make determinations a lot quicker. Resources mentioned in the episode:Talos’ 2024 Year in ReviewCisco’s State of AI Security reportDefending at machine speed, by Splunk
- Year in Review special part 3: Identity and MFA attacksby Cisco Talos on April 24, 2025 at 7:00 am
Steven Leung from Cisco Duo joins Hazel to discuss the prevalence of identity-based attacks, why they’re happening, and the various methods attackers are using to circumvent MFA (Multi-Factor Authentication), based on data in Talos’ 2024 Year in Review. Topics we touch on include phishing, push spray attacks, and Adversary-in-the Middle campaigns, and throughout the episode Steven provides best practice recommendations for implementing MFA at scale, without increasing user friction.For more resources, check out the Duo blog, and Talos’ 2024 Year in Review.
- Year in Review special part 2: The biggest ransomware trendsby Cisco Talos on April 17, 2025 at 9:00 am
Azim Khodjibaev and Lexi DiScola join Hazel to discuss some of the most prolific ransomware groups (and why LockBit may end this year very differently to how they ended 2024). They also discuss the dominant techniques of ransomware actors, where low-profile tactics led to high-impact consequences.For the full analysis, download Talos’ 2024 Year in Review at https://blog.talosintelligence.com/2024yearinreview/
- Year in Review special part 1: vulnerabilities, email threats, and adversary toolingby Cisco Talos on April 10, 2025 at 9:00 am
Talos researchers Martin Lee and Thorsten Rosendahl join Hazel for the first of our dedicated episodes on the top findings from Talos’ 2024 Year in Review. We discuss the vulnerabilities that attackers most targeted, how this compares with CISA’s list, and how to protect network devices. Given how email lures are evolving, we spend some time chatting about how the current world news cycle may play into adversary’s campaign cycles. And finally we touch on how to spot signs that your own sysadmin tools may be being used against you. For the full report, head to https://blog.talosintelligence.com/2024yearinreview/