Talos Takes Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
- Teaching LLMs to spot malicious PowerShell scriptsby Cisco Talos on June 26, 2025 at 9:00 am
Hazel welcomes back Ryan Fetterman from the SURGe team to explore his new research on how large language models (LLMs) can assist those who work in security operations centers to identify malicious PowerShell scripts. From teaching LLMs through examples, to using retrieval-augmented generation and fine-tuning specialized models, Ryan walks us through three distinct approaches, with surprising performance gains. For the full research, head to https://www.splunk.com/en_us/blog/security/guiding-llms-with-security-context.html
- How cybercriminals are camouflaging threats as fake AI tool installersby Cisco Talos on June 5, 2025 at 9:00 am
Chetan Raghuprasad joins Hazel to discuss his threat hunting research into fake AI tool installers, which criminals are using to distribute ransomware, RATS, stealers and other destructive malware. He discusses the attack chain of three different campaigns, including one which even tries to justify its ransom as “humanitarian aid.”For the full research, read Chetan’s blog at https://blog.talosintelligence.com/fake-ai-tool-installers/
- Inside the attack chain: A new methodology for tracking compartmentalized threatsby Cisco Talos on May 22, 2025 at 6:00 am
Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they’re bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it comes to attribution and reporting. He then discusses several solutions which seek to evolve traditional threat modelling, and help provide clarity to defenders.More details can be found in this blog https://blog.talosintelligence.com/compartmentalized-threat-modeling/If you’re interested in our other blog on initial access groups, that can be found at https://blog.talosintelligence.com/redefining-initial-access-brokers/
- Follow the motive: Rethinking defense against Initial Access Groupsby Cisco Talos on May 15, 2025 at 9:00 am
In this episode, Hazel welcomes Talos researcher Ashley Shen to discuss the evolution of initial access brokers (IABs) and the importance of distinguishing between different types of IABs. We talk about the need for a new taxonomy to categorize IABs into three types: financially motivated (FIA), state-sponsored (SIA), and opportunistic (OIA) initial access groups. This taxonomy aims to improve threat modeling and defense strategies by providing a clearer understanding of the motivations and behaviors of different IABs. For more details, check out the blog that Ashley co-authored with other Talos researchers https://blog.talosintelligence.com/redefining-initial-access-brokers/
- Year in Review special pt. 4: How AI is influencing the threat landscape?by Cisco Talos on May 1, 2025 at 9:00 am
A jam packed episode of guests means a slightly longer Talos Takes for your feed today! We welcome Amy Chang and Omar Santos from Cisco, Vitor Ventura from Talos, and Ryan Fetterman from Splunk. Together, we discuss how AI isn’t rewriting the cybercrime playbook, but it is turbo charging some of the old tricks, particularly on the social engineering side. We also touch on threat actor-built LLMs and where things may be headed. We then talk about how defensive strategies can leverage AI, particularly in the SOC, to increase visibility and make determinations a lot quicker. Resources mentioned in the episode:Talos’ 2024 Year in ReviewCisco’s State of AI Security reportDefending at machine speed, by Splunk
- Year in Review special part 3: Identity and MFA attacksby Cisco Talos on April 24, 2025 at 7:00 am
Steven Leung from Cisco Duo joins Hazel to discuss the prevalence of identity-based attacks, why they’re happening, and the various methods attackers are using to circumvent MFA (Multi-Factor Authentication), based on data in Talos’ 2024 Year in Review. Topics we touch on include phishing, push spray attacks, and Adversary-in-the Middle campaigns, and throughout the episode Steven provides best practice recommendations for implementing MFA at scale, without increasing user friction.For more resources, check out the Duo blog, and Talos’ 2024 Year in Review.
- Year in Review special part 2: The biggest ransomware trendsby Cisco Talos on April 17, 2025 at 9:00 am
Azim Khodjibaev and Lexi DiScola join Hazel to discuss some of the most prolific ransomware groups (and why LockBit may end this year very differently to how they ended 2024). They also discuss the dominant techniques of ransomware actors, where low-profile tactics led to high-impact consequences.For the full analysis, download Talos’ 2024 Year in Review at https://blog.talosintelligence.com/2024yearinreview/
- Year in Review special part 1: vulnerabilities, email threats, and adversary toolingby Cisco Talos on April 10, 2025 at 9:00 am
Talos researchers Martin Lee and Thorsten Rosendahl join Hazel for the first of our dedicated episodes on the top findings from Talos’ 2024 Year in Review. We discuss the vulnerabilities that attackers most targeted, how this compares with CISA’s list, and how to protect network devices. Given how email lures are evolving, we spend some time chatting about how the current world news cycle may play into adversary’s campaign cycles. And finally we touch on how to spot signs that your own sysadmin tools may be being used against you. For the full report, head to https://blog.talosintelligence.com/2024yearinreview/
- A blueprint for protecting major eventsby Cisco Talos on February 26, 2025 at 11:00 am
Have you ever wondered what it takes to put on a major event like a World Cup or the Olympics, and all the cybersecurity and threat intelligence that needs to be done beforehand? Today’s episode is all about that. Hazel is joined by one of our global Cisco Talos Incident Response leaders, Yuri Kramarz, who has helped some of the biggest events around the world take place securely.We chat about risk factors, focus areas such as endpoint protection, threat hunting and incident response, and what to do in the hours and minutes leading up to the event.Check out the document we mention – a full blueprint on how to protect major events:https://blog.talosintelligence.com/protecting-major-events-blueprint-october-2024-update/
- Why attackers are using hidden text salting to evade email filtersby Cisco Talos on February 12, 2025 at 5:00 pm
In this episode Hazel chats with Omid Mirzaei, a security research lead in the email threat research team at Cisco Talos. Omid and several Talos teammates recently released a blog on hidden text salting (or poisoning) within emails and how attackers are increasingly using this technique to evade detection, confuse email scanners, and essentially try and get phishing emails to land in people’s inboxes. Hidden text salting is a simple yet effective technique for bypassing email parsers, confusing spam filters, and evading detection engines that rely on keywords. The idea is to include some characters into the HTML source of an email that are not visually recognizable.For more, head to the Talos blog