Talos Takes
Podcast image
Cybersecurity’s double-header: 2025 insights from Talos and Splunk
31 mins; March 26, 2026
Modernizing your threat hunt
23 mins; March 12, 2026
Holding the line: Service provider security
29 mins; February 26, 2026
IR Trends Q4 2025: Ransomware chills and phishing heats up
13 mins; February 12, 2026
Cracking the code: What encryption can (and can’t) do for you
27 mins; January 28, 2026
Cybersecurity certifications and you
27 mins; January 15, 2026
2015 vs 2025: What the Last Decade of Threats Taught Us
45 mins; December 18, 2025
When You’re Told “No Budget”: The Blueprint for Staying Secure
24 mins; November 25, 2025
How Attackers Use Your Own Tools Against You (IR trends Q3 2025)
11 mins; November 13, 2025
Passwordless Security: Debunking the Biggest Myths
15 mins; October 24, 2025
You Can't Patch Burnout: When Cybersecurity Takes a Toll
47 mins; October 02, 2025
Tampered Chef: When Malvertising Serves Up Infostealers
11 mins; September 18, 2025
Inside the Black Hat NOC: Lessons in Securing One of the Wildest Networks
23 mins; September 03, 2025
Breaking Down Chaos: Tactics and Origins of a New RaaS Operation
15 mins; August 01, 2025
Why Attackers Love Your Remote Access Tools
14 mins; July 17, 2025
Teaching LLMs to spot malicious PowerShell scripts
16 mins; June 26, 2025
How cybercriminals are camouflaging threats as fake AI tool installers
17 mins; June 05, 2025
Inside the attack chain: A new methodology for tracking compartmentalized threats
16 mins; May 22, 2025
Follow the motive: Rethinking defense against Initial Access Groups
16 mins; May 15, 2025
Year in Review special pt. 4: How AI is influencing the threat landscape?
32 mins; May 01, 2025
Year in Review special part 3: Identity and MFA attacks
22 mins; April 24, 2025
Year in Review special part 2: The biggest ransomware trends
18 mins; April 17, 2025
Year in Review special part 1: vulnerabilities, email threats, and adversary tooling
18 mins; April 10, 2025
A blueprint for protecting major events
13 mins; February 26, 2025
Why attackers are using hidden text salting to evade email filters
9 mins; February 12, 2025
How to establish a threat intelligence program (Cisco Live EMEA preview)
16 mins; February 05, 2025
Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024
13 mins; January 31, 2025
Exploring vulnerable Windows drivers
15 mins; January 15, 2025
It's the 35th anniversary of ransomware - let's talk about the major shifts and changes
23 mins; December 11, 2024
Unwrapping the emerging Interlock ransomware attack
15 mins; November 14, 2024
It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights
50 mins; October 31, 2024
The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing
15 mins; October 25, 2024
How Talos IR and Splunk are teaming up
21 mins; September 13, 2024
Why the BlackByte ransomware group may be more active than we initially thought
9 mins; September 06, 2024
AI, critical infrastructure dominate conversation at Hacker Summer Camp
14 mins; August 23, 2024
A 1-on-1 with Talos VP Matt Watchinski
30 mins; August 16, 2024
What should we be doing to better support open-source software?
11 mins; August 02, 2024
Threat actor trends and the most prevalent malware from the past quarter
15 mins; July 26, 2024
You got a data breach notification. Now what?
22 mins; July 19, 2024
What we learned from studying the TTPs of the 14 most active ransomware groups
8 mins; July 12, 2024
Time to catch up on the wide-reaching Snowflake incident
16 mins; June 28, 2024
Everything we know about denial-of-service attacks in 2024
10 mins; June 21, 2024
The many shades of LilacSquid
10 mins; June 14, 2024
A mid-year checkin on Volt Typhoon
11 mins; June 07, 2024
How much has AI helped bad actors who spread disinformation?
19 mins; May 31, 2024
Recapping RSA
12 mins; May 17, 2024
Why CoralRaider is looking to steal your login credentials
6 mins; May 10, 2024
4 takeaways from what Talos IR is seeing in the field
14 mins; May 03, 2024
How to defend against brute force attacks
7 mins; April 26, 2024
What are the dangers of enabling sideloading and third-party apps?
10 mins; April 19, 2024
Why we need to stop calling as-a-service group takedowns "takedowns"
12 mins; April 12, 2024
Turla has been around for 20-plus years at this point, but they're still mixing things up
9 mins; April 05, 2024
Why more actors are starting to use Telegram for their communications
10 mins; March 22, 2024
Why no one should be relying on passive security in 2024
8 mins; March 15, 2024
What's new about GhostSec's ransomware-as-a-service model
12 mins; March 08, 2024
Why are "identity attacks" on the rise?
11 mins; March 01, 2024
The tl;dr of NIS2
14 mins; February 23, 2024
Case study: How Talos IR helped a healthcare tech company avoid a ransomware attack
49 mins; February 16, 2024
What you need to know about identity attacks
14 mins; February 16, 2024
How are attackers using malicious drivers in Windows to stay undetected?
11 mins; February 02, 2024
(XL Edition): Talos IR recaps the top threats of Q4 2023
17 mins; January 26, 2024
What's new with CVSS 4.0, and does it really change anything?
9 mins; January 19, 2024
XL Edition: Talos' 2023 Year in Review
34 mins; January 12, 2024
Year in Review: Why are attackers targeting the telecommunications sector so often?
7 mins; January 05, 2024
Year in Review: Why was 2023 the year of data theft extortion?
9 mins; December 15, 2023
2023 Year in Review: Everything you need to know about Chinese state-sponsored actors
8 mins; December 08, 2023
Inside Talos' effort to protect the Ukrainian power grid
11 mins; December 01, 2023
Why has the Phobos ransomware been working for so long?
13 mins; November 17, 2023
A warning about scams in "Roblox" (or any other online game, really)
10 mins; November 10, 2023
XL Edition: The top incident response trends of Q3
30 mins; November 03, 2023
Patching 101
8 mins; October 27, 2023
What happens when you actually click the "report spam" button?
8 mins; October 20, 2023
How to find the right password management solution for you
7 mins; October 13, 2023
Cybersecurity Awareness Month: The best practices for implementing multi-factor authentication
16 mins; October 06, 2023
Inside a Talos Incident Response emergency event
15 mins; September 29, 2023
How Talos helped defend Black Hat's network in Vegas
15 mins; September 22, 2023
SapphireStealer hits the open internet
7 mins; September 08, 2023
You're never going to believe this, but Lazarus Group is back again
9 mins; September 01, 2023
Carrying out incident response in-person vs. virtually
15 mins; August 25, 2023
Hacktivism is quietly growing, especially when it comes to Russia's invasion of Ukraine
10 mins; August 18, 2023
What's the difference between data theft extortion and ransomware?
10 mins; August 11, 2023
Reading 2023's cybersecurity tarot cards
11 mins; August 04, 2023
(XL Edition): The top trends that Talos IR saw last quarter
29 mins; July 28, 2023
ISO 27002 sounds intimidating, but really it's just a cybersecurity shopping list
12 mins; July 21, 2023
The dangers of "Mercenary" groups and the spyware they create
8 mins; July 14, 2023
The various ways attackers can mess with URLs, TLDs and DNS
13 mins; June 30, 2023
What we know so far about the MOVEit zero-day making the rounds
6 mins; June 23, 2023
The hidden threat to the software supply chain you may not be thinking about
12 mins; June 16, 2023
Horabot is here to do "horable" things to your email inbox
13 mins; June 09, 2023
The Predator spyware and more "mercenary" groups
9 mins; June 02, 2023
How to adapt to the constant change that comes with cybersecurity
18 mins; May 26, 2023
RA Group is just the latest example of the ransomware landscape splintering
8 mins; May 19, 2023
What makes the new Greatness phishing-as-a-service tool so great?
8 mins; May 12, 2023
XL Edition: Talos Incident Response livestream on top trends from the past quarter
32 mins; May 05, 2023
Analyzing the recent takedown of popular dark web forums
8 mins; April 28, 2023
What does the future of MFA look like?
12 mins; April 21, 2023
How to best prepare for, and respond to, supply chain attacks
9 mins; April 14, 2023
The defensive and offensive implications of ChatGPT and AI
14 mins; March 31, 2023
Talos Takes Ep. #132: Reflecting on one year of Talos' work in Ukraine
12 mins; March 24, 2023
Why does the Prometei botnet keep growing?
12 mins; March 17, 2023