Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way Lurene, Matt, and Mitch and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.

  • Beers With Talos

    Beers with Talos Ep. #113: Emergency Log4j live show

    Log4j was a big enough deal that we finally decided to host a live show. Mitch, Matt, Liz and special guest JJ Cummings from our Threat Intel team got together to update everyone on where things stand with this critical vulnerabilities. It’s not all doom and gloom though, Matt at least brought some memes!

    Download
    Run Time: 00:59:35

    Keywords
    • log4j

  • Beers With Talos

    Beers with Talos Ep. #112: A new host approaches!

    This is our first episode sans-Craig, but we didn’t wait long to find his replacement! Tune in as we add a new host to the crew. Then, we talk about drama on the ransomware landscape among as-a-service groups. Please note, we recorded this episode before everything dropped on Log4J. We are recording an emergency episode as we speak on this and will be releasing it later this week.

    Download
    Run Time: 00:56:51

    Keywords
    • ransomware
    • ransomware-as-a-service
    • APTs,

  • Beers With Talos

    Beers with Talos, Ep. #115: Everybody's measured by quarters — even threat actors

    We wanted to start off the new year by reflecting on 2021 with Talos Incident Response. The one thing many cyber attacks had in common? People.

    There are issues that arise any time humans are involved, whether it’s being tempted by a phish or someone making simple human errors. So, Matt, Mitch and Liz discuss how logs are crucial during the worst-case scenario and look at how to remove human error as much as possible from the equation.

    Outside of initial infection vectors, there are plenty of other lessons learned from 2021 that we can take into incident response this year.

    Download
    Run Time: 01:05:20

    Keywords
    • Incident Response
    • trends
    • headlines
    • Ukraine
    • phishing

  • Beers With Talos

    Beers with Talos Ep. #111: Saying farewell to Craig and his killer robots

    [Re-uploaded to fix an audio gap.] Yes, we’ve been sitting on this one for a while. But it’s worth it, we promise! We wanted to wait until we had more news to share, so it’s finally time to announce that Craig has left us. We will absolutely miss Craig, but look forward to the next act of Beers with Talos now that 2/5ths of the original crew is gone. We take the time to reminisce with Craig about his time at Talos and talk about this new trend of “bandwidth-sharing” applications. Stay tuned to BWT Ep. #112 where we’ll debut with a new host!

    Download
    Run Time: 00:47:10

    Keywords
    • Honeygain
    • internet sharing
    • malware
    • spam
    • scams

  • Beers With Talos

    Beers with Talos, Ep. #110: The 10 most-exploited vulnerabilities this year (You won't believe No. 6!)

    We mainly spend this episode doing some catching up because it’s been a while since we recorded. But on the actual, helpful, front, we discuss a recently released list of the vulnerabilities that are most often exploited in the wild, according to the U.S. Cybersecurity and Infrastructure Security Agency.

    It’s particularly interesting to compare the lists from 2020 and 2021 to see how threat actors have changed up their tactics and parse through all the information to tell you what you need to know. It’s also important to question these types of reports and how helpful they are to defenders.

    This is also a great episode for any Snort fans out there who are interested in the old days of writing rules for some Y2K-era malware.

    Download
    Run Time: 00:54:36

    Keywords
    • vulnerabilities
    • patching
    • vulnerability research
    • exploits
    • ransomware
    • Snort

  • Beers With Talos

    Kaseya it ain't so

    Summer hacking, happened so fast….
    We’ve been trying to enjoy our summer, but supply chain attacks just had to go and ruin the fun. So Mitch got back from fishing and decided to pull the guys together to discuss the Kaseya supply chain attack. We cover this major event BWT-style, and talk phony patches, mitigation strategies, and unsolicited advice for Kaseya’s CISO. For more, you can also watch our recent live stream with Nick Biasini covering everything you need to know about this attack.
    Also, if you want more Beers with Talos (and you’re listening to this the day it’s released) join us over on the Cisco Twitter account on Thursday, Aug. 5 for a #TalosTakeover. We can’t believe they’re letting us do this, either.

    Download
    Run Time: 00:52:39

    Keywords
    • Kaseya
    • supply chain
    • ransomware
    • REvil

  • Beers With Talos

    Beers with Talos Ep. #109: We have not secured our society — Or, working out a conference talk in realtime

    Most of the Beers with Talos folks are refreshed after a summer vacation. But don’t assume that means they actually prepared for this episode. This is more of a free-flowing episode, where we discuss cyber conflict between nations — one of the many things that keep Matt up at night. They go back and forth discussing what a “cyber war” could actually look like, and what crosses the line into conflict versus traditional “hacktivism.”

    Download
    Run Time: 00:53:59

    Keywords
    • Apple watches
    • cyber war
    • hacking
    • state-sponsored

  • Beers With Talos

    Beers with Talos Ep. #121: The ghost of conferences past

    We wanted to prep for the RSA/Cisco Live stretch of June by looking back on security conferences past. Mitch, Matt and Liz got together to talk about their best and worst conference memories. Plus, Mitch has an overview of everything Talos is doing at RSA and Cisco Live, including a LIVE episode of Beers with Talos next week at RSA. There is a little security talk at least, as we also cover the latest goings on between the Conti ransomware group and Costa Rica’s government.

    Download
    Run Time: 00:29:10

    Keywords
    • conferences
    • Cisco Live
    • RSA
    • Conti
    • ransomware
    • Hive

  • Beers With Talos

    Beers with Talos Ep. #124: There's no such thing as "I have nothing to hide"

    We’ve all heard that popular refrain by now: “Well I have nothing to hide so I don’t care if the government sees my data.” This week, we tell these people they are completely wrong. Ashlee Benge joins the show to discuss her upcoming BlackHat talk on the types of data and personal information health apps track. This has taken on special importance in the overturning of Roe vs. Wade in the U.S, making many forms of abortion illegal in many states. Ashlee talks about how women’s health apps may be compelled to cooperate with law enforcement agencies now after the Supreme Court ruling. We also have a complete rundown of all things Talos happening at BlackHat next week.
    Also, this is unfortunately Liz’s last episode with Beers with Talos. Please bear with us as we figure out the next chapter of the show. Don’t worry though, we’re not going anywhere!

    Download
    Run Time: 00:38:40

    Keywords
    • privacy
    • data
    • apps
    • mobile
    • government
    • BlackHat

  • Beers With Talos

    Beers with Talos Ep. #123 (FIXED!): Hunting for ransomware actors on *whispers* the dark web

    Re-uploaded on July 22, 2022 to fix audio issues —

    We’re back from RSA, Cisco Live and COVID breaks (yes, those things are all absolutely related). Paul Eubanks joins the show to talk about his recent blog post on unmasking ransomware actors on the dark web. He’ll go over several different tactics he and his team use to remove actors’ anonymity that’s so important when actors are working on these websites. Liz provides her take on this from an Incident Response perspective, and Matt semi-pays attention as he ponders how much he hates The Carpenters.

    Download
    Run Time: 00:35:35

    Keywords
    • ransomware
    • cybersecurity
    • extortion
    • ransom
    • cyber attacks