Episodes

  • 2015 vs 2025: What the Last Decade of Threats Taught Us
    Dec 18 2025

    In this special, end-of-year episode (and Hazel’s final show as host) Talos Takes goes on a time-travel adventure: What would a defender from 2015 think of the cybersecurity realities of 2025? Joined by Talos teammates Pierre Cadieux, Alex Ryan, and Joe Marshall, we compare the threats, tools, and challenges of 2015 with those of 2025.

    The team recalls where they were in their careers a decade ago, then dives deep into how ransomware has evolved, how APTs and state sponsored attacks have shifted, and why identity has become the new battleground for attackers and defenders alike. They discuss the impact of AI on both sides of the security equation, share what they miss from “the good old days,” of 2015, and offer practical advice for defenders facing the challenges of 2026 and beyond.

    Show More Show Less
    45 mins
  • When You’re Told “No Budget”: The Blueprint for Staying Secure
    Nov 25 2025

    What happens when your to-do list keeps growing but your budget doesn’t? Hazel is joined by three Cisco Talos Incident Response experts to talk about the reality many organizations face: rising threats, aging infrastructure, and fewer people to defend it all.

    From configuring what you already have, to open-source strategies, to the impact of cybersecurity layoffs, this episode is packed with practical guidance for securing your organization during an economic downturn.

    Resources mentioned:

    https://blog.talosintelligence.com/cybersecurity-on-a-budget-strategies-for-an-economic-downturn/

    https://blogs.cisco.com/news/doubling-down-on-resilient-infrastructure

    https://talosintelligence.com/incident_response

    Show More Show Less
    24 mins
  • How Attackers Use Your Own Tools Against You (IR trends Q3 2025)
    Nov 13 2025

    In this episode of Talos Takes Hazel sits down with Talos' Bill Largent and Craig Jackson to discuss the latest Cisco Talos Incident Response Quarterly Trends Report (Q3 2025). From a wave of Toolshell events, to a rise in post-exploitation phishing, and the misuse of legitimate tools like Velociraptor, this quarter’s cases all point to a theme: attackers are getting very good at living off what’s already in your environment. Read the full report at https://blog.talosintelligence.com/ir-trends-q3-2025/

    Show More Show Less
    11 mins
  • Passwordless Security: Debunking the Biggest Myths
    Oct 24 2025

    On this episode of Talos Takes, Hazel welcomes Cisco Duo experts Steven Leung and Tess Mishoe to bust the most common myths around passwordless security and multi-factor authentication (MFA). Discover why not all MFA is created equal, why passwordless doesn't mean less security, and the most seamless way to adopt passwordless solutions. Plus, learn the truth about how passwordless may affect compliance and audits, and whether passwordless really is more vulnerable to phishing.

    Show More Show Less
    15 mins
  • You Can't Patch Burnout: When Cybersecurity Takes a Toll
    Oct 2 2025

    Every October, Cybersecurity Awareness Month brings a wave of tips: update your software, enable MFA, use strong passwords. But what good is any of that if the people behind the defenses are feeling burned out?

    In this episode of Talos Takes, Hazel sits down with Joe Marshall for a candid, vulnerable conversation about the human cost of cybersecurity. Joe opens up about his experience during the VPNFilter campaign — months of secrecy, long hours, immense pressure, and the trauma it left behind. Hazel shares her own journey with burnout, and together they talk about how to recognise the warning signs.

    They close with practical steps: building a personal “incident response playbook” that includes boundaries, peer support, and self-care. Because at the end of the day, you can’t patch a system if you're burned out.

    Show More Show Less
    47 mins
  • Tampered Chef: When Malvertising Serves Up Infostealers
    Sep 18 2025

    Imagine downloading a PDF Editor tool from the internet that works great...until nearly two months later, when it quietly steals your credentials. That’s the reality of “Tampered Chef,” a malvertising campaign that preyed on users searching for everyday software.
    In this episode, Nick Biasini explains how cybercriminals are investing in "malvertising", why enterprises are prime targets, and why there are additional challenges when it comes to defending against time-delayed attacks.

    Show More Show Less
    11 mins
  • Inside the Black Hat NOC: Lessons in Securing One of the Wildest Networks
    Sep 3 2025

    How do you build and defend a network where attacks are not just expected-they're part of the curriculum? In this episode, Hazel talks with Jessica Oppenheimer, Director of Security Operations at Cisco, about the ten years she's spent in the Black Hat Network Operations Center (NOC).

    Explore the technical challenges of segmenting and monitoring a network designed for experimentation, live hacking, and hands-on training, including how malicious and benign behaviors are distinguished in real time. Jessica shares how the NOC leverages Cisco technologies like the new machine learning-powered SnortML engine to detect zero-days, outliers, and advanced attack patterns that traditional rule sets miss.

    Learn how automation, contextual analysis, and collaborative response drive decision-making in this high-stakes environment, and how those lessons now influence security at global events like the Olympics and the Super Bowl.

    For more details, check out the Cisco blog wrap detailing all our Black Hat NOC activity https://blogs.cisco.com/security/bhusa-2025-noc

    Show More Show Less
    23 mins
  • Breaking Down Chaos: Tactics and Origins of a New RaaS Operation
    Aug 1 2025

    Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talos’ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaos’ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the group’s likely connections to former BlackSuit operators. James also shares what defenders should be watching for and how to stay ahead of evolving ransomware tactics.

    Read the full research blog: https://blog.talosintelligence.com/new-chaos-ransomware

    Show More Show Less
    16 mins