28 subscribers
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
المدونة الصوتية تستحق الاستماع
برعاية


1 Episode 21: The Heiress Who Helped End School Segregation 35:10
Why more actors are starting to use Telegram for their communications
Manage episode 408355513 series 2800269
Jon started noticing that Talos is finding more threat actors using Telegram nowadays for their communication and coordination, so he decided to bring Azim Khodjibaev on to ask him if he was just inventing this, or if it was a real trend. Turns out it's a real trend! Azim fills listeners in on why Telegram is becoming the app of choice for APTs to publish "news," threaten data leaks, and more.
207 حلقات
Manage episode 408355513 series 2800269
Jon started noticing that Talos is finding more threat actors using Telegram nowadays for their communication and coordination, so he decided to bring Azim Khodjibaev on to ask him if he was just inventing this, or if it was a real trend. Turns out it's a real trend! Azim fills listeners in on why Telegram is becoming the app of choice for APTs to publish "news," threaten data leaks, and more.
207 حلقات
كل الحلقات
×
1 A blueprint for protecting major events 13:43

1 Why attackers are using hidden text salting to evade email filters 9:59

1 How to establish a threat intelligence program (Cisco Live EMEA preview) 16:01

1 Web shell frenzies, the first appearance of Interlock, and why hackers have the worst cybersecurity: IR Trends Q4 2024 13:59

1 It's the 35th anniversary of ransomware - let's talk about the major shifts and changes 23:28

1 Unwrapping the emerging Interlock ransomware attack 15:02

1 It's Taplunk! Talos and Splunk threat researchers meet to put the security world to rights 50:38

1 The biggest takeaways from Talos IR's new report: New ransomware variants, EDR tool uninstallation, and password spray attacks increasing 15:26

1 How Talos IR and Splunk are teaming up 21:21

1 Why the BlackByte ransomware group may be more active than we initially thought 9:21

1 AI, critical infrastructure dominate conversation at Hacker Summer Camp 14:07

1 A 1-on-1 with Talos VP Matt Watchinski 30:04

1 What should we be doing to better support open-source software? 11:03

1 Threat actor trends and the most prevalent malware from the past quarter 15:57

1 You got a data breach notification. Now what? 22:03

1 What we learned from studying the TTPs of the 14 most active ransomware groups 8:15

1 Time to catch up on the wide-reaching Snowflake incident 16:57

1 Everything we know about denial-of-service attacks in 2024 10:10

1 How much has AI helped bad actors who spread disinformation? 19:20

1 Why CoralRaider is looking to steal your login credentials 6:45

1 4 takeaways from what Talos IR is seeing in the field 14:15

1 How to defend against brute force attacks 7:30

1 What are the dangers of enabling sideloading and third-party apps? 10:24

1 Why we need to stop calling as-a-service group takedowns "takedowns" 12:20

1 Turla has been around for 20-plus years at this point, but they're still mixing things up 9:04

1 Why more actors are starting to use Telegram for their communications 10:25
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.