Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way Lurene, Matt, and Mitch and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.

  • Beers With Talos

    Eternal Fauxmance: Attribution Easter Eggs

    Recorded 2/16/18 - This week, Mitch learns about starting a show without Matt with no other plans to control Craig in place. The team discusses Olympic Destroyer and then takes on attribution in light of recent developments with Nyetya. We look at what attribution actually takes and the ease and commonality of planting false flags.

    Download
    Run Time: 01:03:54

    Keywords
    • talos
    • nyetya
    • notpetya
    • olympic destroyer
    • attribution
    • Rob Joyce

  • Beers With Talos

    Forget the ASA, Rob Joyce Favorited Craig’s Tweet

    Recorded 2/2/18 - Guests two EPs in a row! We are joined by Omar Santos from Cisco PSIRT to discuss CVE-2018-0101, the Cisco ASA Remote Code Execution and Denial of Service Vulnerability. See the PSIRT post below for latest updates. We also discuss Crypto miners overtaking ransomware, a Flash 0-day carrying a known ROKRAT payload (huh??), and we couldn’t escape discussing Autosploit because Rob Joyce faved one of Craig’s tweets.

    Download
    Run Time: 01:09:52

    Keywords
    • talos
    • security
    • ASA
    • CVE-0218-0101
    • autosploit
    • flash
    • 0-day

  • Beers With Talos

    How to Hire the Best, Attribution Without Apaches is Useless

    It is a packed episode this time! We are joined by Edmund from the Talos Outreach Group to chat about Threat Modeling after we make our way through attribution and Group 123, hipster artisanal patching (hand flipped bits!), and spend a good bit of time talking about how Talos identifies the cream of the crop when we are hiring.

    Download
    Run Time: 01:07:34

    Keywords
    • talos
    • security
    • malware
    • attribution
    • hiring
    • patching

  • Beers With Talos

    Crypto, Vuln Disco, and the Spectre Meltdown

    This is easily our best podcast of 2018 (so far). The crew discusses the recent spike in crypto-mania sweeping the globe and also goes in-depth on how vulnerability discovery plays a critical role in overall security. Plus, the crew all (shockingly) have different takes on Spectre/Meltdown and Craig decides to up the ante with the killer robots.

    Download
    Run Time: 01:07:06

    Keywords
    • Crypto
    • vulnerability discovery
    • Talos
    • security
    • spectre
    • meltdown

  • Beers With Talos

    The "Best" of Beers with Talos 2017

    Quotes intended, we think you know why. Mitch takes control to present the best of the first (partial) year of the podcast. He covers some of our guests, some of our favorite non-security bits, and a look back at our in-the-moment view of some of the top stories of the year.

    Things you can look forward to: Mitch struggling through sailing solo with bad bits and unnecessary ukulele music, and a not-at-all-contrived apology for permanently deleting the hilarious fallout from an embarrassing faux pas. …but the clips are really good!

    Download
    Run Time: 01:00:00

    Keywords
    • talos
    • security
    • malware
    • best of

  • Beers With Talos

    Kitties in My Blockchain, Obfuscating Pronunciations, and Other Security Stuff

    It’s the last full episode of the year! Thanks to you and the diligent work of Matt’s loving mother, the first 17 EPs of Beers with Talos were downloaded over 200,000 times in 2017! To show our gratitude, we are giving you not one, but TWO roundtables this week and even a special bonus rant! Also, Mitch can’t say words good, and Craig reads us stories from the blog!

    Download
    Run Time: 01:16:25

    Keywords
    • bwt
    • talos
    • obfuscation
    • back to basics
    • cryptokitties

  • Beers With Talos

    Greek Gods, Trojans, and the Spice Girls as Spirit Animals

    Matt hijacks the Roundtable to tell us which Spice Girl each host is, because where else does a PR gimmick from KFC lead? Also, what’s worse than clicking a search result and getting a slideshow listicle? Getting a trojan payload when searching for banking forms (but that is the only thing that is worse - ARE YOU LISTENING BUZZFEED?). We also discuss the misnaming of troll farms and how patching and proper network segmentation are your friends - unlike anyone who publishes clickbait slideshows - STILL LOOKING AT YOU, BUZZFEED)

    Download
    Run Time: 00:58:50

    Keywords
    • talos
    • security
    • cybersecurity
    • zeus
    • panda
    • patching
    • troll farms
    • spice girls
    • SEO
    • SERP poisoning

  • Beers With Talos

    Strong Copy - Bad Rabbit and the Nyetya Connection

    The crew takes on Apache OpenOffice vulns and when you need one CVE versus one hundred. We spend a lot of time discussing signal to noise ratio and Twitter canaries getting things wrong. Of course, we also discuss Bad Rabbit, its relationship to Nyetya, and why OpenOffice vulns are a worry, even to businesses that are run like hippie communes. As per usual, we mostly just make bad jokes.

    Download
    Run Time: 01:15:35

    Keywords
    • strcopy
    • Bad Rabbit
    • Nyetya
    • OpenOffice
    • vulns
    • malware
    • security
    • Talos

  • Beers With Talos

    Landing a Job, Phishing Midstream, and Paul’s IDA Palette

    In this EP, we take on interviewing and finding a job with technical questions and tests (hint: don’t oversell yourself, and make sure your mute button actually works). We also talk about enabling users with security as opposed to hobbling them. When Craig brings up the Google Home Mini beta test issues, he ends up taking a ration over his choices in handling the situation. We also discuss some clever new phishing techniques that insert malware links mid-conversation with a trusted party.

    Download
    Run Time: 01:03:00

    Keywords
    • talos
    • security
    • jobs
    • interviews
    • phishing
    • trustsec
    • malware

  • Beers With Talos

    Ranking Threats and Avoiding Bush League Breach Response

    We haven’t gone around the table and introduced ourselves in some time (about 50k downloads ago), so we take the time we usually complain about things at the top of the show to do that. We have seen a massive amount of “top-tier” threats in the last six months or so. While it might seem like comparing apples and oranges (hint: it is), the crew takes a stab at ranking these recent threats/attacks: CCleaner, Deloitte, Equifax, Nyetya, SEC, Shamoon2, WannaCry. Shockingly, all of us have a different ranking. What’s your list look like?Regarding response: Consistency matters, don’t be clever. We discuss some recent unbelievably boneheaded things we have seen in security response. More importantly, we discuss how you SHOULD respond to an incident.Remember: Complexity kills. Unfortunately, it doesn’t kill thought leaders

    Download
    Run Time: 01:02:10

    Keywords
    • Security
    • threat intel
    • Talos
    • breach response
    • chippah