Talos Takes

Inside the attack chain: A new methodology for tracking compartmentalized threats


Listen Later

Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it comes to attribution and reporting. He then discusses several solutions which seek to evolve traditional threat modelling, and help provide clarity to defenders.

More details can be found in this blog https://blog.talosintelligence.com/compartmentalized-threat-modeling/

If you're interested in our other blog on initial access groups, that can be found at https://blog.talosintelligence.com/redefining-initial-access-brokers/


...more
View all episodesView all episodes
Download on the App Store

Talos TakesBy Cisco Talos

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

13 ratings


More shows like Talos Takes

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,005 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

649 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,034 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,115 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

191 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

74 Listeners

Afternoon Cyber Tea with Ann Johnson by Microsoft

Afternoon Cyber Tea with Ann Johnson

41 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

138 Listeners

Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

Threat Vector by Palo Alto Networks

40 Listeners