Talos Takes

Inside the attack chain: A new methodology for tracking compartmentalized threats


Listen Later

Edmund Brumaghin joins Hazel to discuss how threat actors (including state sponsored attackers), are increasingly compartmentalizing their attacks i.e they're bringing in specialist skillsets from other groups to handle different aspects of the attack chain. Edmund discusses why this is happening, and the challenges this poses for defenders when it comes to attribution and reporting. He then discusses several solutions which seek to evolve traditional threat modelling, and help provide clarity to defenders.

More details can be found in this blog https://blog.talosintelligence.com/compartmentalized-threat-modeling/

If you're interested in our other blog on initial access groups, that can be found at https://blog.talosintelligence.com/redefining-initial-access-brokers/


...more
View all episodesView all episodes
Download on the App Store

Talos TakesBy Cisco Talos

  • 4.9
  • 4.9
  • 4.9
  • 4.9
  • 4.9

4.9

13 ratings


More shows like Talos Takes

View all
Security Now (Audio) by TWiT

Security Now (Audio)

2,011 Listeners

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

651 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,028 Listeners

Darknet Diaries by Jack Rhysider

Darknet Diaries

8,077 Listeners

CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

CISO Series Podcast

195 Listeners

Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

Defense in Depth

73 Listeners

Afternoon Cyber Tea with Ann Johnson by Microsoft

Afternoon Cyber Tea with Ann Johnson

39 Listeners

Cybersecurity Headlines by CISO Series

Cybersecurity Headlines

139 Listeners

Threat Vector by Palo Alto Networks by Palo Alto Networks and N2K Networks

Threat Vector by Palo Alto Networks

40 Listeners