Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06) ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39) New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50) Holiday Season Attac…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss: Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18) CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05) ShadyPanda Hackers Turn Millions of Browsers into Weapon…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat Predic…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin Takeover Akira Ransomware Targets Nutanix VMs Smart Redirects Evade Phishing Detection Threat Hunter Hacks: SEO Hits Hard Listen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: …
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden & Systems Security Engineer Corey as they discuss: Gootloader Returns Using SEO Poisoning (1:27) New Android Spyware LANDFALL (6:33) Curly COMrades Hide in Windows Using Linux VMs (10:57) Sector…
…
continue reading
1
Why Cloud Threats Are Escalating: Identity Risks, Automation Flaws, and Legacy Vulnerabilities, Plus the Latest on Chinese APT Campaigns and NPM Package Abuse
27:18
Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12) Malicious NPM Packages (7:20…
…
continue reading
1
Why Cyber Threats Surge 20% During M&A, Plus the Latest on Qilin and Lazarus Group Campaigns
31:05
Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John & Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15) Qilin Deploys Cross-Platform Attacks (4:21) Lazar…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John & former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42) North Korean Attacker Adopts EtherHiding (7:53) Phishing Attacks Target LastPass (12:11) Fighting Ransomware…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13) New Oracle E-business Suite Flaw (5:19) GitHub CamoLeak AI Attack (7:46) Year-Long Flax Typhoon ArcGIS Campaign (…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09) Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27) Shutdown Threatens US Intel Sharing and Cyber Defense (10:02) Ransomware and Cy…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts Alex and Hayden as they discuss: Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17) Storm-1849 Targeting Cisco ASA Devices (4:38) Medusa Attempts to Pay Reporter for Initial Access (7:00) Debate Over Government Zero-Day Stockpiling (14:41) Josep…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts John and Joey as they discuss: Summer 2025 Attacker Trends (13:41) Self-Replicating 'Shai-hulud' Worm Targeting NPM Packages (1:05) Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49) Phishing Round Up: File Fix Campaign and Microsoft's Raccoo…
…
continue reading
Host, Kim, alongside ReliaQuest's Threat Research experts, cut through the noise to bring you the cyber insights that matter most. Get news, research and actionable strategies from industry leaders, to help you stay ahead of attackers. New episodes every Wednesday at 1pm EST.Από τον ReliaQuest
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey & systems security engineer Corey as they discuss: SAP S/4HANA Flaw Exploitation (2:09) AI-Powered Malware Exposes GitHub (4:24) APT28 Outlook Backdoor hits NATO (8:21) ReliaQuest Experts Answer You…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John & detection engineer Marken as they discuss: Salesloft Drift Tokens Result in Salesforce Data Theft (1:31) Storm-0501 Shifts Ransomware Attacks to Cloud (6:36) APT29 Microsoft 365 Campaign Disrupted (1…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John & Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40) Hackers Abuse Linux Files to Drop Malware (3:50) Silk Typhoon Attacks Cloud Supply Chains (7:21) ReliaQuest Uncovers Cybercr…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Intrigued by Warlock ransomware's Chinese connection? Join host Kim along with intelligence analysts Joey & John as they discuss: \Warlock Ransomware Attacks Against Telecoms (3:12) New FortiSIEM Flaw Exploited in the Wild (5:19) Man-in-the-Prompt Attack Steals Data from LLMs (8:04) How ReliaQuest T…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss: WinRAR Zero-Day Exploited in RomCom Attacks (1:44) New EDR Killer Popular with Ransomware Groups (4:30) Data Breach Reveal Kimsuky Inner Workings (11:31)…
…
continue reading
Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into: Akira Ransomware Exploiting a Potential Zero Day Plague Backdoor Emerges as Silent Intruder Evolving Tactics of North Korean Att…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34) LameHug AI-Powered Malware (5:55) UK Bans Ransomware Payments (9:44) AI Tactics Behind the Latest Cyber Threats (14:11) Kim B…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2 Scattered Spider Hits Aviation From ClickFix to FileFix Ransomware Threats from Q2 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June …
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber Threats Infostealers Spread by Fake AI Video Generators Kickidler Abuse by Ransomware Groups FBI Takedown of Huge Botnet Kim Bromley: Senior Cyber T…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss: Scattered Spider Attacks UK Retail Orgs Bring Your Own Installer SentinelOne Bypass Hunting for North Korean Insiders Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research …
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver Vulnerability AI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business Model Maximum Severity Commvault flaw Kim Bromley: Senior Cyber Threa…
…
continue reading
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and John as they discuss: BreachForums Down: Dark Storm Team Takes Credit A Potential New Vulnerability in SAP NetWeaver Exploit User Targets Salesforce Data ReliaQuest Research: Understanding Chinese Espionage Strategies Kim Bromley: Senior Cyber …
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analysts Ivan and Hayden as they discuss: How ReliaQuest Identified a New Backdoor and Persistence Technique Our Latest Ransomware Quarterly Report How Attackers Maintained Access to Patched FortiGate VPNs What Oracle Said Next About That Breach Kim Bromley: Senior Cybe…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analyst Joey and threat hunter Leo as they discuss: Ivanti Patches Exploited Vulnerability Fast Flux DNS Evasion Warning Ransomware Scene Shifts ReliaQuest's Approach to Threat Hunting Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analyst Hayden and threat detection engineer Marken as they discuss: Oracle Data Breach Latest Updates BlackLock Ransomware Exposed Active Exploitation of ChatGPT Flaw Up to the Minute Attacker Techniques Kim Bromley: Senior Cyber Threat Intelligence Analyst on the Reli…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analyst Joey and special guest Rachel Ratcliff as they discuss: The latest Insights on the Alleged Oracle Data Breach A Critical Vulnerability in Next.js Middleware The Importance of Incident Response when Tackling Today's Cyber Threats Rachel Ratcliff: Engagement Manag…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: ReliaQuest's Research: Devastating Paths to VPN Exploitation SuperBlack Ransomware Exploits Fortinet Flaws BRUTED Framework Automates Black Basta Attacks ClickFix Campaign Hooks Hospitality Sector Kim Bromley: Senior Cyber Threat …
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim, and intelligence analysts Joey and Anna as they discuss: ReliaQuest's Research: Cyber Threats to Hospitality and Recreation Silk Typhoon Expands to Supply-Chain Attacks Insider's Kill Switch Cripples Ex-Employer Akira Ransomware Uses Webcam to Compromise Network Kim Bromley: Senior Cyber Thre…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim and Detection Researcher Marken Teder as they discuss: ReliaQuest's Research: Blink and They're In The Latest Ransomware Developments 244 Million Passwords Added to 'Have I Been Pwned' VMware Zero-Days Actively Exploited Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest T…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join host Kim and cyber threat intelligence analysts Joey Keyes and Hayden Evans as they discuss insights from ReliaQuest's 2025 Annual Cyber-Threat Report: The Top Successful Initial Access Techniques How Attackers Achieve Breakout in 48 Minutes Key Recommendations to Outpace Attackers Kim Bromley: Senior …
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim as they discuss: Storm-2372 Device Code Phishing Campaign China Linked Espionage Tools Used Alongside Ransomware 8Base Leak Site Seized in Law Enforcement Operation ReliaQuest Research on the Worlds Fastest Rising Ransomware Group: BlackLock Chris Morgan: Senior Cyber Threat Intelli…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, and Detection researcher Corey Carter as they discuss: Large Scale Brute Force Campaign Targeting Edge Devices Critical Microsoft RCE Vulnerability Exploited Ransomware Criminals Attempt to Recruit Insiders ReliaQuest Research: Manufacturing Sector Report Chris Morgan: Senior Cyber…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, and Senior Threat Intelligence Analyst Ivan Righi as they discuss: APT Groups Use AI for Reconnaissance Unused AWS Buckets Pose Supply-Chain Risk New Lazarus Group Infrastructure Uncovered ReliaQuest Research: Attackers Abuse Legitimate Tools Kim Bromley: Senior Cyber Threat Intell…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Marken, and Threat Intelligence Analyst Anna as they discuss: ReliaQuest's Research into Attacker Breakout Times Lumma Infostealer Spreading via Fake Reddit Webpages Ransomware Persisting with SSH Tunnelling DeepSeek and the Potential Risks to User Data Chris Morgan: Chris Morgan is a S…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, and Detection Researcher Corey Carter as they discuss: ReliaQuest's Q4 Ransomware Report FortiGate Data Leak New Sneaky 2FA Phishing Kit UK Contemplates Ransomware Payment Ban Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined R…
…
continue reading
1
Guest Episode: Ways Threat Intel Can Prioritize Threats, Vulnerability Chaos, Biden Executive Order
48:10
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, along with guest speaker Barri Graham, Beazley Threat Intelligence. Fortinet and Ivanti zero-days under active exploitation Infostealer spread via fake LDAPNightmare exploit Biden administration hasten's executive order The importance of taking a proactive approach within threat in…
…
continue reading
Resources: https://linktr.ee/RQShadowTalk Join hosts Chris and Kim, and threat hunter Brian as they discuss: Chinese Espionage Hits US Treasury Department New OtterCookie Variant Used in North Korea Recruitment Scam FireScam Infostealer Imitates Telegram to Steal Your Data ReliaQuest's Response to a Speedy Pure Malware Compromise Kim Bromley: Senio…
…
continue reading