Talos went wall-to-wall at Hacker Summer Camp, showing up to Black Hat and DEFCON with talks, challenges, advice and education.

Over the course of two days at Black Hat, Cisco Security hosted more than 20 talks at our booth, many featuring Talos researchers and analysts.

In case you couldn't swing by the booth, we've got a quick recap of eight of those "flash talks" to give you a quick rundown of what our researchers wanted to get across. Click on each of these videos to hear each speaker give a quick recap, and stay tuned for a future Beers with Talos episode to hear all of them together.

Nick Biasini

pic.twitter.com/L8neBnek4o

— Cisco Talos Intelligence Group (@TalosSecurity) August 7, 2019

Andrew Blunck

Andrew Blunck is up now showing us that the number of vulnerabilities disclosed each year is on the rise. #BHUSA #BHUSA2019 pic.twitter.com/PncUDE5fAc

— Cisco Talos Intelligence Group (@TalosSecurity) August 7, 2019

Azim Khodjibaev

.@AShukuhi kicks things off today at the booth talking about why chat rooms are still popular on the dark web. pic.twitter.com/ObteXlbav6

— Cisco Talos Intelligence Group (@TalosSecurity) August 8, 2019

Matt Valites


David Liebenberg

Next up is @ChinaHandDave giving a quick overview of what can go wrong when users try to buy cryptominers from Chinese actors. #BHUSA #BHUSA2019 pic.twitter.com/YCxKrGosCg

— Cisco Talos Intelligence Group (@TalosSecurity) August 7, 2019

Josh Williams


Jamie Filson

Now @jaimefilson is giving his über simplified overview of phishing. #BHUSA #BHUSA2019 pic.twitter.com/bmWDGr8iOz

— Cisco Talos Intelligence Group (@TalosSecurity) August 8, 2019

Earl Carter

Unfortunately, we were unable to grab everyone for an interview after their talk. However, we would like to thank these other researchers for presenting at the Cisco Security booth:

  • Bruce Hennigar: "Aging infrastructure — Where evil festers"
  • Andrew Windsor: "Server-side attacks as seen through honeypot data"
  • Jakob Dohrmann: "Efficient anti-spam in a world of shared infrastructure"
  • Vitor Ventura: "Gustuff mobile malware for rent"
  • J.J. Cummings: "Destructive trends"
  • Patrick Mullen: "Writing Snort 3 rules"
  • Brandon Stultz: "Defending against BlueKeep with Cisco Firepower"
  • Geoff Serrao: "Talos open-source software, Python Snort environment"
  • John Levy: "Leveraging Snort to protect networks against Responder"
  • Josh Palmer: "Ransomware — Then and now"