Researcher Spotlight: How Azim Khodjibaev went from hunting real-world threats to threats on the dark web
Most of the time, Khodjibaev is combing through various dark web forums, ransomware group chats, Russian-speaking websites and other sources trying to learn of attackers’ next moves.
Researcher Spotlight: Globetrotting with Yuri Kramarz
“You have completely different angles in preparing different customers for defense during major global events depending on their role, technology and function,” Kramarz said.
Researcher Spotlight: How Asheer Malhotra looks for ‘instant gratification’ in threat hunting
The India native has transitioned from a reverse-engineer hobbyist to a public speaker in just a few years.
Researcher Spotlight: You should have been listening to Lurene Grenier years ago
The exploit researcher recently rejoined Talos after starting her career with the company’s predecessor Lurene Grenier says state-sponsored threat actors keep her up at night, even after years of studying and following them. She’s spent her security career warning people why th
Researcher Spotlight: Around the security world and back again with Nick Biasini
Nick Biasini’s seen it all. Going on a nearly 20-year security career, he’s been a part of some of Cisco Talos’ largest undertakings in the company’s history. From an attack on the global Olympic Games, to a wireless router malware that affected hundreds of thousands of devices
Researcher Spotlight: Martin Lee, EMEAR lead, Talos Strategic Communications
Who knew you could connect Moses to threat intelligence? When the security community usually thinks about the origins of cybersecurity and threat intelligence, the conversation may quickly center around the codebreakers in World War II or the Creeper software developed in the 19
Researcher Spotlight: Liz Waddell, CTIR practice lead
How this Talos team member’s love of true crime led to a life in cybersecurity Liz Waddell is usually there on someone’s worst day of their professional lives. Chief technology officers and chief information security officers can hope all they want that the day they get hit wit