DiscoverTalion Threat Set Radio
Talion Threat Set Radio
Claim Ownership

Talion Threat Set Radio

Author: Talion Threat Intelligence Team

Subscribed: 8Played: 109
Share

Description

Talion Threat Set Radio is your weekly cyber threat intelligence bulletin. We cut through the noise to give you our honest opinion on the threat news that matters.

207 Episodes
Reverse
Threat Bulletin #185

Threat Bulletin #185

2022-09-0207:40

Twilio breach allowed attackers access to Okta single use sign on codes. Raspberry Robin USB malware linked to EvilCorp via Dridex similarities. Ransomware written in more obscure languages trend continues with Golang based “Agenda”
Threat Bulletin #300

Threat Bulletin #300

2025-05-0904:00

Signing off. Thank you for listening.
Threat Bulletin #299

Threat Bulletin #299

2025-05-0204:08

Multiple UK retailers hit by cyber attacks. Microsoft make strides towards passwordless future. Hacker who stole Disney data pleads guilty. Shameless Plug.
Threat Bulletin #298

Threat Bulletin #298

2025-01-2405:35

Founder of the Silk Road illegal dark web marketplace given full pardon. Trump administration fires review board investigating Chinese APT group.
Threat Bulletin #297

Threat Bulletin #297

2025-01-1005:43

Multiple faulty Tenable updates over holiday period cause global Nessus agent failure. Telegram policy shift on law enforcement requests causes cybercrime exodus.
Threat Bulletin #296

Threat Bulletin #296

2025-01-0303:39

Chinese state actor breaches U.S department responsible for foreign sanctions following BeyondTrust compromise. Quick fire topics.
Threat Bulletin #295

Threat Bulletin #295

2024-12-2004:40

New wave of file transfer platform attacks perpetrated by Clop. Apache Struts exploited in the wild using publicly available PoC code.
Threat Bulletin #294

Threat Bulletin #294

2024-12-1304:49

Termite ransomware claims attack on Blue Yonder SaaS giant. Ivanti suffers sixth CSA security vulnerability in 4 months.
Threat Bulletin #293

Threat Bulletin #293

2024-12-0603:55

New phishing technique abuses office document recovery feature to evade detection. Quick fire topics.
Threat Bulletin #292

Threat Bulletin #292

2024-11-2905:42

First UEFI Bootkit targeting Linux discovered. Russian RomCom group utilises chain vulnerability in widespread attack.
Threat Bulletin #291

Threat Bulletin #291

2024-11-2204:06

Akira claims record breaking 30 victims in one day. Ransomware operation abandons file encryption for extortion tactics. Quick fire topics.
Threat Bulletin #290

Threat Bulletin #290

2024-11-1504:08

Multiple new phishing techniques, ZIP file concatenation, and Docusign API abuse on the rise. Quick fire topics.
Threat Bulletin #289

Threat Bulletin #289

2024-11-0804:21

VEILDrive campaign uses a number of Microsoft services for stealthy compromise. Quick fire topics.
Threat Bulletin #288

Threat Bulletin #288

2024-11-0104:58

Arrested members of the REvil ransomware operation tried and charged in Russian court. Operation Magnus collaborative effort brings down Redline and Meta infostealer malware.
Threat Bulletin #287

Threat Bulletin #287

2024-10-2505:09

New Fortinet 0 day exploit highlights history of bad disclosure and transparency practices Quick fire topics.
Threat Bulletin #286

Threat Bulletin #286

2024-10-1803:25

Tool which disrupts EDR solutions from sending alerts to defenders used in attacks. Quick fire topics.
Threat Bulletin #285

Threat Bulletin #285

2024-10-1105:00

31 million records stolen from the Wayback Machine service. Ivanti hit by even more zero day exploitation in active attacks. Quick fire topics.
Threat Bulletin #284

Threat Bulletin #284

2024-10-0403:58

Evil Corp and LockBit members the target of global sanctions and arrests. Quick fire topics.
Threat Bulletin #283

Threat Bulletin #283

2024-09-2704:18

Telegram in the spotlight, founder arrested, banned in Ukraine, and will now share user data on legal request. Quick fire topics.
Threat Bulletin #282

Threat Bulletin #282

2024-09-2004:36

Explosions were a supply chain compromise, not a cyber attack. Another Ivanti critical flaw exploited in the wild with public exploit.
loading
Comments