DiscoverShadowTalk: Powered by ReliaQuest
ShadowTalk: Powered by ReliaQuest
Claim Ownership

ShadowTalk: Powered by ReliaQuest

Author: ReliaQuest

Subscribed: 212Played: 8,751
Share

Description

Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research.

Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on the week’s top cybersecurity news and share knowledge and best practices to help businesses mitigate the most pertinent cyber threats. 

 

With over 1,000 customers worldwide and 1,200 teammates across six global operating centers, ReliaQuest delivers security outcomes for the most trusted enterprise brands in the world. Learn more at www.reliaquest.com.

468 Episodes
Reverse
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Tehman as they break down two of the most consequential supply chain attacks of 2026: How DPRK actors socially engineered a NPM maintainerWhy hijacked GitHub versions are a CI/CD wake-up callThe three gaps every security team needs to closeJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he prev...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Alexandra and John, live from Exponent 2026, alongside top security leaders as they discuss: How organizations keep pace with attackersWhy one in four incidents starts with social engineeringHow automated response is helping organizationsChris Thompson: CISO of Caris Life Sciences, a leading, next-generation AI TechBio company and precision medicine pioneer. Chris is a retired Federal Agent having most recently led the North T...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: How Handala wiped 200,000 devices by weaponizing a trusted platformWhy your organization doesn't need to be a direct target to be at riskHow AI-enhanced malware is helping attackers get fasterJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Inc...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Alex as they discuss: How a Chinese APT maintained access for over a yearWhy North Korean impersonation surged 116%Why attackers exploit the same foundational gapsJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Alex...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Tehman and John as they discuss: Why ransomware now prioritizes exfiltration over encryption How attackers can exfiltrate your data in just 6 minutesWhy proactive darkweb monitoring is criticalJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and T...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: How attacker breakout times dropped to as little as 4 minutes Why ClickFix surged 200%Why behavioral detection is criticalJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Brandon Tirado:...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Tehman as they discuss: What attackers prefer over custom malwareHow signature-based detection failsProactive governance vs. reactive triageJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Tehman Tariq: Sr. Manager o...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: Why extortion payment rates are the lowest everOrganizations paying ransomware but refusing data extortion demandsWhy defenders need both visibility and speedJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: Why traditional patch cycles can't beat attackers exploiting vulnerabilities in 24 hoursThe shift from reactive patching to predictive intelligence using EPSS and CISA KEVHow to defend against zero-days when patching isn't an optionJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical ba...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts John and Tehman as they discuss: Why phishing emails are no longer the top malware delivery methodEmerging social engineering tactics: vishing, copy and paste abuse, and software impersonationHow campaigns have evolved from Black Basta to ShinyHuntersJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he pr...
Resources: https://linktr.ee/ReliaQuestShadowTalk John and Tehman as they discuss: How AI is enabling large-scale, high-speed attacksNation-states weaponizing AI for attack automationThe rise of sophisticated AI-generated malwareJohn Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest. Tehman T...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and John as they discuss: How supply-chain attacks evolvedCampaigns targeting NPM package maintainersActionable defense strategiesBrandon Tirado: Director of Threat Research for ReliaQuest. A skilled cyber defense professional with a unique combination of management and hands-on experience. With a deep understanding of adversary motives and the tactics, techniques, and procedures (TTPs) they use to achieve their goals, Brand...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join hosts Brandon and Tehman as they discuss: The resurgence of LockBit 5.0 and its December 2025 surge in named organizationsHow top ransomware groups like Qilin, Akira, and Clop dominated in 2025.Actionable defense strategies for organizations to proactively combat ransomware in 2026Brandon Tirado: Director of Threat Research for ReliaQuest. Brandon is a skilled cyber defense professional with a unique combination of management and hands-on...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06)ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39)New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50)Holiday Season Attack Risks: Phishing, Ransomware, and Defense Recommendations (18:22)John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes i...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss: Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18)CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05)ShadyPanda Hackers Turn Millions of Browsers into Weapons (13:36)Storm-0249’s Shift to Targeted EDR Exploitation (20:09)John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14)Microsoft Teams Guest Access Phishing Bypass (3:37)Dark AI Tools Enhancing Threat Actors (6:08)Silver Fox’s Campaign: Chinese APT Spotlight (10:05)John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical backgrou...
Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13)China Manipulates AI for Initial Access (4:46)Cloud Gaps Bring IoT Takeover (7:29)2026 Cyber-Threat Predictions (10:57)Rafal Baran: IT security leader and CISO in the global reinsurance space. He focuses on building practical security and privacy ...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin TakeoverAkira Ransomware Targets Nutanix VMsSmart Redirects Evade Phishing DetectionThreat Hunter Hacks: SEO Hits HardListen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK la...
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden & Systems Security Engineer Corey as they discuss: Gootloader Returns Using SEO Poisoning (1:27)New Android Spyware LANDFALL (6:33)Curly COMrades Hide in Windows Using Linux VMs (10:57)Sector-by-Sector Cyber Trends Q3 2025 (15:20)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined Re...
Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12)Malicious NPM Packages (7:20)TruffleNet Attacks on AWS (10:53)The Danger of Over-Privileged Cloud Identities (15:36)Kim Bromley: Senior Cyber Threat Intelligence Anal...
loading
Comments (4)

Evan

record in higher volume

Feb 27th
Reply (1)

Evan

please record with louder volume. often listening on the move

Feb 21st
Reply

howaboutno

was this recorded in a cupboard?

Aug 8th
Reply