Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12)Malicious NPM Packages (7:20)TruffleNet Attacks on AWS (10:53)The Danger of Over-Privileged Cloud Identities (15:36)Kim Bromley: Senior Cyber Threat Intelligence Anal...
Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John & Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15)Qilin Deploys Cross-Platform Attacks (4:21)Lazarus Group Reignites Operation DreamJob (9:05)Threat Hunter Hacks: Active Cyber Threats in M&A (15:19)Kim Bromley: Senior Cyber Threat Intellig...
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John & former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42)North Korean Attacker Adopts EtherHiding (7:53)Phishing Attacks Target LastPass (12:11)Fighting Ransomware Automation: A CISO's Guide (17:19)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQ...
Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13)New Oracle E-business Suite Flaw (5:19)GitHub CamoLeak AI Attack (7:46)Year-Long Flax Typhoon ArcGIS Campaign (11:23)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 follo...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09)Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27)Shutdown Threatens US Intel Sharing and Cyber Defense (10:02)Ransomware and Cyber Extortion in Q3 2025 (15:02)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts Alex and Hayden as they discuss: Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17)Storm-1849 Targeting Cisco ASA Devices (4:38)Medusa Attempts to Pay Reporter for Initial Access (7:00)Debate Over Government Zero-Day Stockpiling (14:41)Joseph Keyes: Cyber Threat Intelligence Analyst at ReliaQuest, specializing in technical cyber threat research. With his prior role as a Cyber Security Anal...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts John and Joey as they discuss: Summer 2025 Attacker Trends (13:41)Self-Replicating 'Shai-hulud' Worm Targeting NPM Packages (1:05)Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49)Phishing Round Up: File Fix Campaign and Microsoft's RaccoonO365 Takedown (7:12)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 ...
Host, Kim, alongside ReliaQuest's Threat Research experts, cut through the noise to bring you the cyber insights that matter most. Get news, research and actionable strategies from industry leaders, to help you stay ahead of attackers. New episodes every Wednesday at 1pm EST.
Resources: https://linktr.ee/ReliaQuestShadowTalk Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey & systems security engineer Corey as they discuss: SAP S/4HANA Flaw Exploitation (2:09)AI-Powered Malware Exposes GitHub (4:24)APT28 Outlook Backdoor hits NATO (8:21)ReliaQuest Experts Answer Your Questions (11:55)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 202...
Resources: https://linktr.ee/ReliaQuestShadowTalk Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John & detection engineer Marken as they discuss: Salesloft Drift Tokens Result in Salesforce Data Theft (1:31)Storm-0501 Shifts Ransomware Attacks to Cloud (6:36)APT29 Microsoft 365 Campaign Disrupted (11:26)Axios, Direct Send Abuse Redefine Phishing (14:19)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Te...
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John & Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40)Hackers Abuse Linux Files to Drop Malware (3:50)Silk Typhoon Attacks Cloud Supply Chains (7:21)ReliaQuest Uncovers Cybercriminals' Most Sought After Skills (11:02)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ...
Resources: https://linktr.ee/ReliaQuestShadowTalk Intrigued by Warlock ransomware's Chinese connection? Join host Kim along with intelligence analysts Joey & John as they discuss: \Warlock Ransomware Attacks Against Telecoms (3:12)New FortiSIEM Flaw Exploited in the Wild (5:19)Man-in-the-Prompt Attack Steals Data from LLMs (8:04)How ReliaQuest Tracks Ransomware Groups and Evolving Cyber Threats (12:36)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research ...
Resources: https://linktr.ee/ReliaQuestShadowTalk Want to know if ShinyHunters and Scattered Spider are really working together? Join host Kim along with detection engineer Marken as they discuss: WinRAR Zero-Day Exploited in RomCom Attacks (1:44)New EDR Killer Popular with Ransomware Groups (4:30)Data Breach Reveal Kimsuky Inner Workings (11:31)ReliaQuest Uncovers Potential ShinyHunters x Scattered Spider Collaboration (15:00)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the Relia...
Akira ransomware group is exploiting potential zero-day vulnerabilities, and digital risk protection (DRP) threats are rapidly evolving. Join host Joey, along with intelligence analysts John and Hayden, as they dive into: Akira Ransomware Exploiting a Potential Zero DayPlague Backdoor Emerges as Silent IntruderEvolving Tactics of North Korean AttackerDRP Threats Surge Amid Organizational GrowthResources: https://linktr.ee/ReliaQuestShadowTalk Joseph Keyes: Joseph Keyes is a Cyber Threat Intel...
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28)Warlock Ransomware Hits SharePoint (5:28)Fire Ant Stings ESXi (9:39)ReliaQuest Uncovers CrushFTP Attack Chain (13:35Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in ...
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34)LameHug AI-Powered Malware (5:55)UK Bans Ransomware Payments (9:44)AI Tactics Behind the Latest Cyber Threats (14:11)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career ...
Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25)Chatbot Exposes Thousands of Job Applications (4:57)New Phishing Campaign Targets VIPs (7:17)How IOCs are Used in Modern Threat Hunting (10:07)Kim Bromley: Kim Bromley is a Threat Intelligence Analyst on the ReliaQue...
Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16)Updates on Iran-Israel (5:43)North Korea Adopts ClickFix & Attacks Web3 (8:24)Insights from ReliaQuest Customer Incidents (13:14)Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2Scattered Spider Hits Aviation From ClickFix to FileFixRansomware Threats from Q2Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024. Kim brings a wealth of experience in threat intell...
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack ChainIsrael and Iran Cyber Threat Deep DiveTop Iran-linked Threat Groups & How to MitigateKim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June 2020 following a 10-year career in UK law enforcement, and has acted as host since 2024. Kim brings a w...
Evan
record in higher volume
Evan
please record with louder volume. often listening on the move
howaboutno
was this recorded in a cupboard?