
Malware Isn't Required—How Ransomware Groups Turn Legitimate RMMs Into a Weapon
Show notes
Resources: https://linktr.ee/ReliaQuestShadowTalk
Join hosts John and Tehman as they discuss:
- What attackers prefer over custom malware
- How signature-based detection fails
- Proactive governance vs. reactive triage
John Dilgen: Cyber Threat Intelligence Analyst at ReliaQuest, where he specializes in researching cyber threats impacting ReliaQuest customers. With a strong technical background, he previously served as an Incident Response Analyst and Trainer at ReliaQuest.
Tehman Tariq: Sr. Manager of Cyber Operations at ReliaQuest. He has spent a majority of my career leading our Incident Response, Security Architecture, and Detection teams. As well has working hand in hand with CISOs to introduce automation allowing for the maturity of their security programs.
← Previous
Ransomware vs. Exfiltration-Only—The Extortion Model Showdown
Next →
The 2026 Annual Threat Report Breakdown, Part 1 — How AI Contributes to Attacker Speed, and the Malware That's Winning