Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 338 followers

Latest posts

Last updated 3 days ago

Remember, remember the fifth of November

3 days ago

Welcome to this week’s edition of the Threat Source newsletter. Ever heard...

Do robots dream of secure networking? Teaching cybersecurity to AI systems

3 days ago

This blog explores how to equip autonomous AI agents with cybersecurity knowledge...

TruffleHog, Fade In and BSAFE Crypto-C vulnerabilities

5 days ago

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in...

Trick, treat, repeat

10 days ago

Welcome to this week’s edition of the Threat Source newsletter. This one...

Dynamic binary instrumentation (DBI) with DynamoRio

10 days ago

This blog introduces dynamic binary instrumentation (DBI) and guides you through building...

Cybersecurity on a budget: Strategies for an economic downturn

11 days ago

During economic uncertainty, businesses face the challenge of maintaining strong cybersecurity while...

Uncovering Qilin attack methods exposed through multiple cases

13 days ago

In the second half of 2025, the ransomware group Qilin has continued...

Think passwordless is too complicated? Let's clear that up

16 days ago

By Janet Ho, Cisco DuoWhy passwords are still a problemWe’ve relied on...

Strings in the maze: Finding hidden strengths and gaps in your team

17 days ago

Welcome to this week’s edition of the Threat Source newsletter. “The truth...

IR Trends Q3 2025: ToolShell attacks dominate, highlighting criticality of segmentation and rapid response

17 days ago

Threat actors predominately exploited public-facing applications for initial access this quarter, with...

Reducing abuse of Microsoft 365 Exchange Online’s Direct Send

19 days ago

Overview Microsoft 365 Exchange Online’s Direct Send is designed to solve an...

Ransomware attacks and how victims respond

24 days ago

Welcome to this week’s edition of the Threat Source newsletter. I count...