Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 343 followers

Latest posts

Last updated 4 days ago

Using AI to defeat AI

4 days ago

Welcome to this week’s edition of the Threat Source newsletter.  Generative AI...

“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities

6 days ago

A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out...

Hand over the keys for Shannon’s shenanigans

11 days ago

Welcome to this week’s edition of the Threat Source newsletter.  Last week...

Ryan Liles, master of technical diplomacy

12 days ago

Cisco Talos is back with another inside look at the people who...

New threat actor, UAT-9921, leverages VoidLink framework in campaigns

13 days ago

Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in...

Microsoft Patch Tuesday for February 2026 — Snort rules and prominent vulnerabilities

13 days ago

Microsoft has released its monthly security update for February 2026, which includes...

All gas, no brakes: Time to come to AI church

18 days ago

Welcome to this week’s edition of the Threat Source newsletter.  Brothers and...

Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework

19 days ago

Cisco Talos uncovered “DKnife,” a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework...

I'm locked in!

25 days ago

Welcome to this week’s edition of the Threat Source newsletter.I’ve struggled a...

Microsoft releases update to address zero-day vulnerability in Microsoft Office

26 days ago

Microsoft has published three out-of-band (OOB) updates so far in January 2026...

Dissecting UAT-8099: New persistence mechanisms and regional focus

26 days ago

Cisco Talos has identified a new campaign by UAT-8099, active from late...

IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations

26 days ago

Threat actors predominately exploited public-facing applications for the second quarter in a...