Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 343 followers

Latest posts

Last updated 1 day ago

Using AI to defeat AI

1 day ago

Welcome to this week’s edition of the Threat Source newsletter.  Generative AI...

“Good enough” emulation: Fuzzing a single thread to uncover vulnerabilities

3 days ago

A Cisco Talos researcher worked around the limitations of hardware-level Code Read-out...

Hand over the keys for Shannon’s shenanigans

8 days ago

Welcome to this week’s edition of the Threat Source newsletter.  Last week...

Ryan Liles, master of technical diplomacy

9 days ago

Cisco Talos is back with another inside look at the people who...

New threat actor, UAT-9921, leverages VoidLink framework in campaigns

10 days ago

Cisco Talos recently discovered a new threat actor, UAT-9921, leveraging VoidLink in...

Microsoft Patch Tuesday for February 2026 — Snort rules and prominent vulnerabilities

10 days ago

Microsoft has released its monthly security update for February 2026, which includes...

All gas, no brakes: Time to come to AI church

15 days ago

Welcome to this week’s edition of the Threat Source newsletter.  Brothers and...

Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework

16 days ago

Cisco Talos uncovered “DKnife,” a fully featured gateway-monitoring and adversary-in-the-middle (AitM) framework...

I'm locked in!

22 days ago

Welcome to this week’s edition of the Threat Source newsletter.I’ve struggled a...

Microsoft releases update to address zero-day vulnerability in Microsoft Office

23 days ago

Microsoft has published three out-of-band (OOB) updates so far in January 2026...

Dissecting UAT-8099: New persistence mechanisms and regional focus

23 days ago

Cisco Talos has identified a new campaign by UAT-8099, active from late...

IR Trends Q4 2025: Exploitation remains dominant, phishing campaign targets Native American tribal organizations

23 days ago

Threat actors predominately exploited public-facing applications for the second quarter in a...