Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 295 followers

Latest posts

Last updated about 15 hours ago

Writing a BugSleep C2 server and detecting its traffic with Snort

about 15 hours ago

In June 2024, security researchers published their analysis of a novel implant...

How LLMs could help defenders write better and faster detection

5 days ago

Most users will associate large language models (LLMs) like ChatGPT with answering...

Talos IR trends Q3 2024: Identity-based operations loom large

7 days ago

Threat actors are increasingly conducting identity-based attacks across a range of operations...

Threat Spotlight: WarmCookie/BadSpace

8 days ago

WarmCookie is a malware family that emerged in April 2024 and has...

Highlighting TA866/Asylum Ambuscade Activity Since 2021

8 days ago

TA866 (also known as Asylum Ambuscade) is a threat actor that has...

Threat actor abuses Gophish to deliver new PowerRAT and DCRAT

9 days ago

Cisco Talos recently discovered a phishing campaign using an open-source phishing toolkit...

Akira ransomware continues to evolve

9 days ago

Akira continues to cement its position as one of the most prevalent...

What I’ve learned in my first 7-ish years in cybersecurity

13 days ago

When I first interviewed with Joel Esler for my position at Cisco...

UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants

14 days ago

By Dmytro Korzhevin, Asheer Malhotra, Vanja Svajcer and Vitor Ventura. Cisco Talos...

Protecting major events: An incident response blueprint

15 days ago

Ensuring the cybersecurity of major events — whether it’s sports, professional conferences...

What NIST’s latest password standards mean, and why the old ones weren’t working

20 days ago

Say goodbye to the days of using the “@” symbol to mean...

Ghidra data type archive for Windows driver functions

21 days ago

While reverse-engineering Windows drivers with Ghidra, it is common to encounter a...