Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 295 followers

Latest posts

Last updated 5 days ago

NVIDIA shader out-of-bounds and eleven LevelOne router vulnerabilities

5 days ago

Cisco Talos' Vulnerability Research team recently discovered five Nvidia out-of-bounds access vulnerabilities...

Threat actors use copyright infringement phishing lure to deploy infostealers

5 days ago

Cisco Talos has observed an unknown threat actor conducting a phishing campaign...

Writing a BugSleep C2 server and detecting its traffic with Snort

6 days ago

In June 2024, security researchers published their analysis of a novel implant...

How LLMs could help defenders write better and faster detection

11 days ago

Most users will associate large language models (LLMs) like ChatGPT with answering...

Talos IR trends Q3 2024: Identity-based operations loom large

12 days ago

Threat actors are increasingly conducting identity-based attacks across a range of operations...

Threat Spotlight: WarmCookie/BadSpace

13 days ago

WarmCookie is a malware family that emerged in April 2024 and has...

Highlighting TA866/Asylum Ambuscade Activity Since 2021

13 days ago

TA866 (also known as Asylum Ambuscade) is a threat actor that has...

Threat actor abuses Gophish to deliver new PowerRAT and DCRAT

14 days ago

Cisco Talos recently discovered a phishing campaign using an open-source phishing toolkit...

Akira ransomware continues to evolve

15 days ago

Akira continues to cement its position as one of the most prevalent...

What I’ve learned in my first 7-ish years in cybersecurity

18 days ago

When I first interviewed with Joel Esler for my position at Cisco...

UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants

19 days ago

By Dmytro Korzhevin, Asheer Malhotra, Vanja Svajcer and Vitor Ventura. Cisco Talos...

Protecting major events: An incident response blueprint

20 days ago

Ensuring the cybersecurity of major events — whether it’s sports, professional conferences...