Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 333 followers

Latest posts

Last updated about 5 hours ago

Proactive threat hunting with Talos IR

about 6 hours ago

At Cisco Talos, we understand that effective cybersecurity isn’t just about responding...

Understanding the challenges of securing an NGO

5 days ago

Welcome to this week’s edition of the Threat Source newsletter. Recently, I...

State-of-the-art phishing: MFA bypass

5 days ago

Cybercriminals are bypassing multi-factor authentication (MFA) using adversary-in-the-middle (AiTM) attacks via reverse...

Year in Review: AI based threats

7 days ago

2024 wasn't the year that AI rewrote the cybercrime playbook — but...

IR Trends Q1 2025: Phishing soars as identity-based attacks persist

8 days ago

Phishing attacks spiked this quarter as threat actors leveraged this method of...

Lessons from Ted Lasso for cybersecurity success

12 days ago

Welcome to this week’s edition of the Threat Source newsletter. "Be curious...

Introducing ToyMaker, an Initial Access Broker working in cahoots with double extortion gangs

13 days ago

In 2023, Cisco Talos discovered an extensive compromise in a critical infrastructure...

Year in Review: Attacks on identity and MFA

14 days ago

For our third focussed topic for Talos' 2024 Year in Review, we...

Care what you share

19 days ago

Welcome to this week’s edition of the Threat Source newsletter. As we...

Unmasking the new XorDDoS controller and infrastructure

19 days ago

Cisco Talos observed an existing distributed denial-of-service (DDoS) malware known as XorDDoS...

Eclipse and STMicroelectronics vulnerabilities

20 days ago

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities found...

Year in Review: The biggest trends in ransomware

21 days ago

This week, our Year in Review spotlight is on ransomware—where low-profile tactics...