Everything you care about in one place

Follow feeds: blogs, news, RSS and more. An effortless way to read and digest content of your choice.

Get Feeder

feedburner.com

Talos Blog

Get the latest updates from Talos Blog directly as they happen.

Follow now 294 followers

Latest posts

Last updated 3 days ago

What I’ve learned in my first 7-ish years in cybersecurity

3 days ago

When I first interviewed with Joel Esler for my position at Cisco...

UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants

3 days ago

By Dmytro Korzhevin, Asheer Malhotra, Vanja Svajcer and Vitor Ventura. Cisco Talos...

Protecting major events: An incident response blueprint

4 days ago

Ensuring the cybersecurity of major events — whether it’s sports, professional conferences...

What NIST’s latest password standards mean, and why the old ones weren’t working

10 days ago

Say goodbye to the days of using the “@” symbol to mean...

Ghidra data type archive for Windows driver functions

10 days ago

While reverse-engineering Windows drivers with Ghidra, it is common to encounter a...

Vulnerability in popular PDF reader could lead to arbitrary code execution; Multiple issues in GNOME project

11 days ago

Cisco Talos’ Vulnerability Research team recently disclosed six new security vulnerabilities across...

Largest Patch Tuesday since July includes two exploited in the wild, three critical vulnerabilities

12 days ago

The largest Microsoft Patch Tuesday since July includes two vulnerabilities that have...

CISA is warning us (again) about the threat to critical infrastructure networks

17 days ago

Government-run water systems and other critical infrastructure are still at risk from...

Threat actor believed to be spreading new MedusaLocker variant since 2022

17 days ago

Cisco Talos has discovered a financially motivated threat actor, active since 2022...

Are hardware supply chain attacks “cyber attacks?”

24 days ago

The recent attacks in the Middle East triggering explosions on pagers has...

Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam

24 days ago

Attackers are abusing normal features of legitimate web sites to transmit spam...

Talos discovers denial-of-service vulnerability in Microsoft Audio Bus; Potential remote code execution in popular open-source PLC

25 days ago

Cisco Talos’ Vulnerability Research team recently disclosed two vulnerabilities in Microsoft products...