- Our Favorite Topics:
Vulnerability Spotlight: Epee Levin Packet Deserialization Code Execution Vulnerability
1 min read
This vulnerability was discovered by Lilith (>_>) of Cisco Talos. Overview The Epee library, which is leveraged by a large number of cryptocurrencies, contains an exploitable code execution...
IDA-minsc Wins Second Place in Hex-Rays Plugins Contest
1 min read
Ali Rizvi-Santiago of Cisco Talos recently tied second place in the IDA plugin contest with a plugin named "IDA-minsc." IDA is a multi-processor disassembler and debugger created by...
Adwind Dodges AV via DDE
1 min read
his blog post is authored by Paul Rascagneres, Vitor Ventura and with the contribution of Tomislav Pericin from ReversingLabs. Introduction Cisco Talos, along with fellow cybersecurity firm ReversingLabs, recently discovered...
Threat Roundup for Sept 14 – 21
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21....
What’s in a Name? Cisco Visibility Is Now Cisco Threat Response
2 min read
Cisco Visibility is now Cisco Threat Response: a key part of our integrated security portfolio, designed to give you even more value from what you’ve already gotten from us.
3 Reasons to Upgrade from Cisco ASA to Cisco Firepower NGFW Today
3 min read
You have a Cisco ASA stateful firewall. You like it. It’s reliable. You think, “It works… if it ain’t broke, don’t fix it.” But you’ve had your ASA for years now, and during that time, threats have evolved.
Automated Policy & Segmentation Violation Alerting with Stealthwatch Cloud
2 min read
Stealthwatch Cloud is best known for network behavioral anomaly detection and entity modeling, but the level network visibility value it provides far exceeds these two capabilities. The underlying traffic dataset...
How Alliances Strengthen Your Cybersecurity Defenses
19 min read
Today Cisco is proud to announce 57 new technology integrations and 23 net-new vendor partners joining CSTA across all facets of security.
Cyber Threat Alliance Releases Cryptomining Whitepaper
1 min read
Despite the recent devaluation of some cryptocurrencies, illicit cryptocurrency miners remain a lucrative and widespread attack vector in the threat landscape. These miners are easy to deploy, and attackers see...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services