- Our Favorite Topics:
Vulnerability Spotlight: Multiple Adobe Acrobat DC Remote Code Execution Vulnerabilties
1 min read
Today, Talos is releasing details of a new vulnerabilities within Adobe Acrobat Reader DC that tricks a user into visiting a malicious web page.
Transparency and the CLOUD Act: The Importance of Evolving Transparency Reports
3 min read
Not only have we added new categories to our Transparency Report– such as the CLOUD Act – but we’ve also made enhancements to make it easier for our customers to read and interpret these requests.
Putting the “Active” Back in Proactive Security: Tabletop Exercises
4 min read
Security practitioners the impossible task of defending an ever-changing environment. Cisco Security Incident Response Services offers several proactive services to plan against new threats.
Threat Roundup for June 29 to July 6th
1 min read
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between June 29 and July...
Protecting against the latest LTE network attacks
2 min read
Recently, researchers have uncovered new attacks against the Long-Term Evolution (LTE) network protocol. LTE, a type of 4G network, is a mobile communications standard used by billions of devices...
Service Provider Digital Transformation and Security
3 min read
For many service providers, the digital transformation journey may not be the smoothest. Many service providers (SP) are going through a phase where they are either trying to understand the...
Cisco Visibility Casebooks: Saving You Time When You Need It Most
2 min read
Time is critical when facing an incoming attack. Security analysts and incident responders must quickly detect, investigate, understand, and react quickly to limit any potential damage.
Smoking Guns – Smoke Loader learned new tricks
1 min read
Cisco Talos has been tracking a new version of Smoke Loader — a malicious application that can be used to load other malware — for the past several months following...
Scaling Visibility and Security within the Operational Technology (OT) Environment
4 min read
Mid- to large-sized enterprises have for many years built the operational technology (OT) environment like an egg – a hard exterior protected by traditional security elements such as firewalls, IDS/IPS,...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services