- Our Favorite Topics:
Security that works together: Signal Sciences and Cisco Threat Response
2 min read
Signal Sciences is a leading web application security company. Through collaboration, we have combined the powers of Cisco Threat Response and Signal Sciences.
Threat Roundup for April 12 to April 19
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Apr. 12 and Apr. 19. As with previous roundups, this post isn't meant to be an...
Email – From Novelty to Nefarious
6 min read
How a revolutionary technology was usurped for evil, and what we can do about it Since its inception, email has gone from a novelty, to a necessity, to at...
DNS Hijacking Abuses Trust In Core Internet Service
1 min read
This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle East and...
To the Depth of TLS Invisibility and Beyond
3 min read
Encrypted traffic is changing the threat landscape...Encryption technology enables greater privacy and security to communicate and transact business online. Mobile, cloud, and web applications rely on well-implemented encryption mechanisms, using keys and certificates, to ensure confidentiality and trust.
Cryptographic Visibility: Quality Encryption at Your Fingertips
3 min read
There is only one thing more important than the right answer, and that is asking the right question. I have spent my entire career doing security analytics and all of...
Kill Complexity with Cisco Defense Orchestrator
2 min read
Managing security policies is complex and time-consuming, especially when your network has multiple firewalls deployed across many locations. Cisco Defense Orchestrator is here to make your job easier.
New HawkEye Reborn Variant Emerges Following Ownership Change
1 min read
HawkEye is another example of malware being marketed across various hacking forums. Talos observed ongoing malware distribution campaigns attempting to leverage the latest version of the HawkEye keylogger/stealer, HawkEye Reborn v9, against organizations to steal sensitive information and account credentials for use in additional attacks and account compromise.
Vulnerability Spotlight: Multiple vulnerabilities in Shimo VPN’s helper tool
1 min read
Cisco Talos is disclosing a series of vulnerabilities found in the Shimo VPN Helper Tool. Shimo VPN is a popular VPN client for MacOS that can be used to connect...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services
2