- Our Favorite Topics:
Vulnerability Spotlight: Simple DirectMedia Layer’s SDL2_Image
1 min read
Overview Talos is disclosing several vulnerabilities identified in Simple DirectMedia Layer's SDL2_Image library that could allow code execution. Simple DirectMedia Layer is a cross-platform development library designed to provide low...
Vulnerability Spotlight: Dovecot out-of-bounds Read Vulnerability
1 min read
Overview Today, Cisco Talos is disclosing a single out-of-bounds read vulnerability in the Dovecot IMAP server. Dovecot is a popular internet message access protocol, or IMAP, server...
Debunking the myths of DNS security
3 min read
For years, we’ve been pioneering the use of DNS to enforce security. We recognized that DNS was often a blind spot for organizations and that using DNS to enforce security...
CannibalRAT targets Brazil
1 min read
Malware continues to evolve in different ways and forms, one of which is the language it is written in, from Visual C++, to Powershell, almost everything has been used to...
The Power of Logging in Incident Response
4 min read
A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...
Curiosity, Exploration and Community – How I Paved my Own Path to a Cybersecurity Career
3 min read
I like to say that I didn’t really choose a career in cybersecurity – it chose me. The field naturally suits my personality, which has always been safety conscious. My...
Who Wasn’t Responsible for Olympic Destroyer?
1 min read
This blog post is authored by Paul Rascagneres and Martin Lee. Summary Evidence linking the Olympic Destroyer malware to a specific threat actor group is contradictory, and does not allow...
Vulnerability Spotlight: Adobe Acrobat Reader DC Document ID Remote Code Execution Vulnerability
1 min read
Talos is releasing details of a new vulnerability within Adobe Acrobat Reader DC.
Have Your Cake and Eat it Too With Next-Generation Endpoint Security from Cisco
2 min read
When faced with an either/or situation, people typically prefer not to choose. We want the best of both worlds. Rarely does someone want peanut butter OR jelly. Have cake? You...
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services