- Our Favorite Topics:
Incident Response: Are you ready?
2 min read
We created a short eBook to help security professionals deal with“what if” scenarios by building and strengthening incident response plans, thereby identifying what to do when things go wrong.
Five Things You Can Do to Manage Your Privacy Now
2 min read
The Internet of Things – the increasingly connected world in which we live – is rapidly expanding. We love our convenient and fun devices – like personal assistants, wearables, speakers, cameras, TVs, cars, home alarm systems, toys and appliances. But it’s important to understand that connected devices rely on information about us – such as […]
Threat Round Up for December 29 – January 5
1 min read
Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 29 and January 05. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]
Not So Crystal Clear – Zeus Variant Spoils Ukrainian Holiday
1 min read
Talos has observed a cyber attack which was launched using the official website of the Ukraine-based accounting software developer Crystal Finance Millennium (CFM).
Harnessing the Power of Network Meta Data: Finding Malware
2 min read
Probably not a day goes by without someone telling you about a new vulnerability or threat to your network and your data. These threats are seemingly everywhere. In order to protect against these threats, we use strong passwords and encryption. Unfortunately, our adversaries are getting the same messages as they continue to scoop up our […]
Introducing Exploit Prevention to Stop File-Less Attacks
3 min read
In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. Their latest tactic: use file-less attacks to exploit vulnerabilities in everyday applications.
The Impact on Network Security Through Encrypted Protocols – QUIC
3 min read
QUIC stands for Quick UDP Internet Connections, an experimental protocol designed and deployed by Google.
Defending Against The $5B Cybersecurity Threat – Business Email Compromise
3 min read
If an average employee at your company got an email from an executive with an urgent request, would they question whether the email was coming from the actual sender? They probably wouldn’t. The reality is that most people would act on the request because of its time-sensitive nature. They assume that the IT team has […]
Vulnerability Spotlight: VMWare VNC Vulnerabilities
1 min read
Today, Talos is disclosing a pair of vulnerabilities in the VNC implementation used in VMWare’s products that could result in code execution. VMWare implements VNC for its remote management, remote access, and automation purposes in VMWare products including Workstation, Player, and ESXi which share a common VMW VNC code base. The vulnerabilities manifest themselves in […]
Cisco Cybersecurity Viewpoints
Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more...
Why Cisco Security?
Explore our Products & Services