security vulnerabilities

June 19, 2024

HIGH TECH POLICY

European Cyber Resilience: How the EU Can Patch the Weak Spots in its Collective Armour

3 min read

This blog delves into two crucial issues for EU policymakers to enhance Europe's cyber resilience: unsupported connected devices within critical infrastructure networks and the handling of discovered vulnerabilities by government agencies.

March 26, 2021

THREAT RESEARCH

Threat Roundup for March 19 to March 26

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 19 and March 26. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

March 19, 2021

THREAT RESEARCH

Threat Roundup for March 12 to March 19

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 12 and March 19. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

March 12, 2021

THREAT RESEARCH

Threat Roundup for March 5 to March 12

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between March 5 and March 12. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

March 5, 2021

THREAT RESEARCH

Threat Roundup for February 26 to March 5

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between February 26 and March 5. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically protected from these threats.

February 19, 2021

THREAT RESEARCH

Threat Roundup for February 12 to February 19

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 12 and February 19. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

February 12, 2021

THREAT RESEARCH

Threat Roundup for February 5 to February 12

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 5 and February 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 29, 2021

THREAT RESEARCH

Threat Roundup for January 22 to January 29

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 22 and January 29. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 22, 2021

THREAT RESEARCH

Threat Roundup for January 15 to January 22

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 15 and January 22. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]