Cisco Blogs
Voice Search is currently unavailable
Powered by Google Web Speech API
We didn't hear that. Try again.
When autocomplete results are available use up and down arrows to review and enter to select

Talos

February 12, 2021

THREAT RESEARCH

Threat Roundup for February 5 to February 12

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between February 5 and February 12. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 29, 2021

THREAT RESEARCH

Threat Roundup for January 22 to January 29

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 22 and January 29. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 22, 2021

THREAT RESEARCH

Threat Roundup for January 15 to January 22

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 15 and January 22. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 15, 2021

THREAT RESEARCH

Threat Roundup for January 8 to January 15

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between January 8 and January 15. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

January 15, 2021

SECURITY

Election Security: A conversation with Matt Olney from Cisco Talos

5 min read

In advance of our third annual “Defending Against Critical Threats” report, a roundup of some the most impactful cyber attacks from the past 12 months, here is a preview of we an interview with Matt Olney, to capture his thoughts post-election.

December 21, 2020

THREAT RESEARCH

Talos Vulnerability Discovery Year in Review — 2020

1 min read

Cisco Talos' Systems Vulnerability Research Team discovered 231 vulnerabilities this year across a wide range of products. And thanks to our vendor partners, these vulnerabilities were patched and published before any attackers could exploit them. Mitigating possible zero-day breeches in your defenses is the easiest and fastest way to prevent wide-ranging and business-critical cyber attacks.

December 18, 2020

THREAT RESEARCH

Threat Roundup for December 11 to December 18

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 11 and December 18. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

December 11, 2020

THREAT RESEARCH

Threat Roundup for December 4 to December 11

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between December 4 and December 11. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are […]

December 4, 2020

THREAT RESEARCH

Threat Roundup for November 27 to December 4

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between November 27 and December 4. As with previous roundups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavioral characteristics, indicators of compromise, and discussing how our customers are automatically […]