threats

December 9, 2020

THREAT RESEARCH

FireEye Breach Detection Guidance

1 min read

Cyber security firm FireEye recently disclosed an incident that was reported to have resulted in the inadvertent disclosure of various internally developed offensive security tools (OSTs) that were used across FireEye red-team engagements. Some of these tools appear to be based on well-known offensive frameworks like Cobalt Strike. This is even evident in the naming […]

July 16, 2020

SECURITY

Creating more opportunities for others in cybersecurity

2 min read

We have some important discussions in our latest Security Stories podcast. Andy Ellis joins us to talk about representation and diversity in the cybersecurity industry, and Noureen Njoroge speaks about the huge benefits of mentoring women in IT.

April 17, 2019

THREAT RESEARCH

DNS Hijacking Abuses Trust In Core Internet Service

1 min read

This blog post discusses the technical details of a state-sponsored attack manipulating DNS systems. While this incident is limited to targeting primarily national security organizations in the Middle East and...

September 28, 2018

THREAT RESEARCH

Threat Roundup Sept 21 – 28

1 min read

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 21 and 28....

September 22, 2018

THREAT RESEARCH

Threat Roundup for Sept 14 – 21

1 min read

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Sept. 14 and 21....

July 26, 2018

SECURITY

Using machine learning to target threats

3 min read

This blog post begins with a joke about two people in a forest and a bear. A bear appears out of nowhere and starts to chase these two guys during...

April 11, 2018

SECURITY

3 Non-Negotiables for an Effective Data Center Security & Workload Protection Strategy

4 min read

We know that big data is big business… And the use of on-premises and public cloud infrastructure is growing, according to the Cisco 2018 Security Capabilities Benchmark...

April 14, 2017

THREAT RESEARCH

Threat Round-up for Apr 7 – Apr 14

1 min read

Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 7 and April 14. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our customers are automatically […]

December 20, 2016

THREAT RESEARCH

IEC 104 Protocol Detection Rules

1 min read

IEC 60870-5-104 Protocol Detection Rules Cisco Talos has released 33 Snort rules which are used to analyze/inspect IEC 60870-5-104 network traffic. These rules will help Industrial Control Systems/Supervisory Control and...