Category: Cisco Talos Blog

TP-Link, Canva, HikVision vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence…

A puppet made me cry and all I got was this t-shirt

In this week’s newsletter, Amy draws parallels between the collaborative themes of “Project Hail Mary” and the massive team effort behind the newly released Talos Year in Review report. This article has been indexed from Cisco Talos Blog Read the…

Talos Takes: 2025 insights from Talos and Splunk

This episode of Talos Takes breaks down the 2025 Year in Review as well as Splunk’s Top 50 Cybersecurity Threats report. This article has been indexed from Cisco Talos Blog Read the original article: Talos Takes: 2025 insights from Talos…

2025 Talos Year in Review: Speed, scale, and staying power

The 2025 Talos Year in Review is available now. Understand evolving adversary playbooks and how to strengthen your organization’s defenses. This article has been indexed from Cisco Talos Blog Read the original article: 2025 Talos Year in Review: Speed, scale,…

2025 Talos Year in Review: Speed, scale, and staying power

The 2025 Talos Year in Review is available now. Understand evolving adversary playbooks and how to strengthen your organization’s defenses. This article has been indexed from Cisco Talos Blog Read the original article: 2025 Talos Year in Review: Speed, scale,…

You have to invite them in

While a garlic and wooden stakes keep the vampires at bay in movies, they won’t save your network once an attacker has been “invited in.” Discover why identity is the new frontier of cyber horror in this week’s edition. This…

Transparent COM instrumentation for malware analysis

In this article, Cisco Talos presents DispatchLogger, a new open-source tool that delivers high visibility into late-bound IDispatch COM object interactions via transparent proxy interception. This article has been indexed from Cisco Talos Blog Read the original article: Transparent COM instrumentation for malware analysis

This one’s for you, Mom

This week, Joe talks about allyship and how being aware of an issue is the first step in helping to fix it. This article has been indexed from Cisco Talos Blog Read the original article: This one’s for you, Mom

DirectX, OpenFOAM, Libbiosig vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed vulnerabilities in the BioSig Project Libbiosig library and OpenCFD OpenFOAM, as well as an unpatched vulnerability in Microsoft DirectX. The vulnerabilities mentioned in this blog post have been patched by their…

Spinning complex ideas into clear docs with Kri Dontje

The episode features Kri Dontje discussing her role in translating complex technical cybersecurity topics into clear, accessible documentation, emphasizing the importance of consistency, accuracy, and collaboration with subject matter experts. This article has been indexed from Cisco Talos Blog Read…

Patch, track, repeat: The 2025 CVE retrospective

Thor analyzes CVE data from 2025 and provides recommendations for where and how organizations should strengthen their defenses. This article has been indexed from Cisco Talos Blog Read the original article: Patch, track, repeat: The 2025 CVE retrospective

Talos on the developing situation in the Middle East

Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict. This article has been indexed from Cisco Talos Blog Read the…

Henry IV, Hotspur, Hal, and hallucinations

In this edition of the Threat Source newsletter, William draws parallels between Shakespeare’s Hotspur and the challenges of cybersecurity and AI, emphasizing the importance of risk-taking, learning from failure, and surrounding yourself with smart people. This article has been indexed…