Category: Cisco Talos Blog

Your year-end infosec wrapped

Bill explores how our biggest mistakes can be the catalysts for growth that we need. This week’s newsletter promises stories, lessons, and a fresh perspective on failure. This article has been indexed from Cisco Talos Blog Read the original article:…

Spy vs. spy: How GenAI is powering defenders and attackers

Generative AI is rapidly transforming cybersecurity for both defenders and attackers. This blog highlights current uses, emerging threats, and the evolving landscape as capabilities advance. This article has been indexed from Cisco Talos Blog Read the original article: Spy vs.…

Dell ControlVault, Lasso, GL.iNet vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed five vulnerabilities in Dell ControlVault 3 firmware and its associated Windows software, four vulnerabilities in Entr'ouvert Lasso, and one vulnerability in GL.iNet Slate AX. The vulnerabilities mentioned in this blog post…

Care that you share

This holiday season, as teams run lean and cyber threats rise, being open with what — and how — you share can protect both information and relationships. This article has been indexed from Cisco Talos Blog Read the original article:…

It’s not personal, it’s just business

Martin muses on how agentic AI is bringing efficiency improvements to the business of cyber crime. This article has been indexed from Cisco Talos Blog Read the original article: It’s not personal, it’s just business

Viasat and the terrible, horrible, no good, very bad day

In this week’s newsletter, Amy recounts her journey from Halloween festivities to unraveling the story of the 2022 Viasat satellite hack, with plenty of cybersecurity surprises along the way. This article has been indexed from Cisco Talos Blog Read the…

Unleashing the Kraken ransomware group

In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware cartel. This article has been indexed from Cisco Talos Blog Read…

Remember, remember the fifth of November

This edition, Hazel explores the origins of Guy Fawkes Day and how heeding an anonymous warning prevented an assassination. This article has been indexed from Cisco Talos Blog Read the original article: Remember, remember the fifth of November

TruffleHog, Fade In and BSAFE Crypto-C vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Dell BSAFE, two in Fade In screenwriting software, and one in Trufflehog  The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in…

Trick, treat, repeat

Thor gets into the Halloween spirit, sharing new CVE trends, a “treat” for European Windows 10 users, and a reminder that patching is your best defense against zombie vulnerabilities. This article has been indexed from Cisco Talos Blog Read the…

Dynamic binary instrumentation (DBI) with DynamoRio

Learn how to build your own dynamic binary instrumentation (DBI) tool with open-source DynamoRIO to enable malware analysis, security auditing, reverse engineering, and more. This article has been indexed from Cisco Talos Blog Read the original article: Dynamic binary instrumentation…

Uncovering Qilin attack methods exposed through multiple cases

Cisco Talos investigated the Qilin ransomware group, uncovering its frequent attacks on the manufacturing sector, use of legitimate tools for credential theft and data exfiltration, and sophisticated methods for lateral movement, evasion, and persistence. This article has been indexed from…