Category: Cisco Talos Blog

[Video] The TTP Ep. 22: The Collapse of the Patch Window

In this episode of The Talos Threat Perspective, we discuss how vulnerability exploitation is accelerating, and why attacker speed, AI, and exposed systems are affecting the patch window. This article has been indexed from Cisco Talos Blog Read the original…

The threat hunter’s gambit

Bill discusses why obsessing over strategy games is actually a secret weapon to outsmart threat actors. This article has been indexed from Cisco Talos Blog Read the original article: The threat hunter’s gambit

Year in Review: Vulnerabilities old and new and something React2

The year was characterized by an unending beat-down on infrastructure that relied on older enmeshed dependencies (e.g., Log4j and PHPUnit), while React2Shell rocketed to the highest percentage of attacks for the entire year within the last three weeks of 2025. This article has been…

Axios NPM supply chain incident

Overview of the recent Axios NPM supply chain incident including details of the payloads delivered from actor-controlled infrastructure. This article has been indexed from Cisco Talos Blog Read the original article: Axios NPM supply chain incident

Do not get high(jacked) off your own supply (chain)

In the span of just a few weeks, we have observed a dizzying array of major supply chain attacks. Prominent examples include the malicious modification of Axios, a popular HTTP client library for JavaScript, as well as cascading compromises from…

Axois NPM Supply Chain Incident

Overview of the recent Axios NPM supply chain incident including details of the payloads delivered from actor-controlled infrastructure. This article has been indexed from Cisco Talos Blog Read the original article: Axois NPM Supply Chain Incident

Qilin EDR killer infection chain

This blog provides an in-depth analysis of the malicious “msimg32.dll” used in Qilin ransomware attacks, which is a multi-stage infection chain targeting EDR systems. This article has been indexed from Cisco Talos Blog Read the original article: Qilin EDR killer…

Ransomware in 2025: Blending in is the strategy

A summary of the top ransomware trends from the Talos 2025 Year in Review, with a focus on identity, attacker tactics, and practical defenses. This article has been indexed from Cisco Talos Blog Read the original article: Ransomware in 2025:…

TP-Link, Canva, HikVision vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed a vulnerability in HikVision, as well as 10 in TP-Link, and 19 in Canva. The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in adherence…

A puppet made me cry and all I got was this t-shirt

In this week’s newsletter, Amy draws parallels between the collaborative themes of “Project Hail Mary” and the massive team effort behind the newly released Talos Year in Review report. This article has been indexed from Cisco Talos Blog Read the…