Hazel embarks on a creative fitness journey, virtually crossing Middle-earth via The Conqueror app while sharing key cybersecurity insights. This article has been indexed from Cisco Talos Blog Read the original article: One newsletter to rule them all
Tag: Cisco Talos Blog
Microsoft Patch Tuesday for December 2025 — Snort rules and prominent vulnerabilities
The Patch Tuesday for December of 2025 includes 57 vulnerabilities, including two that Microsoft marked as “critical.” The remaining vulnerabilities listed are classified as “important.” Microsoft assessed that exploitation of the two “critical” vulnerabilities is “less likely.” This article has…
New BYOVD loader behind DeadLock ransomware attack
Cisco Talos has uncovered a new DeadLock ransomware campaign using a previously unknown BYOVD loader to exploit a Baidu Antivirus driver vulnerability, letting threat actors disable EDR defenses and escalate attacks. This article has been indexed from Cisco Talos Blog…
Socomec DIRIS Digiware M series and Easy Config, PDF XChange Editor vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed an out-of-bounds read vulnerability in PDF XChange Editor, and ten vulnerabilities in Socomec DIRIS Digiware M series and Easy Config products. The vulnerabilities mentioned in this blog post have been patched…
Your year-end infosec wrapped
Bill explores how our biggest mistakes can be the catalysts for growth that we need. This week’s newsletter promises stories, lessons, and a fresh perspective on failure. This article has been indexed from Cisco Talos Blog Read the original article:…
Spy vs. spy: How GenAI is powering defenders and attackers
Generative AI is rapidly transforming cybersecurity for both defenders and attackers. This blog highlights current uses, emerging threats, and the evolving landscape as capabilities advance. This article has been indexed from Cisco Talos Blog Read the original article: Spy vs.…
Dell ControlVault, Lasso, GL.iNet vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed five vulnerabilities in Dell ControlVault 3 firmware and its associated Windows software, four vulnerabilities in Entr'ouvert Lasso, and one vulnerability in GL.iNet Slate AX. The vulnerabilities mentioned in this blog post…
Care that you share
This holiday season, as teams run lean and cyber threats rise, being open with what — and how — you share can protect both information and relationships. This article has been indexed from Cisco Talos Blog Read the original article:…
It’s not personal, it’s just business
Martin muses on how agentic AI is bringing efficiency improvements to the business of cyber crime. This article has been indexed from Cisco Talos Blog Read the original article: It’s not personal, it’s just business
Bill Largent: On epic reads, lifelong learning, and empathy
Join Bill Largent as he shares his passion for learning, the connection between reading and empathy, and offers fresh insights for the next generation of security professionals. This article has been indexed from Cisco Talos Blog Read the original article:…
New in Snort3: Enhanced rule grouping for greater flexibility and control
Today, Cisco Talos is introducing new capabilities for Snort3 users within Cisco Secure Firewall to give you greater flexibility in how you manage, organize, and prioritize detection rules. This article has been indexed from Cisco Talos Blog Read the original…
Viasat and the terrible, horrible, no good, very bad day
In this week’s newsletter, Amy recounts her journey from Halloween festivities to unraveling the story of the 2022 Viasat satellite hack, with plenty of cybersecurity surprises along the way. This article has been indexed from Cisco Talos Blog Read the…
Unleashing the Kraken ransomware group
In August 2025, Cisco Talos observed big-game hunting and double extortion attacks carried out by Kraken, a Russian-speaking group that has emerged from the remnants of the HelloKitty ransomware cartel. This article has been indexed from Cisco Talos Blog Read…
Microsoft Patch Tuesday for November 2025 — Snort rules and prominent vulnerabilities
Microsoft has released its monthly security update for November 2025, which includes 63 vulnerabilities affecting a range of products, including 5 that Microsoft marked as “critical.” This article has been indexed from Cisco Talos Blog Read the original article: Microsoft…
Remember, remember the fifth of November
This edition, Hazel explores the origins of Guy Fawkes Day and how heeding an anonymous warning prevented an assassination. This article has been indexed from Cisco Talos Blog Read the original article: Remember, remember the fifth of November
Do robots dream of secure networking? Teaching cybersecurity to AI systems
This blog demonstrates a proof of concept using LangChain and OpenAI, integrated with Cisco Umbrella API, to provide AI agents with real-time threat intelligence for evaluating domain dispositions. This article has been indexed from Cisco Talos Blog Read the original…
TruffleHog, Fade In and BSAFE Crypto-C vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities in Dell BSAFE, two in Fade In screenwriting software, and one in Trufflehog The vulnerabilities mentioned in this blog post have been patched by their respective vendors, all in…
Trick, treat, repeat
Thor gets into the Halloween spirit, sharing new CVE trends, a “treat” for European Windows 10 users, and a reminder that patching is your best defense against zombie vulnerabilities. This article has been indexed from Cisco Talos Blog Read the…
Dynamic binary instrumentation (DBI) with DynamoRio
Learn how to build your own dynamic binary instrumentation (DBI) tool with open-source DynamoRIO to enable malware analysis, security auditing, reverse engineering, and more. This article has been indexed from Cisco Talos Blog Read the original article: Dynamic binary instrumentation…
Cybersecurity on a budget: Strategies for an economic downturn
This blog offers practical strategies, creative defenses, and talent management advice to help your business stay secure when every dollar counts. This article has been indexed from Cisco Talos Blog Read the original article: Cybersecurity on a budget: Strategies for…