Tag: Cisco Talos Blog

2025 Talos Year in Review: Speed, scale, and staying power

The 2025 Talos Year in Review is available now. Understand evolving adversary playbooks and how to strengthen your organization’s defenses. This article has been indexed from Cisco Talos Blog Read the original article: 2025 Talos Year in Review: Speed, scale,…

2025 Talos Year in Review: Speed, scale, and staying power

The 2025 Talos Year in Review is available now. Understand evolving adversary playbooks and how to strengthen your organization’s defenses. This article has been indexed from Cisco Talos Blog Read the original article: 2025 Talos Year in Review: Speed, scale,…

You have to invite them in

While a garlic and wooden stakes keep the vampires at bay in movies, they won’t save your network once an attacker has been “invited in.” Discover why identity is the new frontier of cyber horror in this week’s edition. This…

Transparent COM instrumentation for malware analysis

In this article, Cisco Talos presents DispatchLogger, a new open-source tool that delivers high visibility into late-bound IDispatch COM object interactions via transparent proxy interception. This article has been indexed from Cisco Talos Blog Read the original article: Transparent COM instrumentation for malware analysis

This one’s for you, Mom

This week, Joe talks about allyship and how being aware of an issue is the first step in helping to fix it. This article has been indexed from Cisco Talos Blog Read the original article: This one’s for you, Mom

DirectX, OpenFOAM, Libbiosig vulnerabilities

Cisco Talos’ Vulnerability Discovery & Research team recently disclosed vulnerabilities in the BioSig Project Libbiosig library and OpenCFD OpenFOAM, as well as an unpatched vulnerability in Microsoft DirectX. The vulnerabilities mentioned in this blog post have been patched by their…

Spinning complex ideas into clear docs with Kri Dontje

The episode features Kri Dontje discussing her role in translating complex technical cybersecurity topics into clear, accessible documentation, emphasizing the importance of consistency, accuracy, and collaboration with subject matter experts. This article has been indexed from Cisco Talos Blog Read…

Patch, track, repeat: The 2025 CVE retrospective

Thor analyzes CVE data from 2025 and provides recommendations for where and how organizations should strengthen their defenses. This article has been indexed from Cisco Talos Blog Read the original article: Patch, track, repeat: The 2025 CVE retrospective

Talos on the developing situation in the Middle East

Cisco Talos continues to monitor the ongoing conflict in the Middle East. As always, we will be watching closely for any cyber-related incidents that are tied to the conflict. This article has been indexed from Cisco Talos Blog Read the…

Henry IV, Hotspur, Hal, and hallucinations

In this edition of the Threat Source newsletter, William draws parallels between Shakespeare’s Hotspur and the challenges of cybersecurity and AI, emphasizing the importance of risk-taking, learning from failure, and surrounding yourself with smart people. This article has been indexed…

Active exploitation of Cisco Catalyst SD-WAN by UAT-8616

Cisco Talos is tracking the active exploitation of CVE-2026-20127, a vulnerability in Cisco Catalyst SD-WAN Controller, formerly vSmart, that allows an unauthenticated remote attacker to bypass authentication and obtain administrative privileges. This article has been indexed from Cisco Talos Blog…

Using AI to defeat AI

In this week’s newsletter Martin considers how defenders can turn offensive AI tools against themselves. This article has been indexed from Cisco Talos Blog Read the original article: Using AI to defeat AI