Cisco Talos

Cisco's premiere source of threat intelligence, including a world-class Incident Response team. blog.talosintelligence.com/

2025-06-25

Talos is seeing cybercriminals utilize uncensored LLMs, develop their own malicious AI and "jailbreak" existing ones to bypass safety measures, resulting in campaigns that are harder to detect: blog.talosintelligence.com/cyb

2025-06-18

Thor’s week off turned into a wild ride with some unexpected lessons in cybersecurity usability. Plus, Cisco Talos uncovers new phishing campaigns by North Korean-aligned threat actors: blog.talosintelligence.com/a-w

2025-06-18

Attackers are increasingly using your own legitimate IT tools to hide in plain sight. Learn how to spot them before they cause damage in our latest blog: blog.talosintelligence.com/whe

2025-06-18

Famous Chollima, a North Korean-aligned threat actor, is targeting cryptocurrency/blockchain professionals (primarily in India) with the new PylangGhost RAT, a Python-based equivalent to their GolangGhost RAT. Learn how these attacks work: blog.talosintelligence.com/pyt

2025-06-12

In this week's newsletter, Bill explains why knowing yourself and knowing your environment are the ultimate tools in staying ahead of cyber threats. Don’t let the bad guys learn your environment better than you: blog.talosintelligence.com/kno

2025-06-11

Cisco Talos uncovered zero-day vulnerabilities in catdoc, plus vulnerabilities in Parallel, NVIDIA, and High-Logic FontCreator 15—all now patched:
blog.talosintelligence.com/cat

2025-06-05

In this week’s Threat Source newsletter, Martin reflects on the fact that no one is too small to be a target for cybercriminals. Catch the full issue here: blog.talosintelligence.com/eve

2025-06-05

In this week's Talos Takes, Chetan and Hazel break down how threat actors are disguising ransomware and stealers as AI installers. One threat actor is even claiming its ransom funds "humanitarian aid." Catch the full story here: buzzsprout.com/2018149/episode

2025-06-05

New destructive malware alert: Talos uncovered "PathWiper," a wiper targeting Ukrainian critical infrastructure, which we attribute with high confidence to a Russia-nexus APT actor. Learn how the attack unfolded: blog.talosintelligence.com/pat

2025-05-29

New author alert! 🚨 Meet Amy Ciminnisi, Talos' Content Manager, who shares her unconventional journey from anthropology to cybersecurity, plus insights on threats disguised as AI installers: blog.talosintelligence.com/a-n

2025-05-29

Think you’re downloading the next big AI tool? You might be in for an unpleasant surprise. Meet CyberLock, Lucky_Gh0$t and Numero: ransomware and malware threats in disguise as AI tool installers: blog.talosintelligence.com/fak

2025-05-23

Cisco Talos' own Vitor Ventura, lead security researcher, was featured on the most recent Dark Reading Confidential episode. Vitor discusses how the team stumbled upon YoroTrooper while investigating actors targeting Ukraine. Listen here: darkreading.com/threat-intelli

2025-05-23

According to Talos’ recent analysis of six months of PowerShell network telemetry, contacted rare domains are over 3x more likely to be malicious than frequently contacted ones. Read the full analysis: blog.talosintelligence.com/sca

2025-05-22

Ghosting isn’t just for dating apps — it’s alive and well in the cybercrime underworld. In this week’s Threat Source newsletter, Hazel explores the messy world of cybercriminal teamwork (or lack thereof). Read the newest edition: blog.talosintelligence.com/gho

2025-05-22

On this week’s Talos Takes, Edmund Brumaghin joins Hazel to talk about the growing trend of threat actors compartmentalizing their attacks, and how defenders can adjust threat modeling: buzzsprout.com/2018149/episode

2025-05-20

How secure are your cloud environments? Cisco Talos built on Tenable’s discovery of a Google Cloud Platform vulnerability to uncover how attackers could exploit similar techniques across AWS and Azure: blog.talosintelligence.com/dup

2025-05-15

Ever wonder what cybercriminals talk about behind closed doors? In this week’s Threat Source newsletter, Thor takes us into the chat messages within the LockBit leak: blog.talosintelligence.com/xox

2025-05-15

🔎 Follow the motive: Join Talos researcher Ashley Shen as we break down the evolution of initial access brokers and why defining their motives is key to better defense: buzzsprout.com/2018149/episode

2025-05-13

Attack kill chains are evolving, and defenders must, too. In this two-part blog, Talos examines how threat actors are working together like never before, and proposes an extension to the Diamond Model: blog.talosintelligence.com/red

2025-05-12

Don’t miss CTA TIPS 2025! Join Edmund Brumaghin and Nick Biasini as they uncover how threat actor collaboration and shifts in global defense are changing cyber attribution. Register now: cyberthreatalliance.org/tips-c

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst