#ciscotalosincidentresponse

2025-05-06

Proactive threat hunting with Talos IR - At Cisco Talos, we understand that effective cybersecurity isn’t just about responding to... blog.talosintelligence.com/pro #ciscotalosincidentresponse

2025-04-28

IR Trends Q1 2025: Phishing soars as identity-based attacks persist - Phishing attacks spiked this quarter as threat actors leveraged this method of initial ac... blog.talosintelligence.com/ir- #ciscotalosincidentresponse #talosirtrends

2024-11-07

Unwrapping the emerging Interlock ransomware attack - Cisco Talos Incident Response (Talos IR) recently observed an attacker conducting big-gam... blog.talosintelligence.com/eme #ciscotalosincidentresponse #landingpagetopstory #ransomware #topstory #threats

2024-10-30

Talos IR trends Q3 2024: Identity-based operations loom large - Threat actors are increasingly conducting identity-based attacks across a range of operat... blog.talosintelligence.com/inc #ciscotalosincidentresponse #landingpagetopstory #talosirtrends #topstory

2024-10-16

Protecting major events: An incident response blueprint - Ensuring the cybersecurity of major events — whether it’s sports, professional conference... blog.talosintelligence.com/pro #ciscotalosincidentresponse #features

2024-08-28

BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks - ·      The BlackByte ransomware group continues to leverage tactics, techniques and proce... blog.talosintelligence.com/bla #ciscotalosincidentresponse #landingpagetopstory #threatspotlight #ransomware #topstory

2024-07-25

IR Trends: Ransomware on the rise, while technology becomes most targeted sector - Business email compromise (BEC) and ransomware were the top threats observed by Cisco Tal... blog.talosintelligence.com/ir- #ciscotalosincidentresponse #talosirtrends #topstory

2024-04-25

Talos IR trends: BEC attacks surge, while weaknesses in MFA persist - Business email compromise (BEC) was the top threat observed by Cisco Talos Incident Respo... blog.talosintelligence.com/tal #ciscotalosincidentresponse #landingpagetopstory #talosirtrends #topstory

2024-01-24

Significant increase in ransomware activity found in Talos IR engagements, while education remains one of the most-targeted sectors - First time ransomware was the top threat in 2023, according to Q4 2023 Talos Incid... blog.talosintelligence.com/tal #ciscotalosincidentresponse #talosirtrends

2023-11-16

7 common mistakes companies make when creating an incident response plan and how to avoid them - Cisco Talos recently covered the basics of NIS2, a new set of requirements for cybersecur... blog.talosintelligence.com/sev #ciscotalosincidentresponse #ontheradar

2023-10-17

Why logging is one of the most overlooked aspects of incident response, and how Cisco Talos IR can help - By Rami Altalhi and David Roman.  Logs are fundamental to strengthening an organization's... blog.talosintelligence.com/why #ciscotalosincidentresponse

2023-09-14

How Cisco Talos IR helped a healthcare company quickly resolve a Qakbot attack - Healthcare is one of the most popular targets for threat actors, as evidenced by the fact... blog.talosintelligence.com/how #ciscotalosincidentresponse #topstory

2023-07-26

Data theft extortion rises, while healthcare is still most-targeted vertical in Talos IR engagements - Cisco Talos Incident Response (Talos IR) responded to a growing number of data the... blog.talosintelligence.com/tal #ciscotalosincidentresponse #talosirtrends

2023-06-29

How Talos IR’s Purple Team can help you prepare for the worst-case scenario - Purple Team exercises are included within the Cisco Talos Incident Response Retainer serv... blog.talosintelligence.com/how #ciscotalosincidentresponse #features

2023-06-02

Cybersecurity for businesses of all sizes: A blueprint for protection - One of the primary reasons why cybersecurity remains a complex undertaking is the increas... blog.talosintelligence.com/cyb #ciscotalosincidentresponse

2023-04-10

Researcher Spotlight: Giannis Tziakouris first learned how to fix his family’s PC, and now he’s fixing networks all over the globe - Giannis Tziakouris had a problem growing up: He kept breaking his PC.He loved experimenti... blog.talosintelligence.com/res #ciscotalosincidentresponse #researcherspotlight

2023-03-29

How an incident response retainer can drive proactive security - We’ve written before about the importance of taking a proactive approach to cybersecurity... blog.talosintelligence.com/ir- #ciscotalosincidentresponse #ontheradar

2023-01-10

Increasing trust, commitment, and predictability during a remote incident response - Authors: Gergana Karadzhova, Joe Schumacher, Pawel BosekIn this blog post, Cisco Talos In... blog.talosintelligence.com/inc #ciscotalosincidentresponse

2022-12-02

Protecting major events: an incident response blueprint - The cyber security of major events, whether they are related to sports, professional conf... blog.talosintelligence.com/pro #ciscotalosincidentresponse

2022-11-08

The Company You Keep – Preparing for supply chain attacks with Talos IR - Given the increasing frequency of supply chain attacks, the sophistication of those attac... blog.talosintelligence.com/tal #ciscotalosincidentresponse #ontheradar #topstory

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst