Malicious drivers are difficult to detect and successfully leveraging one can give an attacker full access to a system.
Relive Talos' top stories from the past year as we recap the top malware and other threats that came our way.
“I’m completely interested in the creative ways computers can break down,” Schultz jokes.
Patterson and her teammates are responsible for helping to disclose and patch more than 200 security vulnerabilities a year, some of which affect devices used in thousands of households around the world.
We've seen threat actors utilize every chance they get to steal sensitive data, to be used in future attacks and/or to manipulate victims into paying up before their data ends up on the dark web.
A Purple Team exercise is a collaborative approach between offensive (Red) teams and defensive (Blue) teams.
Today, Finn combs through Talos’ various intelligence sources, open-source research, partner resources, and Cisco product telemetry to track major attacker trends and emerging threats.
Researcher Spotlight: How David Liebenberg went from never having opened Terminal to hunting international APTs
When Dave Liebenberg started his first day at Talos, he had never even opened Terminal on a Mac before — let alone written a Snort rule or infiltrated a dark web forum.
Multiple ransomware data leak sites experience DDoS attacks, facing intermittent outages and connectivity issues
Cisco Talos has been monitoring suspected distributed denial-of-service (DDoS) attacks resulting in intermittent downtime and outages affecting several ransomware-as-a-service (RaaS) data leak sites.