One mighty fine-looking report
Welcome to this week’s edition of the Threat Source newsletter. They say art is subjective, but have you ever seen a well-formatted bar chart? Van Gogh had Starry Night, but Talos’ 2024 Year in Review...
View ArticleYear in Review: In conversation with the report's authors
🎥 Talos Year in Review 2024: Part 1 & 2 – Watch Now!Another year, another mountain of malicious telemetry to sift through. I spoke with a few of Talos' Year in Review authors, freshly out of the...
View ArticleYear in Review: Key vulnerabilities, tools, and shifts in attacker email tactics
Over the next few weeks, we’re breaking down the most critical sections of our 2024 Year in Review.This week, we examine the most frequently targeted vulnerabilities—particularly those affecting...
View ArticleMicrosoft Patch Tuesday for April 2025 — Snort rules and prominent...
Microsoft has released its monthly security update for April of 2025 which includes 126 vulnerabilities affecting a range of products, including 11 that Microsoft marked as “critical”. In this month's...
View ArticleUnraveling the U.S. toll road smishing scams
Cisco Talos has observed a widespread and ongoing financial theft SMS phishing (smishing) campaign since October 2024 that targets toll road users in the United States of America. We observed that the...
View ArticleThreat actors thrive in chaos
Welcome to this week’s edition of the Threat Source newsletter. If there’s one thing that threat actors love, it’s chaos. Headlines in the news that provoke an emotional response make excellent...
View ArticleYear in Review: The biggest trends in ransomware
This week, our Year in Review spotlight is on ransomware—where low-profile tactics led to high-impact consequences.Ransomware operators often prioritized stealth over complexity for initial access....
View ArticleEclipse and STMicroelectronics vulnerabilities
Cisco Talos’ Vulnerability Discovery & Research team recently disclosed three vulnerabilities found in Eclipse ThreadX and four vulnerabilities in STMicroelectronics. The vulnerabilities...
View ArticleUnmasking the new XorDDoS controller and infrastructure
Cisco Talos observed an existing distributed denial-of-service (DDoS) malware known as XorDDoS, continuing to spread globally between November 2023 and February 2025. A significant finding shows that...
View ArticleCare what you share
Welcome to this week’s edition of the Threat Source newsletter. As we navigate our daily routines, certain tasks become second nature to us, especially if they are integral to our professions. However,...
View ArticleYear in Review: Attacks on identity and MFA
For our third focussed topic for Talos' 2024 Year in Review, we tell the story of how identity has become the pivot point for adversarial campaigns.The main themes of this story are credential abuse,...
View ArticleIntroducing ToyMaker, an Initial Access Broker working in cahoots with double...
In 2023, Cisco Talos discovered an extensive compromise in a critical infrastructure enterprise consisting of a combination of threat actors.From initial access to double extortion, these actors slowly...
View ArticleLessons from Ted Lasso for cybersecurity success
Welcome to this week’s edition of the Threat Source newsletter. "Be curious, not judgmental," Ted Lasso says, misattributing Walt Whitman. We forgive Ted because... well, he's Ted Lasso. If you’ve not...
View ArticleIR Trends Q1 2025: Phishing soars as identity-based attacks persist
Phishing attacks spiked this quarter as threat actors leveraged this method of initial access in half of all engagements, a vast increase from previous quarters. Conversely, the use of valid accounts...
View ArticleYear in Review: AI based threats
2024 wasn't the year that AI rewrote the cybercrime playbook — but it did turbocharge some of the old tricks. In Cisco Talos' 2024 Year in Review, with the help of our friends at Robust Intelligence...
View Article