Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Threat of the Month

Current threat analysis and defense techniques against the latest attacks

Read the latest Sign up for email alerts

Social media and black markets

Talos has discovered black markets on social media. Our expert discusses the implications.

A layered defense against cybercrime

Cisco Umbrella

Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.

Threat defense

Cisco Threat Response automates integrations across select Cisco Security products and accelerates key security operations functions: detection, investigation, and remediation.

Cisco AMP for endpoints

AMP (Advanced Malware Protection) offers continuous monitoring and patented retrospective security capabilities that provides a last line of defense against malicious files targeting the endpoint.

The rise of digital extortion

You may have received an email claiming your webcam was hacked, a hit man is after you, or a bomb was planted at your place of business. Is there any truth to these claims? We investigate digital extortion scams in our latest blog.

Protecting against phishing

Cisco Advanced Phishing Protection

Detect fraudulent senders with threat intelligence that adapts in real time to block BEC and advanced phishing attacks.

This Scottish partner needed a solution to protect customers from phishing and email attacks. It chose Cisco to protect itself and its clients.

The state of phishing

Our panel dives into understanding why phishing is so successful and what you can do about it.

SMB and the return of the worm

"Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one vector declines, another increases in popularity."

Cisco solutions to protect against worms

Cisco Stealthwatch

Stealthwatch can detect connections to SMB shares, correlating this activity to alert administrators.

Advance Malware Protection

AMP's continuous monitoring and patented retrospective security capabilities are ideally suited to keep you safe against attacks such as WannaCry and Nyetya.

Network Security Appliances

Network Security appliances like NGFW, NGIPS, and Meraki MX can detect malicious activity associated with SMB attacks.

Past Threat of the Month blogs

Cryptomining: a sheep or a wolf?

How did malicious cryptomining rise to prominence? We investigate.

Going with what works: the state of phishing

If it ain't broke, don't fix it. And phishing ain't broke, friends.

In pursuit of invisibility: fileless malware

Have you ever heard of 'fileless malware?' Our expert breaks down this trending threat.

Cisco 2019 Cybersecurity Threat Report

In our new intelligence report, we analyzed past threats to anticipate future cybersecurity trends.

You may also be interested in…

Cisco cybersecurity reports

In the new Cisco Cybersecurity Report series, get in-depth analysis on the latest threats and best practices for security practitioners.

Beers with Talos

There are two kinds of companies: those who have been breached and those who don't know Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues--all with beer.

Weekly updates

Get our ThreatSource newsletter for the top vulnerabilities, events, and more.