Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Threat of the Month

Current threat analysis and defense techniques against the latest attacks

Read the latest Sign up for email alerts

DNS under attack

Take an in-depth dive into Sea Turtle and other DNS attacks.

Consider these solutions

Cisco Umbrella Investigate

Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems, and file hashes.

Duo Trusted Access

For organizations of all sizes, Duo Trusted Access establishes trust in users, devices, and the applications they access.

Office 365 phishing

You've never clicked. But what's this new phishing tactic?

Cisco Email Security and Duo work together to protect your users.

How did this manufacturer overcome phishing and business email compromise (BEC) scams? 

Your Office 365 help center

Find solutions to your specific problems with Cisco Email Security resources.

Social media and black markets

Talos has discovered black markets on social media. Our expert discusses the implications.

A layered defense against cybercrime

Cisco Umbrella

Cisco Umbrella is a cloud security platform that provides the first line of defense against threats on the internet wherever users go.

Threat defense

Cisco Threat Response automates integrations across select Cisco Security products and accelerates key security operations functions: detection, investigation, and remediation.

Cisco AMP for endpoints

AMP (Advanced Malware Protection) offers continuous monitoring and patented retrospective security capabilities that provides a last line of defense against malicious files targeting the endpoint.

Protecting against phishing

Cisco Advanced Phishing Protection (PDF)

Detect fraudulent senders with threat intelligence that adapts in real time to block BEC and advanced phishing attacks.

This Scottish partner needed a solution to protect customers from phishing and email attacks. It chose Cisco to protect itself and its clients.

The state of phishing

Our panel dives into understanding why phishing is so successful and what you can do about it.

Past Threat of the Month blogs

SMB and the return of the worm

Some things are cyclical. Is the SMB worm back?

Cryptomining: a sheep or a wolf?

How did malicious cryptomining rise to prominence? We investigate.

Going with what works: the state of phishing

If it ain't broke, don't fix it. And phishing ain't broke, friends.

The rise of digital extortion

We investigate digital extortion scams in our latest blog.

Cisco 2019 Cybersecurity Threat Report

In our new intelligence report, we analyzed past threats to anticipate future cybersecurity trends.

You may also be interested in…

Cisco cybersecurity reports

In the new Cisco Cybersecurity Report series, get in-depth analysis on the latest threats and best practices for security practitioners.

Beers with Talos

There are two kinds of companies: those who have been breached and those who don't know Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues--all with beer.

Weekly updates

Get our ThreatSource newsletter for the top vulnerabilities, events, and more.