Threat Insights

Our series of blogs take a look at today's top threats.

2024 Cyber Threat Trends Report: From Trojan Takeovers to Ransomware Roulette

How to monitor network traffic

The Cisco Cyber Threat Trends Report examines malicious domains for trends and patterns. See what the data tells us about the threat landscape.

Threat Explainer blogs

Our Threat Explainer series examines the core principles behind threats and provides a foundation upon which to build your knowledge.

Defusing the threat of compromised credentials

Identity-related attacks are a common tactic used by bad actors. Learn how to help protect against these attacks.

Explorations in the spam folder

We all know to look out for phishing emails, but sometimes these scams can catch us off guard.

Explorations in the spam folder:holiday edition

Learn all about the spam campaigns that are circulating this holiday season.

Supply chain attacks

Learn how bad actors can target the companies you rely on in order to get at your organization.ampaigns that are circulating this holiday season.

The future of ransomware: Inside Cisco Talos threat hunters

The future of ransomware: Inside Cisco Talos threat hunters

What are the steps you need to take to protect your organization from damaging ransomware attacks? Learn more in this behind-the-scenes interview with Cisco Talos experts.

Threat Trends blogs

Our Threat Trends series analyzes the latest data and shines a light on the most prevalent trends in the threat landscape.

The myth of the long-tail vulnerability

A long-tail distribution of exploit attempts sounds reasonable. But is this how exploitation attempts really play out?

Threat Trends: Snort IPS

In this blog, we take a look at Snort alert trends on Cisco Secure Firewall during 2022.

Vulnerabilities

Explore these indicators of exploitation that will help you manage vulnerabilities.

Firewalls

Examine the top threats that are seen and blocked by Cisco Secure Firewall.

DNS security, part 1

Explore an overview of the top trends seen in malicious DNS activity during 2020.

DNS security, part 2

Take a deep dive into industry-specific threat trends surrounding malicious DNS activity.

Endpoint security, part 1

See the latest threat trends that are impacting endpoint security.

Endpoint security, part 2

Take a deeper look into the latest threat trends targeting endpoints.

Threat Protection blogs

Our Threat Protection series highlights particular threats and security issues and showcases how Cisco Secure can help protect your critical assets.

Find the 10 most critical vulnerabilities

Combine data from Cisco Vulnerability Management and Cisco Secure Firewall to uncover new insights.

The REvil ransomware

We look under the hood of the headline-grabbing REvil ransomware and showcase how it goes about locking down a computer.

The WastedLocker ransomware

Learn more about how the WastedLocker ransomware works, and how Cisco Secure can protect you from it.

ThreatWise TV blogs

This series runs alongside our ThreatWise TV narrative video series, going deeper into the topics covered in the episodes.

ThreatWise TV

Recent IR trends

We take a look at the findings from the Q3 Talos Incident Response Trends report.

Related resources

Cisco Cybersecurity Report Series

Discover security insights and key findings from a variety of research-based, data-driven studies.

Security Stories podcast

Access interviews with a diverse range of leaders from across the cybersecurity industry.

ThreatWise TV episodes

Watch candid commentary and live demos on cybersecurity from ThreatWise TV.

ThreatSource newsletter

Get our ThreatSource newsletter for the top vulnerabilities, events, and more.