Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Threat of the Month

Our leading Cisco cybersecurity blog series delivers insight into the top threats.

Cisco's most popular security blog series

Each month, our cybersecurity experts select the most notable cybersecurity threat to feature. With in-depth analysis and reporting, the Threat of the Month series provides clear explanations and recommendations for defenders. From phishing to ransomware to banking Trojans, we address the threats you need to know about.

RDP and the remote desktop

RDP is a popular remote desktop protocol, but is it the best option for connecting back to your organization’s resources?

Remote work and the threat landscape

Attackers are adapting their techniques to target those working from home, tailoring them to be more effective in this environment.

Securing the remote work environment

Working from home isn't the same as working from the office. Here's why organizations should be reviewing their remote working security posture.

Credential dumping

Phishing and keylogging are just the beginning: Explore more ways adversaries steal passwords and credentials.

Exploring the spam folder

Phishing, scams, and Trojans: Find out which are likely to be in your spam email folder.

Past Threat of the Month blogs

Securing industrial IoT

Find out why it's vulnerable and learn how to defend for manufacturing, critical infrastructure, and more.


Learn how adversaries infiltrate ad networks and get tips for safe shopping.

Remote access Trojans

Check under the hood and see how a remote access Trojan (RAT) works and what is at stake.

Threats in encrypted traffic

Learn how adversaries hide their malicious activity online.

DNS under attack

Take an in-depth dive into Sea Turtle and other DNS attacks.

Office 365 phishing

You've never clicked. But what is this new phishing tactic?

Social media and black markets

Talos has discovered black markets on social media. Our expert discusses the implications.

The rise of digital extortion

We investigate digital extortion scams in our latest blog.

Recent cybersecurity reports

Threats of the Year

From RATs to DNS hijacking, take a look back at the 2019 threat landscape.

Hunting for hidden threats

We explore the ins and outs of threat hunting and provide a how-to guide for creating a threat-hunting team at your organization.

Email: Click with caution

The Click with Caution report challenges assumptions about the most significant threat vector.

Defending against today's critical threats

In our recent threat intelligence report, we analyzed the past to anticipate future cybersecurity trends.

Consider these solutions

Cisco Umbrella Investigate

Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems, and file hashes.

Duo Trusted Access

For organizations of all sizes, Duo Trusted Access establishes trust in users, devices, and the applications they access.

Cisco AMP for Endpoints

AMP (Advanced Malware Protection) offers continuous monitoring and patented retrospective security capabilities that provides a last line of defense against malicious files targeting the endpoint.

Cisco Threat Response

Threat Response automates integrations across select Cisco Security products and accelerates key security operations functions: detection, investigation, and remediation.

Cisco Email Security

Protect users from email threats; Cisco Email Security is your defense against phishing, business email compromise, and ransomware.

You may also be interested in…

New Security Stories podcast

Discover the unique, strange, and often hilarious stories behind what it takes to lead cybersecurity efforts in an organization.

Beers with Talos

There are two kinds of companies: those who have been breached and those who don't know. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues--all with beer.

Weekly updates

Get our ThreatSource newsletter for the top vulnerabilities, events, and more.

CISO Conversations

Cisco CISO Advisors discuss various aspects of cybersecurity: How it impacts the business, how threats can be overcome, and counterattacks they have used.