Have an account?

  •   Personalized content
  •   Your products and support

Need an account?

Create an account

Threat of the Month

Our leading Cisco cybersecurity blog series delivers insight into the top threats.

Cisco's most popular security blog series

Each month, our cybersecurity experts select the most notable cybersecurity threat to feature. With in-depth analysis and reporting, the Threat of the Month series provides clear explanations and recommendations for defenders. From phishing to ransomware to banking Trojans, we address the threats you need to know about.

RDP and the remote desktop

RDP is a popular remote desktop protocol, but is it the best option for connecting back to your organization’s resources?

Remote work and the threat landscape

Attackers are adapting their techniques to target those working from home, tailoring them to be more effective in this environment.

Securing the remote work environment

Working from home isn't the same as working from the office. Here's why organizations should be reviewing their remote working security posture.

Credential dumping

Phishing and keylogging are just the beginning: Explore more ways adversaries steal passwords and credentials.

Exploring the spam folder

Phishing, scams, and Trojans: Find out which are likely to be in your spam email folder.

Past Threat of the Month blogs

Securing industrial IoT

Find out why it's vulnerable and learn how to defend for manufacturing, critical infrastructure, and more.

Malvertising

Learn how adversaries infiltrate ad networks and get tips for safe shopping.

Remote access Trojans

Check under the hood and see how a remote access Trojan (RAT) works and what is at stake.

Threats in encrypted traffic

Learn how adversaries hide their malicious activity online.

DNS under attack

Take an in-depth dive into Sea Turtle and other DNS attacks.

Office 365 phishing

You've never clicked. But what is this new phishing tactic?

Social media and black markets

Talos has discovered black markets on social media. Our expert discusses the implications.

The rise of digital extortion

We investigate digital extortion scams in our latest blog.

Recent cybersecurity reports

Defending against critical threats

Our new security magazine covers the most critical threats of the past year, featuring interviews with experts and research-driven investigations.

2021 Security Outcomes Study

Proven factors for success: Read the new Security Outcomes Study to learn methods of improving program success, retaining security talent, and more.

2021 Data Privacy Benchmark Study

Learn how the current global health crisis has turned privacy into an even higher priority.

Consider these solutions

Cisco Umbrella Investigate

Umbrella Investigate provides the most complete view of the relationships and evolution of domains, IPs, autonomous systems, and file hashes.

Duo Trusted Access

For organizations of all sizes, Duo Trusted Access establishes trust in users, devices, and the applications they access.

Cisco AMP for Endpoints

AMP (Advanced Malware Protection) offers continuous monitoring and patented retrospective security capabilities that provides a last line of defense against malicious files targeting the endpoint.

Cisco Threat Response

Threat Response automates integrations across select Cisco Security products and accelerates key security operations functions: detection, investigation, and remediation.

Cisco Email Security

Protect users from email threats; Cisco Email Security is your defense against phishing, business email compromise, and ransomware.

You may also be interested in…

Security Stories podcast

Access interviews with a diverse range of leaders from across the cybersecurity industry.

Beers with Talos

There are two kinds of companies: those who have been breached and those who don't know. Listen to Talos security experts as they dive into emerging threats, forcing the bad guys to innovate, hacking refrigerators, and other security issues--all with beer.

Weekly updates

Get our ThreatSource newsletter for the top vulnerabilities, events, and more.

CISO Conversations

Cisco CISO Advisors discuss various aspects of cybersecurity: How it impacts the business, how threats can be overcome, and counterattacks they have used.