Source
TALOS
This year marks the 10th anniversary of Cisco Talos, as the Talos brand was officially launched in August 2014 at Black Hat.
A binary in Apple macOS could allow an adversary to execute an arbitrary binary that bypasses SIP.
We look back on 10 years of Talos, in multiple interviews with Talos' leaders.
Seeing a “blue screen of death,” often with code that looks indecipherable, has been ingrained into our heads that it’s a “hack."
Although there was a decrease in BEC engagements from last quarter, it was still a major threat for the second quarter in a row.
Relive some of the major cybersecurity incidents and events that have shaped Talos over the past 10 years.
Telecommunications provider AT&T disclosed earlier this month that adversaries stole a cache of data that contained the phone numbers and call records of “nearly all” of its customers.
Even if a threat actor isn’t successful in some widespread breach that makes international headlines, even smaller-scale threats and actors are just hoping to cause chaos.
Data breaches have become one of the most crucial threats to organizations across the globe, and they’ve only become more prevalent and serious over time.
Talos researchers discovered these vulnerabilities in the Jungle SDK while researching other vulnerabilities in the LevelOne WBR-6013 wireless router.