Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
blog.talosintelligence.com
29
posts in the last 30 days
[Podcast] It's not you, it's your
printer
:
State-sponsored
and phishing threats in 2025
blog.talosintelligence.com
·
11h
Phishing and
MFA
exploitation
: Targeting the keys to the kingdom
blog.talosintelligence.com
·
11h
Bad Apples:
Weaponizing
native macOS
primitives
for movement and execution
blog.talosintelligence.com
·
13h
Foxit
,
LibRaw
vulnerabilities
blog.talosintelligence.com
·
5d
The Q1
vulnerability
pulse
blog.talosintelligence.com
·
5d
PowMix
botnet
targets Czech workforce
blog.talosintelligence.com
·
5d
More than pretty pictures:
Wendy
Bishop
on visual storytelling in tech
blog.talosintelligence.com
·
5d
·
DEV
The n8n
n8mare
: How threat actors are
misusing
AI workflow automation
blog.talosintelligence.com
·
6d
Microsoft Patch Tuesday for April 2026 -
Snort
Rule and
Prominent
Vulnerabilities
blog.talosintelligence.com
·
1w
State-sponsored
threats: Different
objectives
, similar access paths
blog.talosintelligence.com
·
1w
[Video] The
TTP
Ep
. 22: The Collapse of the Patch Window
blog.talosintelligence.com
·
1w
The threat
hunter
’s
gambit
blog.talosintelligence.com
·
1w
From the field to the report and back again: How
incident
responders
can use the Year in Review
blog.talosintelligence.com
·
1w
New Lua-based malware “
LucidRook
”
observed
in targeted attacks against Taiwanese organizations
blog.talosintelligence.com
·
1w
Talos
Takes: 2025's ransomware trends and
zombie
vulnerabilities
blog.talosintelligence.com
·
2w
The
Trojan
horse of cybercrime:
Weaponizing
SaaS notification pipelines
blog.talosintelligence.com
·
2w
Year in Review:
Vulnerabilities
old and new and something
React2
blog.talosintelligence.com
·
2w
Do not get high(
jacked
) off your own supply (
chain
)
blog.talosintelligence.com
·
2w
Axois
NPM
Supply Chain Incident
blog.talosintelligence.com
·
2w
The
democratisation
of business email
compromise
fraud
blog.talosintelligence.com
·
2w
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help