Cisco Talos Intelligence Group - Comprehensive Threat Intelligence Cisco Talos Intelligence Group is one of the largest commercial threat intelligence teams in the world Comprised of world-class cyber security researchers, analysts and engineers and supported by unrivaled telemetry, Talos defends Cisco customers against known and emerging threats, discovers new vulnerabilities in common software, and interdicts threats in the wild before they can further
A Real-Time Threat Detection Service - Talos Intelligence The Talos Intelligence Center detects and correlates threats in real time using the largest threat detection network in the world spanning web requests, emails, malware samples, open-source data sets, endpoint intelligence, and network intrusions
Cisco Talos Blog Talos intelligence and world-class threat research team better protects you and your organization against known and emerging cybersecurity threats
Cisco Talos 2025 Year in Review The 2025 Talos Year in Review is an annual report analyzing global cybersecurity threats, attacker behavior, and emerging risks It highlights trends like rapid vulnerability exploitation, identity-based attacks, evolving ransomware, AI-based threats, and state-sponsored activity
Vulnerability Research - Talos Intelligence Vulnerability Research Talos investigates software and operating system vulnerabilities in order to discover them before malicious threat actors do We provide this information to vendors so that they can create patches and protect their customers as soon as possible
Vulnerability Reports - Talos Intelligence Talos investigates software and operating system vulnerabilities in order to discover them before malicious threat actors do We provide this information to vendors so that they can create patches and protect their customers as soon as possible
Cisco Talos 2024 Year in Review In 2024, threat actors prioritized stealth, simplicity, and efficiency Cisco Talos’ Year in Review reveals insights into how cyber criminals carried out their campaigns, and what made an attack successful Read about threat actor activities across topics including top targeted vulnerabilities, network-based attacks, email threats, adversary toolsets, identity attacks, multi-factor