A (somewhat) complete timeline of Talos’ history
A lot has happened in Talos’ 10 years of existence. And to celebrate our birthday, we wanted to look back […]
A (somewhat) complete timeline of Talos’ history Read More »
A lot has happened in Talos’ 10 years of existence. And to celebrate our birthday, we wanted to look back […]
A (somewhat) complete timeline of Talos’ history Read More »
The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to
Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool Read More »
Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash
CrowdStrike Explains Friday Incident Crashing Millions of Windows Devices Read More »
A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign designed to
Microsoft Defender Flaw Exploited to Deliver ACR, Lumma, and Meduza Stealers Read More »
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog,
CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List Read More »
At Cloudflare, we’re big supporters of the open-source community – and that extends to our approach for Workers AI models
Meta Llama 3.1 now available on Workers AI Read More »
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking
Chinese Hackers Target Taiwan and US NGO with MgBot Malware Read More »
Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in
New ICS Malware ‘FrostyGoop’ Targeting Critical Infrastructure Read More »
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice
How to Securely Onboard New Employees Without Sharing Temporary Passwords Read More »