Tag: threat landscape

  • Cisco Talos Blog: The Booker Prize Longlist and Hacker Summer Camp

    Source URL: https://blog.talosintelligence.com/the-booker-prize-longlist-and-hacker-summer-camp/ Source: Cisco Talos Blog Title: The Booker Prize Longlist and Hacker Summer Camp Feedly Summary: This week Bill connects the hype of literary awards to cybersecurity conference season. We highlight key insights from the Q2 2025 IR Trends report, including phishing trends, new ransomware strains, and top targeted sectors. Finally, check out…

  • The Register: Silk Typhoon spun a web of patents for offensive cyber tools, report says

    Source URL: https://www.theregister.com/2025/07/31/silk_typhoon_attack_patents/ Source: The Register Title: Silk Typhoon spun a web of patents for offensive cyber tools, report says Feedly Summary: US court docs reveal that infamous Chinese snoops filed IP papers like tax returns Security researchers have uncovered more than a dozen patents for offensive cybersecurity tools filed by Chinese companies allegedly tied…

  • Cisco Talos Blog: Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect

    Source URL: https://blog.talosintelligence.com/cisco-talos-at-black-hat-2025-briefings-booth-talks-and-what-to-expect/ Source: Cisco Talos Blog Title: Cisco Talos at Black Hat 2025: Briefings, booth talks and what to expect Feedly Summary: Cisco Talos is back at Black Hat with new research, threat detection overviews and opportunities to connect with our team. Whether you’re interested in what we’re seeing in the threat landscape, detection…

  • Unit 42: 2025 Unit 42 Global Incident Response Report: Social Engineering Edition

    Source URL: https://unit42.paloaltonetworks.com/2025-unit-42-global-incident-response-report-social-engineering-edition/ Source: Unit 42 Title: 2025 Unit 42 Global Incident Response Report: Social Engineering Edition Feedly Summary: Social engineering thrives on trust and is now boosted by AI. Unit 42 incident response data explains why it’s surging. We detail eight critical countermeasures. The post 2025 Unit 42 Global Incident Response Report: Social Engineering…

  • CSA: Homoglyph Attacks & Domain Squatting

    Source URL: https://cloudsecurityalliance.org/articles/homoglyph-attacks-domain-squatting-the-hidden-risk-to-your-brand Source: CSA Title: Homoglyph Attacks & Domain Squatting Feedly Summary: AI Summary and Description: Yes Summary: The text highlights the escalating threat posed by homoglyph-based domain squatting, emphasizing its potential impact on brand trust and cloud security. It underscores the need for proactive DNS posture management to detect and mitigate these risks,…

  • Cloud Blog: Too many threats, too much data, say security and IT leaders. Here’s how to fix that

    Source URL: https://cloud.google.com/blog/products/identity-security/too-many-threats-too-much-data-new-survey-heres-how-to-fix-that/ Source: Cloud Blog Title: Too many threats, too much data, say security and IT leaders. Here’s how to fix that Feedly Summary: An overwhelming volume of threats and data combined with the shortage of skilled threat analysts has left many security and IT leaders believing that their organizations are vulnerable to cyberattacks…