Collection: Latest insights and cybersecurity resources

Threat Advisory: Obfuscation and process hollowing with GOO and XWorm
This threat advisory provides a detailed breakdown of a recent XWorm malware attack, revealing how attackers leveraged phishing emails, fileless execution, and process hollowing to infiltrate a target environment. By analysing the multi-stage attack chain, security professionals gain insights into obfuscation techniques, persistence mechanisms, and credential theft strategies used by adversaries.
The attack occurred just before Christmas, highlighting the increased risk of cyber threats during holidays when security teams may be understaffed. This real-world case study demonstrates how Managed Detection and Response (MDR) teams detected and mitigated the attack, offering practical takeaways for improving threat detection and response.
By reading this advisory, cybersecurity professionals can stay informed about emerging threats, learn how attacks unfold and enhance their defensive strategies. With insights from real incident response efforts, security teams can fine-tune detection rules, strengthen phishing defences and increase vigilance during high-risk periods.

CREST SOC accreditation: What it means for our customers
At Talanos Cybersecurity, safeguarding your digital assets is personal to us. Our CREST SOC Accreditation reflects our dedication to delivering top-tier 24/7 cybersecurity services. Trust us to protect your business with cutting-edge tools, expert staff, industry-recognised processes and without compromise.

Securing the Law Firm

An appeal for cyber incident and near miss stories

Defending law firms - A case for pre-attack intelligence in...

Don't just defend - go after attacker infrastructure
Talanos truly believe that defenders who care about cybersecurity should put in the effort to close down attacker infrastructure they discover. We don’t do it for our customers, for money or for recognition - we do it because we actually care about the communities we live in and it’s the right thing to do. This post will explain the takedown process, how to research targets and escalate to be successful.