Beers with Talos EP 16: Strong Copy - Bad Rabbit and the Nyetya Connection
Beers with Talos (BWT) Podcast Episode 16 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcastEP16...
View ArticleVulnerability Spotlight: Multiple Vulnerabilities in Foscam C1 Indoor HD Cameras
These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos.Executive SummaryThe Foscam C1 Indoor HD Camera is a network-based camera that is marketed for use in a variety of applications,...
View ArticleMicrosoft Patch Tuesday - November 2017
Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 53 new...
View ArticleVulnerability Spotlight: Multiple Remote Code Execution Vulnerabilities...
Vulnerabilities discovered by Marcin Noga of Cisco TalosTalos is releasing seven new vulnerabilities discovered within the libxls library: TALOS-2017-0403, TALOS-2017-0404, TALOS-2017-0426,...
View ArticleThreat Round Up for Nov 10 - Nov 17
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between November 10 and November 17. As with previous round-ups, this post isn't meant to be an in-depth analysis....
View ArticleThis Holiday Season - Buy One IoT Device, Get Free CVEs
As the Internet of Things gains steam and continues to develop, so are adversaries and the threats affecting these systems. Companies throughout the world are busy deploying low cost Internet-connected...
View ArticleBeers with Talos EP 17: Greek Gods, Trojans, and the Spice Girls as Spirit...
Beers with Talos (BWT) Podcast Episode 17 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcastEP17...
View ArticleTalos Wins The 5th Volatility Plugin Contest With Pyrebox
Talos has won this year's 5th Volatility plugin contest with Pyrebox. Volatility is a well-known open-source framework designed to analyze operating system memory. The framework has existed since 2007....
View ArticleROKRAT Reloaded
This post was authored by Warren Mercer, Paul Rascagneres and with contributions from Jungsoo (Jason) An.Executive SummaryEarlier this year, Talos published 2 articles concerning South Korean threats....
View ArticleVulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability
This blog post was authored by Marcin Noga of Cisco Talos.IntroductionIn 2016 Talos released an advisory for CVE-2016-2334, which was a remote code execution vulnerability affecting certain versions of...
View ArticleRecam Redux - DeConfusing ConfuserEx
This post is authored by Holger Unterbrink and Christopher MarczewskiOverviewThis report shows how to deobfuscate a custom .NET ConfuserEx protected malware. We identified this recent malware campaign...
View ArticleThe Mutiny Fuzzing Framework and Decept Proxy
This blog post is authored by James Spadaro of Cisco ASIG and Lilith Wyatt of Cisco Talos.Imagine a scenario where you, as a vulnerability researcher, are tasked with auditing a network application to...
View ArticleVulnerability Spotlight: TALOS-2017-0393 / CVE-2017-2886 - ACDSee Ultimate 10...
Vulnerability discovered by Piotr Bania of Cisco Talos.OverviewTalos has discovered a remote code execution vulnerability in the ACDSee Ultimate 10 application from ACD Systems International Inc....
View ArticleThreat Round Up for Dec 01 - Dec 08
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between December 01 and December 08. As with previous round-ups, this post isn't meant to be an in-depth analysis....
View ArticleMicrosoft Patch Tuesday - December 2017
Today, Microsoft has released its monthly set of security advisories for vulnerabilities that have been identified and addressed in various products. This month's advisory release addresses 34 new...
View ArticleBeers with Talos EP 18: Kitties in My Blockchain, Obfuscating Pronunciations,...
Beers with Talos (BWT) Podcast Episode 18 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcastEP18...
View ArticleVirus Bulletin Publication And Presentation
Virus Bulletin conference is a well regarded intimate technical conference focused on malware research. It provides a good balance between listening to technical talks and spending time exchanging...
View ArticleVulnerability Spotlight: VMWare VNC Vulnerabilities
Today, Talos is disclosing a pair of vulnerabilities in the VNC implementation used in VMWare's products that could result in code execution. VMWare implements VNC for its remote management, remote...
View ArticleBeers with Talos EP 19: The "Best" of BWT
Beers with Talos (BWT) Podcast Episode 19 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcastEP19...
View ArticleTutorial: Mutiny Fuzzing Framework and Decept Proxy
Here's a basic demo video for our new opensource tools, Decept and Mutiny. Happy New Year <(^_^)> ~ LilithRecently, Talos released new tools to assist in the monumental task of finding...
View Article