Beers with Talos EP33 - Change the Conversation or the People Having It?
Beers with Talos (BWT) Podcast Episode 33 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep....
View ArticleVulnerability Spotlight: Multiple Vulnerabilities in ACD Systems Canvas Draw 4
These vulnerabilities were discovered by Tyler Bohan of Cisco TalosToday, Talos is disclosing several vulnerabilities that have been identified in Canvas Draw graphics editing tool for Macs.Canvas Draw...
View ArticleVulnerability Spotlight: Foxit PDF Reader JavaScript Remote Code Execution Vulns
OverviewDiscovered by Aleksandar Nikolic of Cisco Talos.Talos is disclosing a pair of vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating, and editing...
View ArticleBlocking Cryptocurrency Mining Using Cisco Security Products
Cisco Talos is releasing a whitepaper addressing Cryptocurrency mining and all the ways to block it using Cisco Security products. The value of cryptocurrencies has fluctuated wildly, but the value is...
View ArticleVulnerability Spotlight: Multiple Vulnerabilities in Sony IPELA E Series Camera
Vulnerabilities discovered by Cory Duplantis and Claudio Bozzato of Cisco Talos.OverviewToday, Cisco Talos is disclosing several vulnerabilities discovered with the Sony IPELA E Series Network Camera....
View ArticleThreat Roundup for July 13-20
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 13 and 20. As with previous roundups, this post...
View ArticleTalosIntelligence.com is rolling out a new dispute system
At Cisco Talos, we need customers to be able to provide feedback at all times, whether it be about false positives, false negatives, or missed categories. Because we deal with an abundance of data...
View ArticleAdvanced Mobile Malware Campaign in India uses Malicious MDM - Part 2
This blog post is authored byWarren Mercer andPaul Rascagneres andAndrew Williams.SummarySince our initial post on malicious mobile device management (MDM) platforms, we have gathered more information...
View ArticleVulnerability Spotlight: Multiple Vulnerabilities in Samsung SmartThings Hub
These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos.Executive SummaryCisco Talos recently discovered several vulnerabilities present within the firmware of the Samsung SmartThings...
View ArticleBeers with Talos EP 34: Click Here to Assign New Mobile Device Owner
Beers with Talos (BWT) Podcast Ep. #34 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #34...
View ArticleThreat Roundup for July 20-27
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between July 20 and 27. As with previous roundups, this post...
View ArticleMultiple Cobalt Personality Disorder
IntroductionDespite the notion that modern cybersecurity protocols have stopped email-based attacks, email continues to be one of the primary attack vectors for malicious actors — both for widespread...
View ArticleExploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer...
Authored by Aleksandar Nikolic.Executive summaryIt can be very time-consuming to determine if a bug is exploitable or not. In this post, we’ll show how to decide if a vulnerability is exploitable by...
View ArticleThe Official Talos Guide to Security Summer Camp 2018
It is once again time for the week in the summer when many of us descend on Las Vegas for Black Hat, DEF CON, and B-Sides LasVegas. This is your official guide to what the Cisco Talos Threat...
View ArticlePlayback: A TLS 1.3 Story
IntroductionSecure communications are one of the most important topics in information security, and the Transport Layer Security (TLS) protocol is currently the most used protocol to provide secure...
View ArticleThreat Roundup for August 3-10
Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Aug. 3 - 10. As with previous roundups, this post isn’t...
View ArticleMicrosoft Tuesday August 2018
p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color: #ffffff} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color:...
View ArticleBeers with Talos EP 35: Live from the RiRa at Black Hat
Beers with Talos (BWT) Podcast Ep. #35 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #35...
View ArticleThreat Roundup for August 10-17
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 10 and August 17. As with previous round-ups, this post isn't meant to be an in-depth analysis....
View ArticlePicking Apart Remcos Botnet-In-A-Box
This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions fromEric Kuhla and Lilia Gonzalez Medina.OverviewCisco Talos has recently observed multiple campaigns using the...
View Article