Quantcast
Browsing all 1954 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Beers with Talos EP33 - Change the Conversation or the People Having It?

Beers with Talos (BWT) Podcast Episode 33 is now available.  Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep....

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple Vulnerabilities in ACD Systems Canvas Draw 4

These vulnerabilities were discovered by Tyler Bohan of Cisco TalosToday, Talos is disclosing several vulnerabilities that have been identified in Canvas Draw graphics editing tool for Macs.Canvas Draw...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Foxit PDF Reader JavaScript Remote Code Execution Vulns

OverviewDiscovered by Aleksandar Nikolic of Cisco Talos.Talos is disclosing a pair of vulnerabilities in Foxit PDF Reader. Foxit PDF Reader is a popular free program for viewing, creating, and editing...

View Article

Image may be NSFW.
Clik here to view.

Blocking Cryptocurrency Mining Using Cisco Security Products

Cisco Talos is releasing a whitepaper addressing Cryptocurrency mining and all the ways to block it using Cisco Security products. The value of cryptocurrencies has fluctuated wildly, but the value is...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple Vulnerabilities in Sony IPELA E Series Camera

Vulnerabilities discovered by Cory Duplantis and Claudio Bozzato of Cisco Talos.OverviewToday, Cisco Talos is disclosing several vulnerabilities discovered with the Sony IPELA E Series Network Camera....

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for July 13-20

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we've observed this week — covering the dates between July 13 and 20. As with previous roundups, this post...

View Article

Image may be NSFW.
Clik here to view.

TalosIntelligence.com is rolling out a new dispute system

At Cisco Talos, we need customers to be able to provide feedback at all times, whether it be about false positives, false negatives, or missed categories. Because we deal with an abundance of data...

View Article

Image may be NSFW.
Clik here to view.

Advanced Mobile Malware Campaign in India uses Malicious MDM - Part 2

This blog post is authored byWarren Mercer andPaul Rascagneres andAndrew Williams.SummarySince our initial post on malicious mobile device management (MDM) platforms, we have gathered more information...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple Vulnerabilities in Samsung SmartThings Hub

These vulnerabilities were discovered by Claudio Bozzato of Cisco Talos.Executive SummaryCisco Talos recently discovered several vulnerabilities present within the firmware of the Samsung SmartThings...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos EP 34: Click Here to Assign New Mobile Device Owner

Beers with Talos (BWT) Podcast Ep. #34 is now available.  Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #34...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for July 20-27

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between July 20 and 27. As with previous roundups, this post...

View Article

Image may be NSFW.
Clik here to view.

Multiple Cobalt Personality Disorder

IntroductionDespite the notion that modern cybersecurity protocols have stopped email-based attacks, email continues to be one of the primary attack vectors for malicious actors — both for widespread...

View Article

Image may be NSFW.
Clik here to view.

Exploitable or Not Exploitable? Using REVEN to Examine a NULL Pointer...

Authored by Aleksandar Nikolic.Executive summaryIt can be very time-consuming to determine if a bug is exploitable or not. In this post, we’ll show how to decide if a vulnerability is exploitable by...

View Article


Image may be NSFW.
Clik here to view.

The Official Talos Guide to Security Summer Camp 2018

It is once again time for the week in the summer when many of us descend on Las Vegas for Black Hat, DEF CON, and B-Sides LasVegas. This is your official guide to what the Cisco Talos Threat...

View Article

Image may be NSFW.
Clik here to view.

Playback: A TLS 1.3 Story

IntroductionSecure communications are one of the most important topics in information security, and the Transport Layer Security (TLS) protocol is currently the most used protocol to provide secure...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for August 3-10

Today, as we do every week, Talos is giving you a glimpse into the most prevalent threats we’ve observed this week — covering the dates between Aug. 3 - 10. As with previous roundups, this post isn’t...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Tuesday August 2018

p.p1 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color: #ffffff} p.p2 {margin: 0.0px 0.0px 0.0px 0.0px; font: 10.0px Monaco; color: #000000; background-color:...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos EP 35: Live from the RiRa at Black Hat

Beers with Talos (BWT) Podcast Ep. #35 is now available.  Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing: www.talosintelligence.com/podcast.Ep. #35...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for August 10-17

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between August 10 and August 17. As with previous round-ups, this post isn't meant to be an in-depth analysis....

View Article

Image may be NSFW.
Clik here to view.

Picking Apart Remcos Botnet-In-A-Box

This blog post was authored by Edmund Brumaghin and Holger Unterbrink with contributions fromEric Kuhla and Lilia Gonzalez Medina.OverviewCisco Talos has recently observed multiple campaigns using the...

View Article
Browsing all 1954 articles
Browse latest View live