ExileRAT shares C2 with LuckyCat, targets Tibet
Warren Mercer, Paul Rascagneres and Jaeson Schultz authored this post.Executive summaryCisco Talos recently observed a malware campaign delivering a malicious Microsoft PowerPoint document using a...
View Article2018 in Snort Rules
This blog post was authored by Benny Ketelslegers of Cisco TalosThe cybersecurity field shifted quite a bit in 2018. With the boom of cryptocurrency, we saw a transition from ransomware to...
View ArticleCyber Security Week in Review (Feb. 8)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View ArticleThreat Roundup for Feb. 1 to Feb. 8
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 01 and Feb. 08. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleWhat you can learn from Cisco Talos’ new oil pumpjack workshop
Paul Rascagneres wrote this blog post with contributions from Patrick DeSantis from Cisco Talos ARES (Advanced Research/Embedded Systems).Executive summaryEvery day, more industrial control systems...
View ArticleVulnerability Spotlight: Adobe Acrobat Reader DC text field remote code...
Aleksandar Nikolic of Cisco Talos discovered this vulnerability.Executive summaryAdobe Acrobat Reader DC contains a vulnerability that could allow an attacker to remotely execute code on the victim’s...
View ArticleMicrosoft Patch Tuesday — February 2019: Vulnerability disclosures and Snort...
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 69 vulnerabilities, 20 of which are rated...
View ArticleBeers with Talos Ep. #46 - Privacy Pwnd: ExileRAT and Collecting Bad Karma
Beers with Talos (BWT) Podcast Ep. #46 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Ep. #46 show notes: Recorded...
View ArticleCyber Security Week in Review (Feb. 15, 2019)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View ArticleThreat Roundup for Feb. 8 to Feb. 15
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 08 and Feb. 15. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleJavaScript bridge makes malware analysis with WinDbg easier
IntroductionAs malware researchers, we spend several days a week debugging malware in order to learn more about it. We have several powerful and popular user mode tools to choose from, such as OllyDbg,...
View ArticleCombing Through Brushaloader Amid Massive Detection Uptick
Nick Biasini and Edmund Brumaghin authored this blog post with contributions from Matthew Molyett.Executive SummaryOver the past several months, Cisco Talos has been monitoring various malware...
View ArticleCyber Security Week in Review (Feb. 22)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View ArticleThreat Roundup for Feb. 15 to Feb. 22
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 15 and Feb. 22. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleBeers with Talos Ep. #47: Privacy, Underwear, and Arias
Beers with Talos (BWT) Podcast Ep. #47 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Ep. #47 show notes: Recorded...
View ArticleCisco Talos Honeypot Analysis Reveals Rise in Attacks on Elasticsearch Clusters
Christopher Evans of Cisco Talos conducted the research for this post.Executive SummaryCisco Talos warns users that they need to keep a close eye on unsecured Elasticsearch clusters. We have recently...
View ArticleVulnerability Spotlight: Remote code execution vulnerability in Antenna House...
Emmanuel Tacheau of Cisco Talos discovered this vulnerability.Executive summaryAntenna House Rainbow PDF Office Server Document Converter contains a heap overflow vulnerability that could allow an...
View ArticleCyber Security Week in Review (March 1)
Welcome to this week's Cyber Security Week in Review, where Cisco Talos runs down all of the news we think you need to know in the security world. For more news delivered to your inbox every week, sign...
View ArticleThreat Roundup for Feb. 22 to March 1
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Feb. 22 and March 01. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleBeers with Talos Ep. #48: Loaders or trojans, plus an RSA preview
Beers with Talos (BWT) Podcast Ep. #48 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.March 1, 2019 - This is a super...
View Article