What you — and your company — should know about cyber insurance
By Jon Munshaw and Joe Marshall. It’s no longer a question of “if” any given company or organization is going to hit with a cyber attack — it’s when. And when that attack comes, who is willing to take...
View ArticleVulnerability Spotlight: Multiple vulnerabilities in Aspose APIs
Marcin Noga of Cisco Talos discovered these vulnerabilities.Cisco Talos recently discovered multiple remote code execution vulnerabilities in various Aspose APIs. Aspose provides a series of APIs for...
View ArticleTalos DEFCON badge build instructions and use
By Patrick Mullen.We want to thank everyone who stopped by the Cisco Talos booth at DEFCON's Blue Team Village earlier this month. We handed out these badges at our area where we had Snort rules...
View ArticleArticle 1
New 4CAN tool helps identify vulnerabilities in on-board car computersBy Alex DeTrano, Jason Royes, and Matthew Valites.Executive summaryModern automobiles contain hundreds of sensors and mechanics...
View ArticleThreat Source newsletter (Aug. 22)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.A lot of people may think that cyber...
View ArticleThreat Roundup for August 16 to August 23
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 16 and Aug. 23. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleChina Chopper still active 9 years later
By Paul Rascagneres and Vanja Svajcer.IntroductionThreats will commonly fade away over time as they're discovered, reported on, and detected. But China Chopper has found a way to stay relevant, active...
View ArticleRAT Ratatouille: Backdooring PCs with leaked RATs
By Edmund Brumaghin and Holger Unterbrink.Executive summaryOrcus RAT and RevengeRAT are two of the most popular remote access trojans (RATs) in use across the threat landscape. Since its emergence in...
View ArticleThreat Source newsletter (Aug. 22)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.What’s old is new again.Our research this...
View ArticleBeers with Talos Ep. #60: Summer camp flashbacks and defining your intel
Beers with Talos (BWT) Podcast episode No. 60 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded Aug. 16, 2019 —...
View ArticleThreat Roundup for August 23 to August 30
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 23 and Aug. 30. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Two vulnerabilities in Epignosis eFront
Yuri Kramarz of Security Advisory Incident Response EMEAR discovered these vulnerabilities.Cisco Talos discovered two vulnerabilities in Epignosis eFront — one of which could allow an attacker to...
View ArticleThe latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...
This blog was authored by Brandon Stultz, Holger Unterbrink and Edmund Brumaghin.Executive summaryOver the past few months, Microsoft has released several security updates for critical Remote Desktop...
View ArticleVulnerability Spotlight: Information disclosure vulnerability in Blynk-Library
Lilith Wyatt of Cisco Talos discovered this vulnerability.Cisco Talos recently discovered an information disclosure vulnerability in Blynk-Library. Blynk-Library is a small library for connecting more...
View ArticleGhIDA: Ghidra decompiler for IDA Pro
By Andrea MarcelliExecutive SummaryCisco Talos is releasing two new tools for IDA Pro: GhIDA and Ghidraaas.GhIDA is an IDA Pro plugin that integrates the Ghidra decompiler in the IDA workflow, giving...
View ArticleThreat Source newsletter (Sept. 5, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.By now, nearly everyone has heard of...
View ArticleThreat Roundup for August 30 to September 6
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Aug. 30 and Sept. 6. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Denial-of-service vulnerabilities in some NETGEAR...
Dave McDaniel of Cisco Talos discovered these vulnerabilities.The NETGEAR N300 line of wireless routers contains two denial-of-service vulnerabilities. The N300 is a small and affordable wireless...
View ArticleMicrosoft Patch Tuesday — Sept. 2019: Vulnerability disclosures and Snort...
By Jon Munshaw.Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 85 vulnerabilities, 19 of which...
View ArticleBeers with Talos Ep. #61: Hacking for good is a bad idea
Beers with Talos (BWT) Podcast episode No. 61 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded Aug. 30, 2019:...
View Article