Quantcast
Channel: Cisco Talos Blog
Browsing all 1948 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The commoditization of mobile espionage software

By Matthew Valites with contributions by Joanne Kim and Edmund BrumaghinExecutive summaryMobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps can track...

View Article


Image may be NSFW.
Clik here to view.

CISO Advisory: Security Architecture

Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (Oct. 31, 2019)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.We’re scared of stalkerware, and you...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for October 25 to November 1

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 25 and Nov. 1. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Two remote code execution vulnerabilities in...

Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered two remote code execution vulnerabilities in Investintech’s Able2Extract Professional. This...

View Article


Image may be NSFW.
Clik here to view.

The latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...

Update (11/04/2019):There have been several public reports of active exploitation of CVE-2019-0708, commonly referred to as “BlueKeep.” Preliminary reports indicate that the vulnerability is being...

View Article

Image may be NSFW.
Clik here to view.

C2 With It All: From Ransomware To Carding

By Warren Mercer, Paul Rascagneres and Vitor Ventura.SummaryCisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our analysis of these files shows that these...

View Article

Image may be NSFW.
Clik here to view.

CISO Advisory: Security Architecture

Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...

View Article


Image may be NSFW.
Clik here to view.

How adversaries use politics for compromise

By Nick Biasini and Edmund Brumaghin.Executive SummaryWith the U.S. presidential primaries just around the corner, even malware authors can't help but get behind the frenzy. Cisco Talos recently...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #65: Please welcome to the show… Talos Incident Response

By Mitch Neff.Beers with Talos (BWT) Podcast episode No. 65 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...

View Article

Image may be NSFW.
Clik here to view.

Talos, Cisco Incident Response team up to offer more protection than ever

By Sean MasonOver the years, I've had the honor and privilege to work within some of the greatest security teams on the planet, working alongside such passionate and talented people at Cisco makes...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS

Marcin Towalski and Cory Duplantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter (Oct. 31, 2019)

Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.The only news we’re going to cover this...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for November 1 to November 8

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 1 and Nov. 8. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...

View Article

Image may be NSFW.
Clik here to view.

New partnership brings together Talos’ visibility with IR’s unmatched...

By Jon Munshaw.The threat landscape has evolved into a complex, challenging environment for organizations everywhere. A talent shortage, combined with an increase in incidents, has led to a generally...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft Excel

Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered a remote code execution vulnerability in Microsoft Excel. Microsoft disclosed...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Remote code execution vulnerability in Microsoft...

Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Microsoft Media Foundation’s framework contains a remote code execution vulnerability that exists due to a use-after-free...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort...

By Jon Munshaw.Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Denial-of-service vulnerability in Intel IGC64...

Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Command injection bug in Exhibitor UI

Logan Sanderson of Cisco ASIG discovered this vulnerability. Blog by Jon Munshaw.Exhibitor Web UI contains an exploitable command injection vulnerability in its Config editor. Exhibitor is a ZooKeeper...

View Article
Browsing all 1948 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>