The commoditization of mobile espionage software
By Matthew Valites with contributions by Joanne Kim and Edmund BrumaghinExecutive summaryMobile stalkerware has all sorts of wide-ranging consequences. The creators of these types of apps can track...
View ArticleCISO Advisory: Security Architecture
Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...
View ArticleThreat Source newsletter (Oct. 31, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.We’re scared of stalkerware, and you...
View ArticleThreat Roundup for October 25 to November 1
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 25 and Nov. 1. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...
View ArticleVulnerability Spotlight: Two remote code execution vulnerabilities in...
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered two remote code execution vulnerabilities in Investintech’s Able2Extract Professional. This...
View ArticleThe latest on BlueKeep and DejaBlue vulnerabilities — Using Firepower to...
Update (11/04/2019):There have been several public reports of active exploitation of CVE-2019-0708, commonly referred to as “BlueKeep.” Preliminary reports indicate that the vulnerability is being...
View ArticleC2 With It All: From Ransomware To Carding
By Warren Mercer, Paul Rascagneres and Vitor Ventura.SummaryCisco Talos recently discovered a new server hosting a large stockpile of malicious files. Our analysis of these files shows that these...
View ArticleCISO Advisory: Security Architecture
Security architecture and design is a vital function of a healthy enterprise. This function is fundamentally, about understanding IT architecture relationships, and ensuring security is a vital element...
View ArticleHow adversaries use politics for compromise
By Nick Biasini and Edmund Brumaghin.Executive SummaryWith the U.S. presidential primaries just around the corner, even malware authors can't help but get behind the frenzy. Cisco Talos recently...
View ArticleBeers with Talos Ep. #65: Please welcome to the show… Talos Incident Response
By Mitch Neff.Beers with Talos (BWT) Podcast episode No. 65 is now available. Download this episode and subscribe to Beers with Talos:If iTunes and Google Play aren't your thing, click here.Recorded...
View ArticleTalos, Cisco Incident Response team up to offer more protection than ever
By Sean MasonOver the years, I've had the honor and privilege to work within some of the greatest security teams on the planet, working alongside such passionate and talented people at Cisco makes...
View ArticleVulnerability Spotlight: Code execution vulnerabilities in LEADTOOLS
Marcin Towalski and Cory Duplantis of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.Cisco Talos recently discovered multiple vulnerabilities in the LEADTOOLS line of imaging...
View ArticleThreat Source newsletter (Oct. 31, 2019)
Newsletter compiled by Jon Munshaw.Welcome to this week’s Threat Source newsletter — the perfect place to get caught up on all things Talos from the past week.The only news we’re going to cover this...
View ArticleThreat Roundup for November 1 to November 8
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Nov. 1 and Nov. 8. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...
View ArticleNew partnership brings together Talos’ visibility with IR’s unmatched...
By Jon Munshaw.The threat landscape has evolved into a complex, challenging environment for organizations everywhere. A talent shortage, combined with an increase in incidents, has led to a generally...
View ArticleVulnerability Spotlight: Remote code execution vulnerability in Microsoft Excel
Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Cisco Talos recently discovered a remote code execution vulnerability in Microsoft Excel. Microsoft disclosed...
View ArticleVulnerability Spotlight: Remote code execution vulnerability in Microsoft...
Marcin Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Microsoft Media Foundation’s framework contains a remote code execution vulnerability that exists due to a use-after-free...
View ArticleMicrosoft Patch Tuesday — Nov. 2019: Vulnerability disclosures and Snort...
By Jon Munshaw.Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday discloses 75 vulnerabilities, 13 of...
View ArticleVulnerability Spotlight: Denial-of-service vulnerability in Intel IGC64...
Piotr Bania of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.Intel’s IGC64.dll graphics driver contains a denial-of-service vulnerability. An attacker could exploit this bug by...
View ArticleVulnerability Spotlight: Command injection bug in Exhibitor UI
Logan Sanderson of Cisco ASIG discovered this vulnerability. Blog by Jon Munshaw.Exhibitor Web UI contains an exploitable command injection vulnerability in its Config editor. Exhibitor is a ZooKeeper...
View Article