Quantcast
Channel: Cisco Talos Blog
Browsing all 1947 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Remote code execution vulnerabilities in LEADTOOLS 20

Cory Duplantis of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered a remote code execution vulnerability in the LEADTOOLS line of imaging toolkits....

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Information disclosure vulnerability in Mozilla Firefox

Marcin "Icewall" Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered an information disclosure vulnerability in Mozilla Firefox. An attacker can...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #86: It’s just an exploit popularity contest...

Beers with Talos (BWT) Podcast episode No. 85 is now available. Download this episode and subscribe to Beers with Talos:Apple Podcasts Google PodcastsSpotify   StitcherIf iTunes and Google Play aren't...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Google Chrome PDFium memory corruption vulnerability

Aleksandar Nikolic of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. The PDF renderer inside Google Chrome, known as PDFium, contains a memory corruption vulnerability that could be...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter for July 2, 2020

Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers. Our latest research you should catch up on is the Valak malware. This information-stealer sneaks its way onto victim machines by...

View Article


Image may be NSFW.
Clik here to view.

WastedLocker Goes "Big-Game Hunting" in 2020

By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec. Threat summary After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral...

View Article

Image may be NSFW.
Clik here to view.

New Snort rule addresses critical vulnerability in F5 BIG-IP

By Jon Munshaw. Cisco Talos just released Snort coverage for a prominent vulnerability in F5’s BIG-IP. BIG-IP is one of the most popular networking products on the modern market. This product is used...

View Article

Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #87: Happy 3rd birthday BWT — It’s story time!

Beers with Talos (BWT) Podcast episode No. 85 is now available. Download this episode and subscribe to Beers with Talos:Apple Podcasts Google PodcastsSpotify   StitcherIf iTunes and Google Play aren't...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: SQL injection vulnerability in Glacies IceHRM

Yuri Kramarz of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos researchers recently discovered that the Glacies' IceHRM software contains a vulnerability that could allow...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for July 3 to July 10

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 3 and July 10. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday for July 2020 — Snort rules and prominent...

By Jon Munshaw. Microsoft released its monthly security update Tuesday, disclosing more than 120 vulnerabilities across its array of products. While only a few vulnerabilities are considered critical,...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in RemoteFX affects, AMD,...

Piotr Bania of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered multiple vulnerabilities in Intel’s Graphics Accelerator Driver and in an AMD Radeon...

View Article

Image may be NSFW.
Clik here to view.

What to expect when you’re electing: Talos’ 2020 election security primer

By Jon Munshaw and Matt Olney.  After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors....

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter for July 16, 2020

Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers. If you haven’t already, we highly recommend you read our in-depth research paper on election security. This paper represents four...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for July 10 to July 17

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 10 and July 17. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article


Image may be NSFW.
Clik here to view.

Beers with Talos Ep. #88: It’s not about the vote, it’s about trust

Beers with Talos (BWT) Podcast episode No. 88 is now available. Download this episode and subscribe to Beers with Talos:Apple Podcasts Google PodcastsSpotify   StitcherIf iTunes and Google Play aren't...

View Article

Image may be NSFW.
Clik here to view.

Prometei botnet and its quest for Monero

By Vanja Svajcer NEWS SUMMARYWe are used to ransomware attacks and big-game hunting making the headlines, but there are still methods adversaries use to monetize their efforts in less intrusive...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter for July 23, 2020

Newsletter compiled by Jon Munshaw. Good afternoon, Talos readers. While ransomware attacks continue to hog all the headlines, cryptocurrency miners are still running the background, sapping computing...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for July 17 to July 24

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between July 17 and July 24. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Adversarial use of current events as lures

By Nick Biasini. The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we...

View Article
Browsing all 1947 articles
Browse latest View live