Quantcast
Channel: Cisco Talos Blog
Browsing all 1948 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Threat Roundup for May 21 to May 28

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 21 and May 28. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Multiple vulnerabilities in Accusoft ImageGear

Emmanuel Tacheau of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw.  Cisco Talos recently discovered multiple vulnerabilities in Accusoft ImageGear. The ImageGear library is a...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: A deep dive into macOS SMB server

By Aleksandar Nikolich.Executive summary Cisco Talos recently discovered multiple vulnerabilities in macOS’s implementation of SMB server. An adversary could exploit these vulnerabilities to carry out...

View Article

Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Use-after-free vulnerability in WebKit

Marcin Towalski of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. The WebKit browser engine contains a use-after-free vulnerability in its GraphicsContext function. A malicious web...

View Article

Image may be NSFW.
Clik here to view.

Necro Python bot adds new exploits and Tezos mining to its bag of tricks

By Vanja Svajcer, with contributions from Caitlin Huey and Kendall McKay. News summarySome malware families stay static in terms of their functionality. But a newly discovered malware campaign...

View Article


Image may be NSFW.
Clik here to view.

Threat Source newsletter (June 3, 2021)

Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   If you didn't catch us live yesterday, we've uploaded the full version of our stream on Discord and Slack malware to our YouTube...

View Article

Image may be NSFW.
Clik here to view.

Threat Roundup for May 28 to June 4

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between May 28 and June 4. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this...

View Article

Image may be NSFW.
Clik here to view.

Intelligence-driven disruption of ransomware campaigns

By Neil Jenkins and Matthew Olney. Note: Our guest co-author, Neil Jenkins, is the Chief Analytic Officer at the Cyber Threat Alliance. He leads the CTA's analytic efforts, focusing on the development...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Patch Tuesday for June 2021 — Snort rules and prominent...

By Jon Munshaw, with contributions from Edmund Brumaghin.  Microsoft released its monthly security update Tuesday, disclosing 51 vulnerabilities across its suite of products, breaking last month’s...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: Code execution vulnerability in Google Web Audio API

Piotr Bania of Cisco Talos discovered these vulnerabilities. Blog by Jon Munshaw. Cisco Talos recently discovered two use-after-free vulnerabilities in Google’s Web Audio API that an adversary could...

View Article

Image may be NSFW.
Clik here to view.

Quarterly Report: Incident Response trends from Spring 2021

By David Liebenberg and Caitlin Huey.  While the security community made a great effort to warn users of the exploitation of several Microsoft Exchange Server zero-day vulnerabilities, it was still the...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter (June 10, 2021)

Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   We seriously can't escape from ransomware. It's in the headlines constantly and has now drawn the full attention of the federal...

View Article

Image may be NSFW.
Clik here to view.

Talos Takes Ep. #56: The first security steps you should take when you return...

By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit the Talos Takes page. We started out the...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for June 4 to June 11

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 4 and June 11. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

What’s past is prologue – A new world of critical infrastructure security

By Caitlin Huey, Joe Marshall and Thomas Pope. Attackers have targeted American critical infrastructure several times over the past few years, putting at risk U.S. electrical grids, oil pipelines and...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Spotlight: EIP Stack Group OpENer information disclosure...

Martin Zeiser of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw.  Cisco Talos recently discovered an exploitable information disclosure vulnerability in EIP Stack Group OpENer’s...

View Article

Image may be NSFW.
Clik here to view.

Threat Source newsletter (June 17, 2021)

Newsletter compiled by Jon Munshaw.Good afternoon, Talos readers.   Although the Colonial Pipeline attack is largely behind us now, its potential repercussions are not. This was just the latest in a...

View Article


Image may be NSFW.
Clik here to view.

Threat Roundup for June 11 to June 17

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between June 11 and June 17. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead,...

View Article

Image may be NSFW.
Clik here to view.

Talos Takes Ep. #57: A ransomware-as-a-service explainer

By Jon Munshaw. The latest episode of Talos Takes is available now. Download this episode and subscribe to Talos Takes using the buttons below, or visit the Talos Takes page. How much is...

View Article

Image may be NSFW.
Clik here to view.

Attackers in Executive Clothing - BEC continues to separate orgs from their...

By Nick Biasini. In today's world of threat research, the focus tends to be on the overtly malicious practice of distributing and installing malware on end systems. But this is far from the complete...

View Article
Browsing all 1948 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>